Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Protecting information resources as well as data communication delivery is one o

ID: 3912334 • Letter: P

Question

Protecting information resources as well as data communication delivery is one of the greatest concerns for information systems managers. Information can be delivered anywhere and anytime. Some common threats to resources and delivery are rogue access points, DOS attacks, social engineering, viruses, worms and phishing. As an information systems manager, you will want to address these issues and maintain control providing rapid responses as often as needed. One avenue is to use CERT teams, implement fault tolerance, password strategies, encryption measures and many others discussed in the text. What types of networks have you used? What are some experiences you have had concerning the common threats listed above? How does a network topology affect data communication? Your discussion(s) should be addressed from a manager’s perspective as well as personal experiences as related to the information above as well as the videos. Your submission must be a minimum of 250 words.

Videos can be found on YouTube

1.Identity Theft Prevention – ID Theft Facts and Figures Duration: (2:20) Kaspersky Lab Published on May 18, 2016

2. Social Engineering Attacks Duration: (2:24) Sophos Published on Nov 27, 2012

3. AnyCell Connectivity - A New Vision for Mobile Networks Duration: (4:04) ADVA Optical Networking Published on Feb 18, 2014

Explanation / Answer

Types of network that I have used are generally LAN (local area network) which is generally found in educational institutions,hospitals,offices etc. WAN (wide area network) is the usuall internet that we use in our day to day life to connect accross the globe. some common threats are:

1)Many a times we are redirected to some websites which are not addressed by https but simply http. It is advised not to visit such sites.

2)Apart from this many websites ask for certain softwares to be downloaded, these are usually fake and the downloads are malware infected which can cause some serious damage to our devices

3)Honeyspots- when we visit certain cafe's or restaurants which have free wifi facility, sometimes there are these "honeyspots" network which are setup by the hackers to hack into our systems

Some common social security threats are

1) Hackers target us by fake accounts in the name of our trusted friends,connections etc and steal our social security number

2)These hackers can also target us by the name of government/law enforcement agencies an get hold of our social security number very easily and without raising any suspicion.

3)There are many clickbate websites which invoke our curiosity , like showing gossip, scandalous videos ,etc , many of these websites are fake ,they are malware driven and hence can cause serious damage to our sensitive data

4) A very common ID theft is the credit card skimming and pin capturing devices on atm cards. To avoid such dangers one should use credit card instead as far as possible.

5)Our social security number when compriomised by hackers can lead to them withdrawing our own tax returns and hence steal our money.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote