Computer security

    Page 3 of 50 - About 500 Essays
  • Costco Firewalls: A Case Study

    As part of the overall risk model, we have already illustrated the threats and attacks that are possible on the Costco’s IT infrastructure with the likelihood of attacks that can exploit the identified vulnerabilities, which may eventually pose an extensive threat to the Costco’s operations including missions, functions, image, and reputation as well as to the organizational assets, linked organizations, and the consumers. Costco’s privacy policy clearly enunciated the significance of customer’s…

    Words: 1380 - Pages: 6
  • Dead Poets Society: Privacy Management Theory

    The concept of self-disclosure is best explained and illustrated through Privacy Management Theory. In a basic sense, Privacy Management Theory explains how people treat personal information, what conditions affect self-disclosure, and why people choose to self-disclose information in a relationship (Guerrero, Andersen, & Afifi, 2014). The two guiding principles of the theory are that people have “ownership” of and create “boundaries” for personal information (Guerrero, Andersen, & Afifi, 2014).…

    Words: 1844 - Pages: 8
  • The Pros And Cons Of GPS Technology

    customer requests. Wireless computers. Once upon a time, business people on the move had to hook into Ethernet connections to get online from the road. Now laptops have built in Wi-Fi and gives business people can connect easily from coffee shops, hotels, home, offices, book stores and client sites. This has given is a big improvement to business efficiency since research, invoicing, email and project development can easily be handled without the need return to a desktop computer at the main…

    Words: 1162 - Pages: 5
  • Analyzing The Movie 'Nerve'

    through your phone or computer. The game will last 24 hours; the first and the second place in the game would be in the final round. The Nerve is a movie…

    Words: 774 - Pages: 4
  • Think Like A Hacker Analysis

    of the highly sought profession in the technology industry. Knowing that hackers are highly intelligent people who derive pleasure in manipulating technology to do what they are not intended to, they can be very helpful in different industry where security important. As a typical hacker, you would want to know how technology work, and why they perform certain functions. Should you think like a “black hat”, “white hat”, or “grey hat” hacker? Honestly speaking, a typical hacker might be very good…

    Words: 803 - Pages: 4
  • Decorator And Strategy Patterns Case Study

    Aritra Chatterjee Assignment #9 – Design patterns Date: Nov. 11, 2017 Compare and contrast the use of Decorator and Strategy patterns in two practical scenarios Introduction Decorator pattern – “Attach additional responsibilities to an object dynamically. Decorators provide a flexible alternative to subclassing for extending functionality” [1]. Decorators are transparent to the component they are decorating, that is, they allow augmenting the existing functionality of a component at…

    Words: 1709 - Pages: 7
  • Example Of Venmo Privacy Concerns

    that a lot of my settings had changed,” he says. A colleague and I were able to duplicate this lack of notification with a quick test: Venmo doesn’t alert you if your password or email credentials change from within the account. “There are basic security holes that you could drive a truck through,” Chris said. (Griswold, 2015) Chis continued to have trouble as he attempted to figure out how to contact Venmo and attempt to get his money back. He found that there is a $50 liability if the fraud is…

    Words: 834 - Pages: 4
  • Chevron Case Study

    Discussion Points 1. Do some Internet research on Chevron’s use of seismic imaging technology? Briefly explain how it works and how it has helped Chevron discover new oil and gas reservoirs. Seismic waves are used to study earthquakes. Seismic imaging technology is widely used to explore underground oil and gas reservoirs by sending sound waves by ultrasensitive device, geophones which detect the appropriate location of oil and gas. This technology is successful in tapping the locations for oil…

    Words: 789 - Pages: 4
  • Legal Case Study Of Officer Johnny's Ethical Dilemmas

    Officer Green will represent the best friend of fifteen years to Officer Johnny. Officer Johnny will represent himself, the police officer who is working an unauthorized security job with a firm. Officer Green and Officer Johnny are both assigned to work patrol on the midnight shift and have been together through thick and thin over the last fifteen years. In the scenario provided Officer Johnny is described as being a great police officer, who gives back to the community regularly. Officer…

    Words: 1381 - Pages: 6
  • St. Jude Medical Case Study

    The Food and Drug Administration (FDA) confirmed that certain implantable cardiac devices of St. Jude Medical have vulnerabilities that let the hacker access a device. The devices, such as defibrillators and pacemakers are used to control heart functions and prevent heart attacks. The penetrable devices under FDA’s warning are the Merlin@home Transmitters made by St. Jude Medical, which are the part of the home monitor. Pacemakers and other implanted cardiac devices use a wireless RF signal to…

    Words: 251 - Pages: 2
  • Page 1 2 3 4 5 6 7 8 9 50

Related Topics:

Popular Topics: