Case Study On Cyber Security

Superior Essays
As from the previous case study, each friend decided to purchase a laptop for themselves. In which they will be using Wi-Fi network from home, school and when they are working from restaurants that have free Wi-Fi hot spots. Each network might seem a reliable and secure way to navigate the internet, but at times there can be a risk from a malicious website where a person’s identity can be stolen. The intruder can access someone’s device from many things such as downloading a file from the wrong website, or even being connected into a Wi-Fi hot spot, thinking that it is from the restaurant. Now I will explain the following concepts that can help secure and maintain a computer. First I will talk about why cybersecurity is an issue, we need to …show more content…
Also, knowing how to keep the software up to date can help getting updates with newest secure ways to keep the computer save, lastly how to maintain the computer system which consists of having a plan schedule routine and a non-routine computer systems maintenance, a schedule can be planned to set a specific time where the computer can update itself when the person is not using it.
Cyber security has been an issue since the creation of computers and the internet. Today we mostly rely on computers and internet, to communicate, as entertainment, for transportation, shopping, medicine, and so the list goes on (Clemson). Most of the personal information is used for these reasons or needed for another work that are
…show more content…
The computer can be set up to automatically update itself but at times some computers doesn’t have that feature. So, the person can use a program to remind the user to update or to check if there’s any updates available. Maintaining a computer can really help having a good, fast, and reliable system to navigate in. Among many electronics such as the computer, lithium-ion battery is the most used. As so, many problems have surged from such batteries, such as the life-cycle cost. So, it is necessary to have a track of how the lithium-ion batteries are preforming. To address the issue, it proposes a run-time reconfigurable computing system, which is a “dynamic partial reconfiguration technology and customized computing circuits to balance the hardware occupation and computing efficiency” (Shaojun, Wang). Also, “from a system design point of view, the estimation of the remaining cycle life and assessment of the health state can be used for control reconfiguration and mission replanning to minimize mission failure risk, improve the system availability, and reduce life-cycle cost” (Shaojun, Wang). As said above, it always necessary to keep up with the updates and make sure to have a scheduled routine, to keep on check how’s the system is

Related Documents

  • Improved Essays

    Also, the correct internet browsing security configuration setting should be implemented on the end users laptop to allow first party cookies, and blocking the third party cookies from other websites to protect from tracking and advertisements. By hardening it means that “Protection is provided in various layers and is often referred to as defense in depth. Protecting in layers means to protect at the host level, the application level, the operating system level, the user level, the physical level and all the sublevels in between” [1]. The best practices recommends that the antivirus program should be scheduled periodically to monitor any…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    Cyber Ark is an enterprise application cyber security company based in Israel with offices worldwide. The United States headquarters is in Newton, MA. with regional sales offices in Ft. Lauderdale, Houston, Las Angles and Chicago. The company is well known in the IT Security Company with a quality product designed to secure data in the enterprise as well as the cloud.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    In an era where some of the biggest damage is done by simple keystrokes, cyber security is an essential part of any organization, whether big or small. The purpose of this report was to gather information regarding The University of Texas Health Science Center at San Antonio (UTHSCSA). Through proper use of research, network scanning, and social engineering the team was able to obtain valuable information regarding the infrastructure, policy, intellectual properties and the security of the Health and Sciences center. The Team would be able to analyze all the findings and point out key the interfaces that may potentially be impacted as well as the key threats and vulnerabilities. These findings were to be given to executives at the Health and…

    • 1298 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Cyber Terrorism Case Study

    • 1053 Words
    • 4 Pages

    Chemical Corps. The Road Travelled The Civil Support Team Asymmetric Engagements aren’t a new topic for the United States. Since the early part of the 1960’s America has had to deal with this threat in some form or fashion. Civil disturbances of the 1960’s, the frequency of terrorist acts in the 1970’s, illegal drug use in the 1980’s.…

    • 1053 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Dreamliner Research Paper

    • 535 Words
    • 3 Pages

    They are used to start the engines and auxiliary power units, to provide emergency backup power for essential avionics equipment’s. Moreover since the Dreamliner relied more on the electricity it required much more battery. The batteries used in the Dreamliner were similar to those that are used in laptops, smartphone’s and tablets. Dreamliner’s used the cobalt oxide battery. The main reason these batteries were selected was because of its high energy content but the major problem is heat.…

