Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

ISSUE – Cybersecurity threat I. Issue/Event: For this section of your presentation, you will introduce the issue/event and how it relates to issues of technology and any of the topics that have been...

1 answer below »

ISSUE – Cybersecurity threat
I. Issue/Event: For this section of your presentation, you will introduce the issue/event and how it relates to issues of technology and any of the topics that have been discussed in the course.
1. Using appropriate research strategies, describe a social or global issue/event that is related to issues of technology.
i. What is the origin of the issue?
ii. What is the issue about?
2. Using appropriate research strategies, describe the impact of the issue or event on society.
i. Whom is impacted by the issue?
ii. What is important to know about them?
3. Using relevant research or diverse perspectives, assess how society impacts the chosen issue.
II. Yourself: This section of your presentation explores how studying technology influences your individual framework of perception with respect to your discipline of study or profession.
1. How has critically analyzing your issue/event in technology informed your individual framework of perception? Consider how it has altered the way you perceive the world.
2. How can critically analyzing technology influence your field of study or profession? How can studying technology inform your understanding of the next big topic of study in your field or profession in the next five to ten years?
III. Society: This section of your presentation explores how studying technology enhances your ability to engage constructively in society.
1. How does critically analyzing technology add value to how you interact with people and understand social or global issues or events? Supplement your reasoning with examples.
2. Recommend strategies for using this kind of critical analysis for meeting your personal and professional goals. What might this look like in your everyday life? Consider how technology can be used to address the day-to-day responsibilities or questions faced by practitioners in your field or discipline.
IV. Conclusion:
1. Using relevant research or diverse perspectives, assess the benefits and challenges of addressing issues in technology.
2. Explain how critically analyzing technology adds value to interactions with people in personal and professional contexts.
Answered 2 days After Feb 02, 2022

Solution

Nimmi C answered on Feb 04 2022
111 Votes
Cyber security threat
I. Issue/event
For this section of your presentation, you will introduce the issue/event and how it relates to issues of technology and any of the topics that have been discussed in the course.
1. Using appropriate research strategies, describe a social or global issue/event that is related to issues of technology.
a. What is the origin of the issue?
The advances in technology and its use has always been a great advantage to our society in every walk of life. On the contrary, the chances of cyber security threats are also on the rise. Most common among such threats are acquiring personal and sensitive information regarding individuals, companies, novel technologies or a nation itself by the use of some malware. The most vulnerable part of a system is usually exploited by the attackers for the purpose. As a majority of this vital information are in digital format, the end effects of such attacks are always disastrous. Moreover, such kind of attacks is always cheaper, convenient and cheaper than physical attacks and does not possess any geographical constraints.
. What is the issue about?
Normally cyber attacks are ca
ied out using some malware like viruses, bots or Trojans and the confidential information of the sole owner or creator are accessed without their consent. Such attacks are generally transmitted via an infected USB to the connecting systems, or by opening an infected file or an infected website. The defense strategies to avoid malware include firewall and anti-virus software. The intention of cybercriminals may be the destruction of data or economic benefits. Intruding into an information exchange that is not properly encrypted is also another cybercrime. Attacks by accessing an individual’s password and denial of service by creating false flooding in transmission channels also add to the list of cybercrimes.
2. Using appropriate research strategies, describe the impact of the issue or event on society.
a. Who is impacted by the issue?
In a survey conducted across 24 countries, about 69% of the adult population faced some sort of cyberattack in their life. Also, a good percentage of the world population is using some kind of social networking site where we share life updates, interests, location etc. These all can be used adversely by cyber attackers. Also, they can trespass into the friends' list and can spread spam or malware content at a faster pace. Likewise, some mobile applications can also be a medium for cyber attacks. Recent action by various countries to ban certain mobile applications that are suspected to threaten national security can be recalled in this instance. Thus, from a normal citizen ca
ying a smartphone, to an industrial resource person handing sophisticated process control systems, to the superiors of a country’s defence system, everyone is vulnerable to a cyber attack and the adversities that happen are quantified by confidentiality and reproducibility of the information.
. What is important to know about them?
The momentum of a cyber attack is determined by the cost of restoration of the attacked system and the lost data. Cybercriminals can be the insiders of an organisation who is well aware of the design and architecture of the system. A mere...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here