What kinds of cyber-attacks have you experienced?

 Description These are the assignment requirements Fully explain each of the following: What kinds of cyber-attacks have you experienced? Have you had a computer that was infected with a virus? Have you been unable to use a site by experiencing a DoS attack or downloaded spyware or a Trojan horse? Have you fallen for a phishing scheme? What do you do to secure your information on the Internet? How many passwords do you use? Why? What are the pros and cons of symmetric versus asymmetric encryption algorithms? What issues must be considered when deciding what kind of encryption to use? Imagine a networked embedded system attached to your air conditioning system. This system permits the power company to raise the thermostat, or cycle the system on and off when energy demands are high. If every household had such a device, what might be the ramifications of a cyber-attack? Do you believe that “hackers” who do things like expose the identity of rapists are White hats or Black hats? Regardless of the law, do you feel they are being ethical? Are they being moral? Is it right for them to be sentenced to a longer jail term than the individuals they uncovered? Use the ethical tools from the chapter to discuss the ramifications of electronic medical records. Suppose that there was a nationwide database of electronic medical records, with strong security to try to prevent unauthorized access. What would be the benefits and costs of such a system? Apply the “paramedic method” to analyze this subject. Compare the different ethical approaches discussed in the chapter. How are they similar and how different? How might you choose the best approach for a given situation? What efforts, if any, do you make to preserve your privacy online? Do you share images, videos, and postings publically, or do you limit access? Why have you made the decisions that you have about personal information online? What might you change in the future? Discuss the propagation of fake news. What are some methods of combating it? This assignment should take between 7 to 8 pages not counting the cover page and reference page. Additional Resources News article about new approaches to authentication: http://www.networkworld.com/research/2007/060407-multifactor-authentication.html Article about distributed denial-of-service attacks: http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_7-4/dos_attacks.html Take an entire MIT course online to learn about system security: https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-858-computer-systems-security-fall-2014/index.htm TSI (European Telecommunications Standards Institute) website about lawful interception: http://www.etsi.org/WebSite/Technologies/LawfulInterception.aspx EPIC (Electronic Privacy Information Center) website: http://epic.org/ Philosophy website about computer ethics: http://plato.stanford.edu/entries/ethics-computer Kean University Cyber-Ethics: http://www.kean.edu/~schandle/Students/DCuento/Teaching.htm

#kinds #cyberattacks #experienced

Table of Contents

Calculate your order
Pages (275 words)
Standard price: $0.00

Latest Reviews

Impressed with the sample above? Wait there is more

Related Questions

Go to the website using this link:

Go to the website using this link: Click the Play button to start the game. Follow the instructions. They will lead you on a search

New questions

Don't Let Questions or Concerns Hold You Back - Make a Free Inquiry Now!