How are devices are vulnerable to hacking

Assignment Help Computer Engineering
Reference no: EM131143510

QUESTION

Please write a 2-3 page paper (no format required) with the exception of the following:

Double-Spaced, 12 point font, citation of references.

You can pick your topic based on your interests, but be sure to pick a subject that has a Technical Aspect that you can argue both the Pros and Cons. Put cognitive reasoning into the paper, just don't identify problems, come up with solutions, or at the very least, suggestions on what you think should be done be more secure. I have also provided two possibilities for you to potentially write on.

1) Based on the TED talks video on "How are devices are vulnerable to hacking", the presenter goes into an overview on how various technology like Pace Makers, vehicles, and radios are susceptible to attack. Watch the video again and elaborate on the susceptible technology (e.g. Wireless). Identify specific vulnerabilities, how they can be exploited. Describe other affected technology that you find, and present your findings. Lastly, propose how you as a Cyber Security professional would mitigate risks with the use of the technology.

Here is the link for (1) : https://www.youtube.com/watch?v=metkEeZvHTg

2) During the lecture, we covered Secure Delete, File Recovery, and Operating System cleaning devices. Write on how these functions can both Improve Security and efficiency, as well as contribute to less efficiency and degraded security. You can talk about the intent behind the use of Secure Delete (e.g. Malicious individuals versus legitimate use). Get creative, but be sure to identify specific topics and issues you are addressing in your introduction.

Reference no: EM131143510

Questions Cloud

Arbitrage and financial decision making : Honda Motor Company is considering offering a $2000 rebate on its minivan, lowering the vehicle's price from $30,000 to $28,000. The marketing group estimates that this rebate will increase sales over the next year from 40,000 to 55,000 vehicles. Sup..
What is alpines free cash flow for year 1 : If the tax rate is 40%, what is Alpine's Free Cash Flow for year 1?
Organizations to manage conflicts with employees : Why is it important for organizations to manage conflicts with employees?
Describing using three different social media platforms : Write a 350- to 700-word summary describing using three different social media platforms with the objective of networking within your career field. Use your current social media accounts, or create new ones. Incorporate research regarding how to p..
How are devices are vulnerable to hacking : Based on the TED talks video on " How are devices are vulnerable to hacking", the presenter goes into an overview on how various technology like Pace Makers, vehicles, and radios are susceptible to attack.
Is there connection between ethical behavior : Is there a connection between ethical behavior within an organization and its chances of long-term survivability? Do you think that a company that behaves ethically is less or more likely to make more profit?
Determine the end area graphically by counting squares : From the following excerpt of field notes, plot the cross section on graph paper and superimpose on it a design template for a 30-ft-wide level roadbed with fill slopes of 2-1/2:1 and a subgrade elevation at centerline of 970.30 ft. Determine the ..
Calculate the return in percent for each value : Calculate the return (in Percent) for each value of b. (note: you may just calculate the total return and not worry about how this split between current yield and capital- gains yield). Calculate the expected return (in Percent)
Discuss his beliefs and their influence upon modern society : Nietzsche's ideas attacked Western society's beliefs about morality, religion, and the existence of absolute truth. Discuss his beliefs and their influence upon modern society. Prof Kim (ONLY)

Reviews

Write a Review

Computer Engineering Questions & Answers

  Determining the salary of person

Write down a program which determines how much a person earns in a month in case the salary is one penny first day, two pennies second day, four pennies the third day, and so on with the daily pay doubling each day employee works.

  What role does reasoned paranoia play in the minded and

what is the mindset required to properly protect information? what role does reasoned paranoia play in the minded and

  Write a program for creating a linked list by dynamically

Write a program for creating a linked list by dynamically allocating memory for desired number of nodes. The linked list should be populated based on file I/O.

  The budget would be flexible with an upper limit but she

preparing a spreadsheet that helps one to plan custom vacation packages for families. the final outcome would be a nice

  How can string and word variable type data structures be

how can string and word variable type data structures be implemented? describe how a word from a programming language

  The most common process to ensure client security

How can worms and viruses be introduced to a Web site. What is the most common process to ensure client security.

  How automated accounting software can help management

Summarize the various accounting systems that each firm provides. Be sure to address the following for each firm: a. The various types of accounting systems it sells (e.g., Oracle sells Oracle Financials as well as PeopleSoft financials)

  Define advantages and disadvantages of wireless networks

I want assitance with question A and question B. Question C has to be in great detail where I can use a a guide to form a comprehensive report. please pr reference will greatly be appreciated.

  How to enlarge the size of the array

How to enlarge the size of the array? Enlarge the size of the array to 25. Driver will start with 10 objects in it other than has provision for up to 15 new objects. You can use java any API.

  How to design a grade average program

plan a grade average program that will produce the numerical grade average of test scores input by a user.

  What is the multicast

examine and discuss what the UDP does and its relationship to TCP - - - in what ways is it similar and different, and why (what applications) would we use UDP, and why can't a user program access IP directly.

  Define problem with criteria range

problem with criteria range. I do not know how to set two different criterias in one column. I need to ADVANCE FILTER all of the Clerks (1 and 2) and the Sect. 1 workers who create more than $5.50/hr. I do not understand how to set the title crite..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd