Identify specific vulnerabilities how they can be exploited

Assignment Help Management Information Sys
Reference no: EM131030459

I need response 3-4 page paper (no format required) with the exception of the following:

Double-Spaced, 12 point font, citation of references.

You can pick your topic based on your interests, but be sure to pick a subject that has a Technical Aspect that you can argue both the Pros and Cons. Put cognitive reasoning into the paper, just don't identify problems, come up with solutions, or at the very least, suggestions on what you think should be done be more secure. I have also provided two possibilities for you to potentially write on.

1) Based on the TED talks video on " How are devices are vulnerable to hacking", the presenter goes into an overview on how various technology like Pace Makers, vehicles, and radios are susceptible to attack. Watch the video again and elaborate on the susceptible technology (e.g. Wireless). Identify specific vulnerabilities, how they can be exploited. Describe other affected technology that you find, and present your findings. Lastly, propose how you as a Cyber Security professional would mitigate risks with the use of the technology.
Here is the link for (1) : https://www.youtube.com/watch?v=metkEeZvHTg

2) During the lecture, we covered Secure Delete, File Recovery, and Operating System cleaning devices. Write on how these functions can both Improve Security and efficiency, as well as contribute to less efficiency and degraded security. You can talk about the intent behind the use of Secure Delete (e.g. Malicious individuals versus legitimate use). Get creative, but be sure to identify specific topics and issues you are addressing in your introduction.

Reference no: EM131030459

Questions Cloud

What led portuguese nobility to organize expeditions : What led Portuguese nobility to organize expeditions in search of plunder? Which of these had strengthened the monarchies of Spain and Portugal?
Discusses about yick wo v. hopkins : Write a three page article that discusses about Yick Wo v. Hopkins
Ima reckless got into a car accident : Ima Reckless got into a car accident after she left the corner bar intoxicated.  Vicki Victim lost her life in the car accident.  At sentencing, the Judge gave Ima probation.  In celebration and relief for not having to go to jail, Ima got drunk and ..
Plaintiffs'' claim against goffstein and dismissed the suit : SAMPLE CASE BRIEF Kennedy v. Goffstein, 62 Mass.App.Ct. 230 (2004) Parties: Plaintiffs: A. William Kennedy and Helen P. Kennedy Defendant: Scott Goffstein Issue: Did the trial court err when it ruled that the statute of limitations had expired On pla..
Identify specific vulnerabilities how they can be exploited : During the lecture, we covered Secure Delete, File Recovery, and Operating System cleaning devices. Write on how these functions can both Improve Security and efficiency, as well as contribute to less efficiency and degraded security. You can talk..
What is the test called that you take to become a lawyer : What is the test called that you take to become a lawyer?
Identify a beam that supports a significant load : In a bound report you need to show all your calculations, including explanation of how you worked out external loads on the member. You should have headings and subheadings and include an introduction and discussion of the selected structures
Discuss and define the idea of romanization : In what ways were the teachings of Islam similar to Christianity? How were they different? Discuss and define the idea of Romanization and its role in creating unity in the development of the Roman Empire.
Discuss artistic elements that characterize book of kells p : Discuss Artistic elements that characterize the Book of Kells. P.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Description of supply and demand simulationcan you help me

description of supply and demand simulationcan you help me with the following i seem to be struggling.referring to the

  Analyze the potential security issues inherent

We have proposed an integration plan for the two networks, we need to consider the security aspects. With that in mind, please analyze the potential security issues inherent in business networks

  Case study on building an access control system

Case Study on Building an Access Control System

  How it increases the switching costhow could a business use

how it increases the switching costhow could a business use information technology to increase switching costs and lock

  How do cultural differences affect projects

How do cultural differences affect projects? What technologies can be used to overcome these differences? Provide specific examples.

  Identify creational design pattern and describe a situation

From the e-Activity, using UML and text, identify a creational design pattern and describe a situation where it could be applied. Provide a justification as to why it should be used over other creational design patterns that are available.

  Key foundations of the code of ethical code of conduct

How would you respond? As you review the key foundations of the Code of Ethical Code of Conduct, what considerations need to be made to ensure that the ethical responsibilities to the child are made

  Name and describe two safeguard utilized for system security

Name and describe two safeguard utilized for system security and Explain why health IT privacy and security standards are important

  Data relationshipsdefining data relationships is an

data relationshipsdefining data relationships is an important process during the database design.please discuss the

  Draw a context diagram of the computerised inventory system

Draw a Context Diagram of the Computerised Inventory System at The Variety Store from the perspective of the Purchasing Department

  Show the chain of authority for compliance

Organizational structure: Chain of authority for compliance and In my last company the compliance office was assigned to the same manager who consistently violated the ethics of the corporation.

  Discuss the processes of planning

Business Continuity Planning: Explain how components of the business infrastructure are included in a business continuity plan. Discuss the processes of planning, analysis, design, implementation, testing and maintenance in developing this plan

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd