Technology leading us in terms of the future

Assignment Help Basic Computer Science
Reference no: EM132356366

Scenario:

You are the cybersecurity expert for a government organization. There is great concern that hackers from another country will infiltrate the government network by using a phishing attack to interfere with our election process. One member send you an email that looks suspicious, in oder to provide law enforcement with as much information as possible you decide to track the sender.

You may use the attached email (.txt) the senders IP is highlighted or choose one from your own email

Trace the IP to get a physical address (starting point)

Share any other information you find that may be relevant to law enforcement

Short Guides - You may need Google "how to view the source code for your specific" device, browser etc... also works on email that are not saved on your device.

Discussion

1. Where do you see technology leading us in terms of the future?

2. Identify a device (anything that has a CPU) that we use every day that is not protected and subject to being hacked?

Reference no: EM132356366

Questions Cloud

What trade barriers were in place during that decade : Under a system of perfectly free commerce, each country naturally devotes its capital and labour to such employments as are most beneficial to each.
What do you think the value of software contract : This week we will discuss the role of contracts. From a purely IT perspective, what do you think the value of a software contract is ?
Organization protects client information : You are the owner of an IT Consulting Business. What best practices would you implement to make sure that an organization protects client information.
Calculate the final charge of a product at a retail store : Design a python program to calculate the final charge of a product at a retail store. You must also create flowcharts for each function and for the program.
Technology leading us in terms of the future : Where do you see technology leading us in terms of the future? we use every day that is not protected and subject to being hacked?
Case involving united states of america versus ross ulbrecht : Using a Microsoft Word document, please discuss the case involving the United States of America versus Ross Ulbrecht.
Provide a screenshot of your program that contains cyclist : Provide a screenshot of your program that contains at least two cyclist entries that you added to the list. P.rovide the code from your .pyw file that you used
United states supreme court carpenter v. united states : Google search of the term, "United States Supreme Court Carpenter v. United States 2018."
Describe the role of information technology in globalization : Describe the role of information technology in globalization. Define the digital divide and explain Nielsen's three stages of the digital divide

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write a short essay using no more than 600 words

Write a short essay (using no more than 600 words) to discuss how (or whether) the XML equivalent capabilities were used in the past (before XML) in WBIS and what changes are expected in XML in future?

  Opportunity cost of producing another

1. If an economy is producing 2000 pounds of coffee and 55000 bread, what is the opportunity cost of producing another 3000 pounds of coffee.

  Create a sequence and use it to enter data into at least 1

Rebuild the new table structure that contains at least 4 tables (use Notepad). Use tables to show what the NEW schema looks like (either type the schema out in word or a text editor or show the print of the "desc tablename" of all tables.) Create a s..

  Difficulties for the owner of the data model

Define in your ownwords what an update anomaly is all about. Deliver a situation where a update anomaly can happen and in what way it can effect difficulties for the owner of the data model.

  Third-party data center hosting vendors

Each corporate facility is located near a co-location data center, where production systems are located and managed by third-party data center hosting vendors.

  Perspectives of the balanced scorecard module

Review the four perspectives of the Balanced Scorecard Module in Section 16.3 of Management:

  Why is phase 2 of the birch algorithm efficient

Why is it bad practice to include two highly correlated inputs to a clustering algorithm?

  Explain differences between viruses and other malicious code

explain key differences between viruses and other malicious codes. Identify three different types of viruses, and describe main differences between each one.

  What extent do you believe the sas institute

To what extent do you believe the SAS Institute, Inc. is a "Learning Organization" (OL). If so, how does SAS Institute learn? What have they learned? and through what mechanism(s)?

  Create functions for returning those data values

Create functions for checking a book in and out. Do simple validation of data entered into a Book; for example, accept ISBNs only of the form n-n-n-x where n is an integer and x is a digit or a letter. Store an ISBN as a string.

  State at least one item you find interesting

State at least one item you find interesting/didn't know before about how computers are used in this career.

  Literature review in enterprise risk management

ITS835- Conduct a literature review in Enterprise Risk Management. Elaborate on any previous attempts to examine that issue.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd