Nt1310 Unit 3 Research Paper

Improved Essays
Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks. In the year 2008, the Comprehensive National Cybersecurity Initiative (CNCI) was formed and it was to ensure the US is able to defend itself from immediate threats should they occur and to be able to educate the government.
The Building Blocks of a Computer Network The description of a building block of a network will be explained by the description of one from a shore command in the Navy. First one would need a computer
…show more content…
Internet browsers on a daily basis are vulnerable if they are not updated on a routine basis or when there is a new update from their creators. Take for instance Internet Explorer, there was a Washington Post articles in 2014, which explains how Microsoft pushed out an update to prevent the browser from the possibility of being hacked. As you can see if someone can have the means to hack Internet Explorer, they can also hack the others. Hackers have the capabilities of hacking and gaining access someone computer without them even knowing they have been attacked. This gives the hacker the power to access the webcam and look at the person who is logged onto the computer or laptop. The hacker can also gain access to the files saved on the hard drive and share them with others in

Related Documents

  • Decent Essays

    ITM 301 Lab & Assignment 2 Deqa Yusuf Student #:500566949 Part A: Both CAT5 and CAT5e are UTP cables but the difference between these 2 cables is the quality. CAT5 has a 100 MHz signaling while CAT5e can have a signaling rate of up to 350 MHz. Not only that but the wiring is different as well, the CAT5 has simple wiring while the CAT5e has copper wiring. In short the CAT5e is a much more advanced cable compared to the CAT5.…

    • 403 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    1. Name two creatures that have been discovered since you were born. Titi Monkey and Dumbo Octopus have been discovered since I was born. 2. How tall would a redwood be compared to you right now?…

    • 317 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    ASSIGNMENT 1 OF PLATFORM TECHNOLOGIES PREPARED BY: - TEACHER: - PRAMOD GAJUREL (MIT173707) ANUJ NEPAL B-Q1 a) Answer: - b) c) B-Q2. 1) Answer: - The following are the component shown in the picture: - 1) DRAM Memory sot 2) Chipset 3) Serial ATA (SATA) 4) BIOS 5) Ethernet controller 6)…

    • 727 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 1 Final Paper

    • 456 Words
    • 2 Pages

    ii. Give the id the absolute minimum privileges necessary to host the site on the web server. For example, it’s more likely than not read access to the website itself, write access only to folders updated by the web site, etc. iii. Change IIS so that the domain account is utilized to run the application.…

    • 456 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 9 Final Paper

    • 354 Words
    • 2 Pages

    HIE provides the capability to electronically move clinical information among disparate healthcare information systems, and maintain the meaning of the information being exchanged. (HIMSS Dictionary of Healthcare Information Technology Terms, Acronyms and Organizations, Third Edition) 11)) 1) 1. What sorts of HIEs are there? 2. How are protection and security of patient wellbeing data guaranteed?…

    • 354 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Describe 3 ways a hacker can try to intrude a system. To protect from unwanted intrusion, viruses or hacking, we should consider the following points: Antivirus protection: This program scans our computer from any miscellaneous files or viruses and delete them or to move to quarantine. There are lot of antivirus available in market. Move rover most of ISPs also provide antivirus.…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 9 Final Paper

    • 922 Words
    • 4 Pages

    MidTerm Exam Question 1 Cloud computing is open space where you can place all our music and videos at one place. We can listen to the music, play video games and watch videos from anywhere and not necessarily connect to the computer. So, after turning off computer we can listen to music and watch videos through other device. Question 2 (c)…

    • 922 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1 Term Paper

    • 510 Words
    • 3 Pages

    Components: Components are all the parts that make up a computer. Components include software and hardware. Proxy server: A proxy server is basically an server that bridges the gap between you and the internet. When you have proxy up and running the other computers from the internet cannot see your IP address so it covers you in something known as an internet camouflage. The computers can only see the proxy's IP.…

    • 510 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Introduction Often, team members of both Apple and Microsoft convocate to ameliorate the upcoming operating system that they plan to release in a certain period of time. Many different features are added to technology each day to facilitate the use of it. For example, Cortana (the Windows Phone Assistant), the Snap Assist feature on Microsoft, and Phone Companion are qualities that aid the success of an operating system. In Apple, features such as Control center, Task manager and fingerprints contribute to the success in IOS Seven. I will be discussing the advantages of Cortana (the Windows Phone Assistant), the Snap Assist feature on Microsoft, and Phone Companion.…

    • 682 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Final Exam Paper

    • 233 Words
    • 1 Pages

    21 Which operating system doesn't support networking between computers? a. Windows 3.1 b. Windows 95 c. Windows 2000 d. Windows NT 22Which Operating System doesn't support networking between computers? a. Windows 3.1 b. Windows 95 c. Windows 2000 d. Windows NT 23…

    • 233 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Hackers/Crooks have put hard working people in hardship by ruining their credit causing them to be unable to buy a home or even getting hired on at a job. They have been known to steal credit card numbers from websites, breaking into homes or digging into the trash to retrieve personal information, and an employee you work with that takes a look at your personal file(Federal Trade, National and State, Consumer Sentinel, 2013).Though the internet is one of the main ways identities are stolen, they will pick-pocket you, steal your mail right out of the box, your tax information, and even obtaining medical services(Cassim, 2015).…

    • 105 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    By then they have to go a computer repair place and shell out big bucks to fix whatever problem may have occurred. There is a solution to this problem however, and it is called spyware removal software. There are several insecurities on your computer when you first buy it, and if you dont do anything about it, you are allowing yourself to be exposed to countless infections. By keeping yourself exposed, you give access to multiple hackers who can turn your life into a complete nightmare. Once a hacker is into your computer, they are…

    • 522 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Situational Tracking

    • 649 Words
    • 3 Pages

    It starts by talking about the building blocks of a Network and how they are classified: PAN, LAN and WAN. The chapter also talks about how everything in your house is connected via your network. Furthermore, WiFi and Bluetooth are also covered in the chapter which is useful because it is something most of us use in everyday life. Networks can be used to do a variety of things from allowing you to access one device while using another and sharing files between devices in a network. It is because of these technologies that you can control your home from work or…

    • 649 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Cyber Attacks Research Paper

    • 2349 Words
    • 10 Pages

    in his A Short History of Computer Viruses and Attacks 2003, said that hacking activities of computer systems started as early as late 1970s which followed into the 80s as computer viruses and worms were developed that could attack computers and result in crashing of systems and softwares. In the 80s also saw the fast rise of hackers into the world as many would infiltrate computer networks and they would successfully code through security. It is reported that during the 80s and most specifically 1983 saw cyber hackers crack through government networks in the U.S. and they were reportedly using home based computers. It was in 1998, that over 500 computers belonging to the U.S. government and military sectors were taken over by hackers where this event was later known as “Solar Sunrise.” The attack was an indication to the government particularly the Department of Defense of the extent to which an attack could be executed by adversaries having better resources and skills.…

    • 2349 Words
    • 10 Pages
    Great Essays
  • Improved Essays

    As people use smartphones more and more it is crucial that the smartphone keeps being safe. Important is to distinguish the ways security could be compromised. iOS jailbreaks for example, are bad for third party app developers and Apple since it enables users to download apps for free. However, in this chapter we will look for the security issues that are bad for the user, not for the companies. As there is a restriction as to how much we can cover here, we will only cover some the most important issues: permissions, lighter browsers, unofficial apps, network spoofing and data density.…

    • 787 Words
    • 4 Pages
    Improved Essays