    • 535 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    ENGINEERING TECHNICAL DEFINITION PAPER Name Institution Date Annotated bibliography Harknett, R. J. and Stever, J. A. (2011), The New Policy World of Cybersecurity. Public Administration Review, 71: 455–460. doi: 10.1111/j.1540-6210.2011.02366.x…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Laptops are really convenient in many ways, they allow you to take your work with you everywhere you go, especially with the great invention of personal hotspot and ebooks. However, it…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Outlook: American intelligence has grown significantly in the last 20 years. As technology keeps evolving, so will the Intelligence community (IC). With this technology advancement will come vulnerabilities, these vulnerabilities will be exposed and the IC will become stronger and wiser from experience. Computers is a significant vulnerability to the country want will be the place where the next significate war will be fought, because computer are such a vital part of daily life. Computers are woven into every aspect of life form government operations to controlling traffic lights in a city.…

    • 638 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Contrasting Acts of Terrorism The very mention of the words terrorism and terrorist incites a variety of negative emotions for most people. An individual’s dread of bodily harm or worries about the condition of the state creates a condition of extreme fear. (Levav) There are two very different aspects of terrorism affecting our world today.…

    • 1292 Words
    • 5 Pages
    Superior Essays
  • Decent Essays

    Cyberattacks have become one of the biggest threats facing the United States today. Although Bill Clinton, George Bush, and President Obama have passed laws and put forward executive orders; cybercrime is still a prominent threat to our country. Obama further extended Bush’s Patriot Act through executive orders, improving the security to sixteen sectors by providing more in order to prevent future breaches and threats. Cybersecurity has become a prominent issue in politics and how our government reacts to cyber threats. The stakeholders from a political lens focus on how cybersecurity affects our government.…

    • 293 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    The Department of Homeland Security 2014 Quadrennial Homeland Security Review outlines six major challenges that America is facing and will face over the next few years. Those six challenges include: the terrorist threat, cyber threats, biological concerns, nuclear terrorism, transnational criminal organizations and natural hazards (DHS, 2014, 28). The focus of this paper is to address the nature of cyber threats and cyber terrorism in America. When Americans think of the word “terrorism”, most think of the public acts that are carried out against American citizens and broadcasted worldwide. A few that come to mind are the attacks in New York on September 11th and the Boston Marathon bombing in 2012.…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    They’re several ways to prevent vandalism one would be to the use of real time location systems for high-risk or high-value items, as it permits the user to constantly know the locations of their hardware. This, is an expensive form of protection, it is typically used by establishments with hardware to protect. Also to install mini-security systems for mobile devices, such as a shutting down of the device or sounding an alarm if the device moves outside a certain distance. One of the greatest ways to prevent invaders from getting into your computer is to apply patches and other software fixes when they become available. By regularly updating your computer, you block outsiders from being able to take advantage of software flaws that they could otherwise use to break into your system.…

    • 2603 Words
    • 11 Pages
    Great Essays
  • Improved Essays

    During the 1980’s the Internet grew exponentially, one reason included the various technical innovations such as more powerful and affordable computers and hardware that made the Internet more accessible to organizations, educational institutions and individuals. In the last 10 years, there has been a spike in the number of mobile devices and personal computers within a household, which aided with the widespread use of the Internet…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    It is environmentally sustainable to use of computers and related resources…

    • 1228 Words
    • 5 Pages
    Great Essays
  • Great Essays

    A literature review allows a researcher to present the findings and viewpoints of other researchers in order to build on existing knowledge (Onwuegbuzie, Leech, & Collins 2012). This allows the researcher to build a solid foundation in which to further sustain their work and demonstrate the credibility of sources used. By the use of Google Scholar, EBESCOhost and proQuest I reviewed the literature pertaining to cyber awareness, cyber security, cyber attacks, the economic fallout from cyber attacks and the state of businesses taking preventative measures. Furthermore, I reviewed the literature based on the need for individuals to concern themselves with cyber awareness.…

    • 2302 Words
    • 10 Pages
    Great Essays