Discussion Reply!!! About 75 words

 

Part 1: Security Threats

  • Provide an example of at least one security  threat.  This can be an actual threat to an organization.  It can be an  example of a “what-if” scenario.  Discuss at least one way that this  threat could have been minimized or prevented. 

One major security threat that the world is dealing with on a  daily basis is phishing. Phishing is where scammers send emails that  appear to be legitimate but the link actually takes you to a malicious  website. Using the fake website, the scammers trick you into giving  sensitive information (TestOut LabSim, n.d.). Based  on the Federal Bureau of Investigation internet crime report for 2021,  page 22, Phishing claimed the most victims, reporting 323,972 victims,  than any other crime type (Internet Crime  Complaint Center(IC3) | Annual Reports, n.d.). Protecting yourself from  phishing comes down to educating yourself and analyzing your emails.  Make sure that the emails are legitimate by reading carefully and  verifying the web address. “Hold your mouse over the link and it will  show you the website it’s linked to” (TestOut LabSim, n.d.). Before  putting in any sensitive information make sure the website is  legitimate. If you have any doubts contact the company to verify.  

Part 2: Mobile devices

  • Compare desktops to laptops, tablets, and  smartphones using best practices related to security. Discuss the best  practices that you use or plan to implement on your mobile device(s).

Computers and cell phones have come a long way in just a few  short years. You can now perform the same task on your smartphones as  you can on your computer. It’s no longer just calling people but the  ability to send and receive emails, surf the web, use apps and work from  anywhere has only grown. With the increase of abilities comes the  increase of vulnerabilities. It has been embedded into us to keep  antivirus software or firewalls on our computers. Though most don’t  think the same way with our mobile devices. A lot of people never update  their phones or apps until they are forced to. They don’t think about  them the same way they do with computers (Platsis, 2019).  What makes that worse is that people keep more sensitive information on  their phones for convenience. From storing credit card information to  saving all of their passwords right there on your phone, the personal  information vulnerable to attackers are huge. With mobile devices being  just that, mobile, we are taking these devices filled with this  information everywhere with us. Exposing and increasing possibilities of  attacks, especially when we have settings set to connect to any  available WIFI connections. Add to the fact, unlike most computers, our  smartphones are almost always on, sending and receiving data constantly  (Platsis, 2019). Our desire to increase convenience and speed have  decreased our thoughts on security and privacy. Even “many companies  have not implemented basic best practices for mobile security” (Platsis,  2019). This leaves a gap for attackers to use, bypassing their other  security measures (Platsis, 2019). Some security methods that mobile  devices offer that most desktops do not are multifactor authentication  measures, having face or fingerprint recognition as well as a password.  With these measures and being proactive, we can decrease the  vulnerabilities mobile devices present. Examples of being proactive  include using strong passwords (including upper and lower case letters,  numbers and words not found in the dictionary), rotating those  passwords, distrusting the web and viewing every email with suspicion  (TestOut LabSim, n.d.).

Resources

Internet Crime Complaint Center(IC3) | Annual Reports. (n.d.). Www.ic3.Gov. https://www.ic3.gov/Home/AnnualReports (Links to an external site.)

Platsis, G. (2019, April 19). Mobile Security Versus Desktop and Laptop Security: Is There Even a Difference Anymore? Security Intelligence; Security Intelligence. https://securityintelligence.com/mobile-security-versus-desktop-and-laptop-security-is-there-even-a-difference-anymore/ (Links to an external site.)

TestOut LabSim. (n.d.). Labsimapp.testout.com. Retrieved July 10, 2022, from    https://labsimapp.testout.com/v6_0_503/index.html/productviewer/242/13.13.1/c0c5d48b-b9d9-4933-a9c9-9003f41e62f7 (Links to an external site.)

DSBDA W 15 A

 Limitations of Blockchain and Emerging Concepts.Blockchain continues to be deployed into various businesses and industries. However, Blockchain is not without its problems.  Several challenges have already been associated with the use of this technology.  Identify at least 5 key challenges to Blockchain. Additionally, discuss potential solutions to these challenges. Lastly, please discuss if we will see the limitations to blockchain be reduced or mitigated in the future.  There are several emerging concepts that are using Big Data and Blockchain Technology. Please search the internet and highlight 5 emerging concepts that are exploring the use of Blockchain and Big Data and how they are being used.Conclude your paper with a detailed conclusion section which discusses both limitations and emerging concepts. The paper needs to be approximately 6-8 pages long, including both a title page and a references page (for a total of 8-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.Your paper should meet the following requirements:

  • Be approximately seven to ten pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course, the course textbook, and at least ten scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing

dq computer

 

  • Describe how an operating system interacts with applications and hardware.

answer in  4 to 5 line.

Healthcare Networking and Security

1. Design a detailed disaster preparedness for the network of a 120 inpatient bed facility.

2. Using the core functions of the National Institute of Standards and Technology (NIST) framework, design a security plan on how to better protect the facility’s cyber security above.

3. Using draw.io, design a network topology to include a DM and explain 2 security implications of the DMZ.

Note: You MUST have a cover page with all the details for a standard paper. All your citations and references MUST be properly formatted in accordance with the latest APA standards. Your work MUST to logical, technical, and reflective of graduate writing.

module 6

 

Explain the risks that most IT departments would need to be concerned with, detailing at least three examples of risks that are possible. In the conclusion, explain how you will use this information in your current or future job.

Your assignment should meet the following requirements:

  • 3-4 pages long, not including the cover page and reference page.
  • Conform to APA Style.
  • Support your answers with at least one current scholarly journal article (not more than five years old). The Rasmussen Library is a great place to find resources.
  • Clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing. If you need assistance with your writing style and APA format, start with the Writing and APA guides at the Rasmussen Library.

Blockchain – Discussion

This week’s reading introduced an overview of blockchain security. Create a new thread, and describe how you would go about ensuring the security of data stored on a public blockchain. Assume that your blockchain app is one that manages prescription drugs for individual patients. Considering each of the elements of the CIA triad, describe how you might protect the blockchain data security. Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read or videos you watched from this week’s assigned activities. You’re not trying to test each other, but you are trying to start a discussion.

You must do the following:

1) Create a new thread. As indicated above, create a new thread, and describe how you would go about ensuring the security of data stored on a public blockchain. Assume that your blockchain app is one that manages prescription drugs for individual patients. Considering each of the elements of the CIA triad, describe how you might protect the blockchain data security. Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read or videos you watched from this week’s assigned activities. You’re not trying to test each other, but you are trying to start a discussion.

2) Select AT LEAST 3 other students’ threads and post substantive comments on those threads. Your comments should answer AT LEAST one of the questions posed in the thread and extend the conversation started with that thread. Make sure that you include the question in your comment so I can see what question you’re answering.

ALL original posts and comments must be substantive. (I’m looking for about a paragraph – not just a short answer.)

Management and information systems

  

The research project is a research-based paper on a current Management of Information Systems topic, to be approved by your instructor.

You will develop your research project in stages throughout the course, including selecting a topic, submitting an abstract/outline, presenting draft project (paper) for instructor review and feedback, and submitting your final project (paper) for evaluation.  You must support your materials by using at least five appropriate, properly cited sources in addition to your course textbook. Your project (paper) will comprise 1500 to 2000 words (not including title and reference pages).  Your project (paper) must be formatted according to APA guidelines as a Word document, double spaced, Times New Roman, 12-font, with one-inch margins.