Reference no: EM131143510
QUESTION
Please write a 2-3 page paper (no format required) with the exception of the following:
Double-Spaced, 12 point font, citation of references.
You can pick your topic based on your interests, but be sure to pick a subject that has a Technical Aspect that you can argue both the Pros and Cons. Put cognitive reasoning into the paper, just don't identify problems, come up with solutions, or at the very least, suggestions on what you think should be done be more secure. I have also provided two possibilities for you to potentially write on.
1) Based on the TED talks video on "How are devices are vulnerable to hacking", the presenter goes into an overview on how various technology like Pace Makers, vehicles, and radios are susceptible to attack. Watch the video again and elaborate on the susceptible technology (e.g. Wireless). Identify specific vulnerabilities, how they can be exploited. Describe other affected technology that you find, and present your findings. Lastly, propose how you as a Cyber Security professional would mitigate risks with the use of the technology.
Here is the link for (1) : https://www.youtube.com/watch?v=metkEeZvHTg
2) During the lecture, we covered Secure Delete, File Recovery, and Operating System cleaning devices. Write on how these functions can both Improve Security and efficiency, as well as contribute to less efficiency and degraded security. You can talk about the intent behind the use of Secure Delete (e.g. Malicious individuals versus legitimate use). Get creative, but be sure to identify specific topics and issues you are addressing in your introduction.
Arbitrage and financial decision making
: Honda Motor Company is considering offering a $2000 rebate on its minivan, lowering the vehicle's price from $30,000 to $28,000. The marketing group estimates that this rebate will increase sales over the next year from 40,000 to 55,000 vehicles. Sup..
|
What is alpines free cash flow for year 1
: If the tax rate is 40%, what is Alpine's Free Cash Flow for year 1?
|
Organizations to manage conflicts with employees
: Why is it important for organizations to manage conflicts with employees?
|
Describing using three different social media platforms
: Write a 350- to 700-word summary describing using three different social media platforms with the objective of networking within your career field. Use your current social media accounts, or create new ones. Incorporate research regarding how to p..
|
How are devices are vulnerable to hacking
: Based on the TED talks video on " How are devices are vulnerable to hacking", the presenter goes into an overview on how various technology like Pace Makers, vehicles, and radios are susceptible to attack.
|
Is there connection between ethical behavior
: Is there a connection between ethical behavior within an organization and its chances of long-term survivability? Do you think that a company that behaves ethically is less or more likely to make more profit?
|
Determine the end area graphically by counting squares
: From the following excerpt of field notes, plot the cross section on graph paper and superimpose on it a design template for a 30-ft-wide level roadbed with fill slopes of 2-1/2:1 and a subgrade elevation at centerline of 970.30 ft. Determine the ..
|
Calculate the return in percent for each value
: Calculate the return (in Percent) for each value of b. (note: you may just calculate the total return and not worry about how this split between current yield and capital- gains yield). Calculate the expected return (in Percent)
|
Discuss his beliefs and their influence upon modern society
: Nietzsche's ideas attacked Western society's beliefs about morality, religion, and the existence of absolute truth. Discuss his beliefs and their influence upon modern society. Prof Kim (ONLY)
|