StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

CIS 333 discussions - Coursework Example

Cite this document
Summary
In my place of employment, encryption is used. This ensures that only those with the right key can have access to the data. Access control lists and implementing and enforcing…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.7% of users find it useful
CIS 333 discussions
Read Text Preview

Extract of sample "CIS 333 discussions"

Computer Sciences & IT Question Providing Security over Data Data confidentiality within a work place ensures that data is not disclosed to unauthorized persons. In my place of employment, encryption is used. This ensures that only those with the right key can have access to the data. Access control lists and implementing and enforcing file access permissions. Data integrity ensures that the data cannot be modified by unauthorized persons. Our I.T department makes use of cryptography to ensure data integrity.

Data hashing guarantees that the original data is received securely. Finally, the I.T department makes off-site data backups and employs redundancy to ensure that data is readily available to authorized persons when required.e-ActivityOne of the biggest attacks on mobile operating systems today as noted by researchers at Silicon Valley Security Company is the malware called WireLurker (Perlroth, 2014). It targets the Apple mobile and desktop users. The malware is designed in a way that unauthorized people can access the data from the devices.

The security company confirmed that this is a malware affecting the Apple iOS mobile users in China (Perlroth, 2014). The devices become infected with the malware if they connect their devices to Macs through the USB wires and in cases where mobile users have altered their devices and installed software that Apple has not authorized.The problem can be solved by informing mobile users in China to install software from trusted sources, to avoid jailbreaking their devices and keeping the iOS software up to date.

Question 2: Risk Management and Malicious AttacksIn china’s case of malware attack on Apple mobile devices it is important for the device users to avoid the risk by not using unauthorized software applications. Users should also prevent the transfer of the malware from the Macs to the mobile devices which occurs when using the USB wire. Users who have altered their devices by jailbreaking or those updating their devices from unknown sites should accept that it is a risk and the consequence is stolen information.

Users of Apple mobiles can mitigate this risk by using the mentioned preventative measures. e-ActivityAfter the attack on Sony in November last year, the company had to face new attacks in December after the company computer systems were breached (Barnes & Perlroth, 2014). The latest breach exposed the company’s executive compensation documents and had more movies pirated (Barnes & Perlroth, 2014).If I was an IT security professional at Sony, I would join a team of other IT engineers at Sony to work with security encryption companies to ensure that more is done beyond having everyone with the same VPN passwords.

Question 3: Security Administration and Access Controle-ActivityTang Yan, a former employee at NetEase and now the founder of Momo, a dating application in China was accused of lack of professional ethics in December 2014 (Clover, 2011). Tang violated the labor contract and according to the officials at NetEase, he took advantage of his position at work to gain the data and resources to come up with the application.ReferencesClover, C. (2011, December 11). China dating app founder accused of stealing technology.

The Financial Times. Retrieved from http://www.ft.com/cms/s/0/9a91e0a6-8121-11e4-896c-00144feabdc0.htmlPerlroth, N. (2014, November 5). Malicious software campaign targets apple users in china. The New York Times. Retrieved from http://bits.blogs.nytimes.com/2014/11/05/malicious-software-campaign-targets-apple-users-in-china/?_r=0Barnes, B., & Perlroth, N. (2014, December 2). Sony films are pirated, and hackers leak studio salaries. The New York Times. Retrieved from http://www.nytimes.com/2014/12/03/business/media/sony-is-again-target-of-hackers.html

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“CIS 333 discussions Coursework Example | Topics and Well Written Essays - 250 words”, n.d.)
Retrieved de https://studentshare.org/information-technology/1673453-cis-333-discussions
(CIS 333 Discussions Coursework Example | Topics and Well Written Essays - 250 Words)
https://studentshare.org/information-technology/1673453-cis-333-discussions.
“CIS 333 Discussions Coursework Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1673453-cis-333-discussions.
  • Cited: 0 times

CHECK THESE SAMPLES OF CIS 333 discussions

Two Vulnerabilities That Have Been Discovered in the Past Two Years (BlackBerry, Cisco IOS Software)

System vulnerability can be identified as the process which traverses owing to a flaw or system susceptibility through which the overall process of the system could be affected or the information could be spread over the network (Antón, 2003).... … The term ‘vulnerability' can be referred as one of the rising issues in the computer security system....
6 Pages (1500 words) Essay

Monetary Policy and Effect of a Decrease of Interest Rate

Monetary Policy Name: Institution: Instructor: Course Code: Answer one: Official cash rate is that rate of interest set by the Board of the Reserve Bank of Australia which is charged on the overnight funds that are borrowed or lent between financial institutions.... hellip; This implies that it is that rate which is charged by financial institutions in Australia's banking sector to other banks for overnight loans....
6 Pages (1500 words) Essay

Benefits and Disadvantages of Fast Food

This paper will speak about the term fast food which means a convenient food, prepared quickly and served probably in a food restaurant.... The foods termed as fast food may include pizzas containing cheese, French fries and fried chicken.... hellip; According to the paper this type of foods, often contain high fat content, low fibre and are not nutritious, in a addition to being served with soft drinks considered to contain high sugar level....
4 Pages (1000 words) Essay

Democracy Development in Iraq

The dominant view of the US politicians was clearly expressed in President George W.... Bush's statement “All Iraqis must have a voice in the new government, and all… In the eyes of numerous proponents of spreading democracy on the Iraqi soil Iraq is supposed to become an example to follow (a “City on the Hill”) for the rest of Arab states in the Middle East and other regions of the However, there is also considerable number of those politicians and scholars whom believe the task of achieving democracy might be too difficult or even impossible for Iraq....
8 Pages (2000 words) Essay

Biological Identifications Through DNA Bar Codes

This paper outlines that DNA barcoding is a standardized method of identifying the organism by using small segments of their DNA.... Essentially it is a DNA based identification method which among provides a more advanced species identification as compared to the traditional species identification....
2 Pages (500 words) Lab Report

Analysis of Disaster Recovery Planning

… The paper "Disaster Recovery Planning" is an excellent example of a literature review on information technology.... The company that has been chosen for the identification of an IT problem is a software house.... This software house offers a number of products in the area of ATM and banking solutions....
3 Pages (750 words) Essay

Structure for Intelligence-led Policing

The current research paper "Structure for Intelligence-led Policing" discusses how the intelligence-led policing can lead to the enhancement of the duties of the police.... nbsp;The work of the police is extremely important for national and personal development… Crime preventions and law enforcement are two very important practices that ensure the safety and security of the populace....
12 Pages (3000 words) Research Paper

Individual Differences Associated With Drink and Drug Use

The paper "Individual Differences Associated With Drink and Drug Use" states that The Reinforcement Sensitivity Theory constitutes inferences for the salience for negative and positive results of consumption of alcohol.... It increases the value of the theory as an important tool.... hellip; A review of literature on risk factors associated with drug and substance abuse finds most of the work focusing on sensation seeking....
8 Pages (2000 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us