How are devices are vulnerable to hacking

Assignment Help Computer Engineering
Reference no: EM131143510

QUESTION

Please write a 2-3 page paper (no format required) with the exception of the following:

Double-Spaced, 12 point font, citation of references.

You can pick your topic based on your interests, but be sure to pick a subject that has a Technical Aspect that you can argue both the Pros and Cons. Put cognitive reasoning into the paper, just don't identify problems, come up with solutions, or at the very least, suggestions on what you think should be done be more secure. I have also provided two possibilities for you to potentially write on.

1) Based on the TED talks video on "How are devices are vulnerable to hacking", the presenter goes into an overview on how various technology like Pace Makers, vehicles, and radios are susceptible to attack. Watch the video again and elaborate on the susceptible technology (e.g. Wireless). Identify specific vulnerabilities, how they can be exploited. Describe other affected technology that you find, and present your findings. Lastly, propose how you as a Cyber Security professional would mitigate risks with the use of the technology.

Here is the link for (1) : https://www.youtube.com/watch?v=metkEeZvHTg

2) During the lecture, we covered Secure Delete, File Recovery, and Operating System cleaning devices. Write on how these functions can both Improve Security and efficiency, as well as contribute to less efficiency and degraded security. You can talk about the intent behind the use of Secure Delete (e.g. Malicious individuals versus legitimate use). Get creative, but be sure to identify specific topics and issues you are addressing in your introduction.

Reference no: EM131143510

Questions Cloud

Arbitrage and financial decision making : Honda Motor Company is considering offering a $2000 rebate on its minivan, lowering the vehicle's price from $30,000 to $28,000. The marketing group estimates that this rebate will increase sales over the next year from 40,000 to 55,000 vehicles. Sup..
What is alpines free cash flow for year 1 : If the tax rate is 40%, what is Alpine's Free Cash Flow for year 1?
Organizations to manage conflicts with employees : Why is it important for organizations to manage conflicts with employees?
Describing using three different social media platforms : Write a 350- to 700-word summary describing using three different social media platforms with the objective of networking within your career field. Use your current social media accounts, or create new ones. Incorporate research regarding how to p..
How are devices are vulnerable to hacking : Based on the TED talks video on " How are devices are vulnerable to hacking", the presenter goes into an overview on how various technology like Pace Makers, vehicles, and radios are susceptible to attack.
Is there connection between ethical behavior : Is there a connection between ethical behavior within an organization and its chances of long-term survivability? Do you think that a company that behaves ethically is less or more likely to make more profit?
Determine the end area graphically by counting squares : From the following excerpt of field notes, plot the cross section on graph paper and superimpose on it a design template for a 30-ft-wide level roadbed with fill slopes of 2-1/2:1 and a subgrade elevation at centerline of 970.30 ft. Determine the ..
Calculate the return in percent for each value : Calculate the return (in Percent) for each value of b. (note: you may just calculate the total return and not worry about how this split between current yield and capital- gains yield). Calculate the expected return (in Percent)
Discuss his beliefs and their influence upon modern society : Nietzsche's ideas attacked Western society's beliefs about morality, religion, and the existence of absolute truth. Discuss his beliefs and their influence upon modern society. Prof Kim (ONLY)

Reviews

Write a Review

Computer Engineering Questions & Answers

  Which language would be more appropriate

The vehicle registration department for the State of Florida is becoming decentralized. Each county would now handle its own registration process and will issue its own license plates

  Java program that allows a user to enter three words

design a Java program that allows a user to enter three words, and displays the appropriate three-letter acronym (constructed from the input) in all uppercase letters. If user enters more than three words, ignore the extra words.

  Imagine you are the project manager for a critical project

imagine you are the project manager for a critical project for an organization. the organization wants to implement an

  Determining the missing side of triangle

Write down a program which will figure out the missing side of the right triangle utilizing the Pythagorean Theorem. Suppose that the user entries will make a triangle.

  Recognizing the error

Make out error in the following given code:#include //Line 1 using namespace std; //Line 2

  Craete an inheritance hierarchy for classes quadrilateral

Write down an inheritance hierarchy for classes Quadrilateral, Trapezoid, Parallelogram, Rectangle and Square. Use Quadrilateral as the superclass of the hierarchy.

  Computer simulation assignment using flexsim software

Create a Flexsim model for a stylist shop that is open for 24 hours in a mall that is always open.

  How to identify areas for improvement

plan a form that you would disseminate to your end user community that will aid in the assessment of a current system to identify areas for improvement.

  Migrating to a standardized erp system in a cloud computing

migrating to a standardized erp system in a cloud computing environment at abc corporationtopicthis proposal discusses

  Recognizing the error in code

Suppose that the variable A is an arrays of ints. Take the following code segment:Boolean flag = false;

  What issues is the forensic computing discipline facing

What issues is the forensic computing discipline facing due to the ever growing capacities of storage media, and the requirement to acquire and analyse large volumes of data?

  One approach to operating system design is to provide as

one approach to operating system design is to provide as small a kernel as possible and to make all other modules

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd