Free

CIS 333 discussions - Coursework Example

Comments (0) Cite this document
Summary
In my place of employment, encryption is used. This ensures that only those with the right key can have access to the data. Access control lists and implementing and enforcing…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.8% of users find it useful
CIS 333 discussions
Read TextPreview

Extract of sample "CIS 333 discussions"

Computer Sciences & IT Question Providing Security over Data Data confidentiality within a work place ensures that data is not disclosed to unauthorized persons. In my place of employment, encryption is used. This ensures that only those with the right key can have access to the data. Access control lists and implementing and enforcing file access permissions. Data integrity ensures that the data cannot be modified by unauthorized persons. Our I.T department makes use of cryptography to ensure data integrity. Data hashing guarantees that the original data is received securely. Finally, the I.T department makes off-site data backups and employs redundancy to ensure that data is readily available to authorized persons when required.
e-Activity
One of the biggest attacks on mobile operating systems today as noted by researchers at Silicon Valley Security Company is the malware called WireLurker (Perlroth, 2014). It targets the Apple mobile and desktop users. The malware is designed in a way that unauthorized people can access the data from the devices. The security company confirmed that this is a malware affecting the Apple iOS mobile users in China (Perlroth, 2014). The devices become infected with the malware if they connect their devices to Macs through the USB wires and in cases where mobile users have altered their devices and installed software that Apple has not authorized.
The problem can be solved by informing mobile users in China to install software from trusted sources, to avoid jailbreaking their devices and keeping the iOS software up to date.
Question 2: Risk Management and Malicious Attacks
In china’s case of malware attack on Apple mobile devices it is important for the device users to avoid the risk by not using unauthorized software applications. Users should also prevent the transfer of the malware from the Macs to the mobile devices which occurs when using the USB wire. Users who have altered their devices by jailbreaking or those updating their devices from unknown sites should accept that it is a risk and the consequence is stolen information. Users of Apple mobiles can mitigate this risk by using the mentioned preventative measures.
e-Activity
After the attack on Sony in November last year, the company had to face new attacks in December after the company computer systems were breached (Barnes & Perlroth, 2014). The latest breach exposed the company’s executive compensation documents and had more movies pirated (Barnes & Perlroth, 2014).
If I was an IT security professional at Sony, I would join a team of other IT engineers at Sony to work with security encryption companies to ensure that more is done beyond having everyone with the same VPN passwords.
Question 3: Security Administration and Access Control
e-Activity
Tang Yan, a former employee at NetEase and now the founder of Momo, a dating application in China was accused of lack of professional ethics in December 2014 (Clover, 2011). Tang violated the labor contract and according to the officials at NetEase, he took advantage of his position at work to gain the data and resources to come up with the application.
References
Clover, C. (2011, December 11). China dating app founder accused of stealing technology. The Financial Times. Retrieved from http://www.ft.com/cms/s/0/9a91e0a6-8121-11e4-896c-00144feabdc0.html
Perlroth, N. (2014, November 5). Malicious software campaign targets apple users in china. The New York Times. Retrieved from http://bits.blogs.nytimes.com/2014/11/05/malicious-software-campaign-targets-apple-users-in-china/?_r=0
Barnes, B., & Perlroth, N. (2014, December 2). Sony films are pirated, and hackers leak studio salaries. The New York Times. Retrieved from http://www.nytimes.com/2014/12/03/business/media/sony-is-again-target-of-hackers.html Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“CIS 333 discussions Coursework Example | Topics and Well Written Essays - 250 words”, n.d.)
Retrieved de https://studentshare.org/information-technology/1673453-cis-333-discussions
(CIS 333 Discussions Coursework Example | Topics and Well Written Essays - 250 Words)
https://studentshare.org/information-technology/1673453-cis-333-discussions.
“CIS 333 Discussions Coursework Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1673453-cis-333-discussions.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF CIS 333 discussions

CIS

...CIS With the imagination of the human mind, racing at the speed of light it is quite evident how it affects the field of technology. Because of the fast paced human thought process, new technologies emerge everyday. Implementing these, technologies in the socio sphere of life bring along its own issues. The widespread use of technology in day-to-day business has forced experts to look into its pros and cons with some insight. The past few years have seen new trends emerging, better and efficient ways to communicate on a personal as well as social level. These boast about the enormous amount of data that can be shared. Nevertheless, along with it has come the intriguing question of "how safe is it to share" (Martinelli,...
3 Pages(750 words)Essay

Discussions

...Discussion Salvation, the of the story by Langston Hughes, means the act of saving something or somebody and closely related to the etymology of this is the word salve, which means something that eases pain or anxiety. Ironically, the contraposition of salvation is what was narrated to us by the writer. While the act of saving should naturally ease anxiety, it is precisely this attitude of worry and nervousness that filled the Langston while he was in church to receive Christ. Aside from the overall tone of the narrative, this claim is very much supported by the author’s repetition of the word “waiting” which he directs to the presence of Christ. Aside from this, he also uses the word “come” recurrently to employ a sense...
2 Pages(500 words)Essay

Discussions

...Discussion 1. The was effective particularly because it has alliteration and because of this it has an attached recall factor to it. 2. After the hook which consists of dramatic descriptions and come-on phrases, the bridge sentence is “You’re probably wondering how you could have possibly mistaken the two genres. 3. This Comparative Essay has an introduction, a body and a conclusion. The body is arranged in a point-by-point format which was effective in emphasizing the similarities between Wrestling and Soap Operas. 4. The writer did employ specific adjectives and verbs to create vivid thoughts. I particularly like his hyphenated adjectives which show his enthusiasm such as “Mr. McMahon is one of those all-bad,...
2 Pages(500 words)Essay

Discussions

...Discussions Topic Leading Health Indicators Leading health indicators are a set of health related topics that are commonly covered by the mass media, thus receiving global and national attention. The leading health indicators are related to the course work because they provide guidance for national health initiatives for specified periods of time. Health sciences are concerned with improving the health of people. These indicators include areas such as access to health care, mental health, substance abuse, violence and injury, environmental quality, responsible sexual behavior, immunization, tobacco use, and physical activity among others. These are related to the course work because they communicate health actions and issues... Topic Leading...
1 Pages(250 words)Assignment

Cis week 5 classwork class discussions

...Risk Management Grade Emerging information technology security threat Data loss This is where companies loose valuable data through theft. Since most companies have confidential information about their customers, it is therefore a big risk if these data fall in the hands of hackers or people with malicious intentions. Internet attack This is a way of embracing technology and by doing this; organizations are exposing themselves to global threats (Horn, 2009). Diligence should be taken to protect both the organizations and the customers. Common response techniques Policies and user education program Most hacking is done through accessing employee’s password. It is therefore that organizations put up policies on how the company’s... Management...
1 Pages(250 words)Assignment

CIS

...Sherry Turkle: Connected, But Alone? Turkle in the TED.com show talks about how technology has transformed the manner in which people communicate today. The traditional forms of communication where people used to talk face to face or through phone calls have been replaced by new forms of technology through use of text messages, social networks and emails. According to her, this transformation has led to loss of genuine real life conversation converting people into robot- like machines. She asserts that there are features of real conversation that can never be replaced by the electronic communication. These features are what connect people as social beings. It is through real conversation that one can express their real emotions... Turkle:...
2 Pages(500 words)Essay

CIS 498 discussions

...Computer Sciences & IT Question Core Skills and Transformational Mind-Set In Robert’s text, he mentions some of the core skillsfor success in chapter 1, which assist IT professionals in organizations. These are skills such as communicating, marketing, collaborating and managing change (Roberts, 2011). IT professionals can use these skills to communicate and reach the organization’s target market which requires system changes. The IT professionals are also in a better position to accept the implementation of information systems because they know how to manage change. It also becomes easier to collaborate with each other when implementing information systems. The mind-set and behavioral changes have an impact on an IT leader’s... Sciences & IT...
1 Pages(250 words)Coursework

CIS 333 Week 10Technical Project Paper

...the system. Encryption conventions need to be executed for encoding the information between the inside and outside frameworks. For giving enhanced functionality to the association, approaches and methodology must be characterized. They assume an essential part for an associations smooth working. So as to actualize strategies and methods, group discussions are needed for developing and executing them in a certifiable situation. The main necessity is to separate them. A security approach contains as an archive or standards that indicate the announcement What must be carried out with a specific end goal to guarantee efforts to establish safety in the framework or the system. Though, methodology is connected with the rules...
8 Pages(2000 words)Coursework

CIS

...CIS Part My experience working for an organization offered new insight and practical involvement in theimplementation of a new system. Participating as part of the software design and development and implementation team, both the functional and non-functional requirements for the system had to be gathered for the organization, Virtusa. The organization is a profit oriented tech-firm that was looking to install a new computer system for its clients. The firm in this instantiated example of the project proves that the failure of the project was due to the requirements deficiencies. The practical case problem presented is that of a software corporation called Virtusa which released a software program application for its...
1 Pages(250 words)Essay

CIS

... College: Computer Programming Preheat the oven to 350 degrees. In a bowl, cream some butter, brown sugar, and white sugar together. Beat in the pudding mix until it is blended (Allrecipes.com, n.d). This recipe step exhibits both a sequence and iteration control structures. The first two steps exhibit a sequence control structure while the last step manifests an iterative approach. 2) 1. Database Administrator - Design and operations of a database 2. Help Desk - End-user oriented 3. System Programmer - Improve mainframe performance 4. Network Manager- Set up and manage network 5. System Operator - Day-to-day computer operations C++ Programming Language C++ is a cross-platform, multi-purpose computer programming language... College: Computer ...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Coursework on topic CIS 333 discussions for FREE!

Contact Us