Nt1310 Unit 3 Research Paper

Improved Essays
Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks. In the year 2008, the Comprehensive National Cybersecurity Initiative (CNCI) was formed and it was to ensure the US is able to defend itself from immediate threats should they occur and to be able to educate the government.
The Building Blocks of a Computer Network The description of a building block of a network will be explained by the description of one from a shore command in the Navy. First one would need a computer
…show more content…
Internet browsers on a daily basis are vulnerable if they are not updated on a routine basis or when there is a new update from their creators. Take for instance Internet Explorer, there was a Washington Post articles in 2014, which explains how Microsoft pushed out an update to prevent the browser from the possibility of being hacked. As you can see if someone can have the means to hack Internet Explorer, they can also hack the others. Hackers have the capabilities of hacking and gaining access someone computer without them even knowing they have been attacked. This gives the hacker the power to access the webcam and look at the person who is logged onto the computer or laptop. The hacker can also gain access to the files saved on the hard drive and share them with others in

Related Documents

  • Decent Essays

    ITM 301 Lab & Assignment 2 Deqa Yusuf Student #:500566949 Part A: Both CAT5 and CAT5e are UTP cables but the difference between these 2 cables is the quality. CAT5 has a 100 MHz signaling while CAT5e can have a signaling rate of up to 350 MHz. Not only that but the wiring is different as well, the CAT5 has simple wiring while the CAT5e has copper wiring. In short the CAT5e is a much more advanced cable compared to the CAT5.…

    • 403 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 1 Final Paper

    • 456 Words
    • 2 Pages

    ii. Give the id the absolute minimum privileges necessary to host the site on the web server. For example, it’s more likely than not read access to the website itself, write access only to folders updated by the web site, etc. iii. Change IIS so that the domain account is utilized to run the application.…

    • 456 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    ASSIGNMENT 1 OF PLATFORM TECHNOLOGIES PREPARED BY: - TEACHER: - PRAMOD GAJUREL (MIT173707) ANUJ NEPAL B-Q1 a) Answer: - b) c) B-Q2. 1) Answer: - The following are the component shown in the picture: - 1) DRAM Memory sot 2) Chipset 3) Serial ATA (SATA) 4) BIOS 5) Ethernet controller 6)…

    • 727 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    This antivirus program installed in our system it runs in background and protects your computer always. We have to update them and keep our computer protected and safe. Proper virus protection is the best way to avoid unwanted intrusion.…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3 Term Paper

    • 621 Words
    • 3 Pages

    Security Ecommerce site Phishing, “brand spoofing” or “carding”, is not a “pass-time” process but is a business-like on which organized crime groups extensively use and make a big deal of money. Phishing, being one of the most security challenges, is a hacking technique of malicious and fraudulent mass mailing, masquerade as emails from government agencies, business partners or even company executives using modern way such as social media, phone calls and any other communications to get access to usernames and passwords, credit cards or other sensitive information to steal valuable data. According to Anti-Phishing Working Group (APWG), an increase of 86% of phishing attacks in companies from 2013 to 2015 has been analyzed (source: Forbes).…

    • 621 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1 Term Paper

    • 510 Words
    • 3 Pages

    Components: Components are all the parts that make up a computer. Components include software and hardware. Proxy server: A proxy server is basically an server that bridges the gap between you and the internet. When you have proxy up and running the other computers from the internet cannot see your IP address so it covers you in something known as an internet camouflage. The computers can only see the proxy's IP.…

    • 510 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Introduction Often, team members of both Apple and Microsoft convocate to ameliorate the upcoming operating system that they plan to release in a certain period of time. Many different features are added to technology each day to facilitate the use of it. For example, Cortana (the Windows Phone Assistant), the Snap Assist feature on Microsoft, and Phone Companion are qualities that aid the success of an operating system. In Apple, features such as Control center, Task manager and fingerprints contribute to the success in IOS Seven. I will be discussing the advantages of Cortana (the Windows Phone Assistant), the Snap Assist feature on Microsoft, and Phone Companion.…

    • 682 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Final Exam Paper

    • 233 Words
    • 1 Pages

    21 Which operating system doesn't support networking between computers? a. Windows 3.1 b. Windows 95 c. Windows 2000 d. Windows NT 22Which Operating System doesn't support networking between computers? a. Windows 3.1 b. Windows 95 c. Windows 2000 d. Windows NT 23…

    • 233 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Internet Usage The possibility of being attacked by a hacker of any kind is very real. This understanding is why an organization should limit the availability of Internet websites across the board. In doing so this helps mitigate potential threats from malicious software and users from stealing valuable data that belongs to the…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 1 Term Paper

    • 485 Words
    • 2 Pages

    1. Define the following terms: According to the textbook below are the following definitions. • Surface water-Water from lakes, streams, rivers, and surface springs (Friis, 2012, pg. 211). • Groundwater- Any water that is stored naturally deep underground in aquifers or that flows through rock and soil, supplying springs and wells; this water is less susceptible to contamination than surface water (Friis, 2012, pg. 211).…

    • 485 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Hackers/Crooks have put hard working people in hardship by ruining their credit causing them to be unable to buy a home or even getting hired on at a job. They have been known to steal credit card numbers from websites, breaking into homes or digging into the trash to retrieve personal information, and an employee you work with that takes a look at your personal file(Federal Trade, National and State, Consumer Sentinel, 2013).Though the internet is one of the main ways identities are stolen, they will pick-pocket you, steal your mail right out of the box, your tax information, and even obtaining medical services(Cassim, 2015).…

    • 105 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    For numerous people logging onto the Internet is as routine as putting on a pair of clean underwear everyday. People take it for granted without realizing what is actually going on. Everytime you log on to the world wide web, you are risking your computer to numerous viruses, spyware, and adware programs. Many people dont realize that over ninety percent of computers today are infected with some form of virus or spyware. It is usually to late for people to do anything by the time they realize they have been infected by some malicious computer disease.…

    • 522 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Situational Tracking

    • 649 Words
    • 3 Pages

    This was discovered by Pete Warden and Alasdair Allan and it sparked a lot of protests on the internet which resulted in an Apple Press Release. The PR said that it is necessary in order to have certain features available on your phone. However, people are really scared that the NSA and other governments will use this technology in a bad way. And the governments do say that it is essential for the public safety but people seem to rather have their privacy than their lives. Chapter 5, in short, is about networks.…

    • 649 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Cyber Attacks Research Paper

    • 2349 Words
    • 10 Pages

    in his A Short History of Computer Viruses and Attacks 2003, said that hacking activities of computer systems started as early as late 1970s which followed into the 80s as computer viruses and worms were developed that could attack computers and result in crashing of systems and softwares. In the 80s also saw the fast rise of hackers into the world as many would infiltrate computer networks and they would successfully code through security. It is reported that during the 80s and most specifically 1983 saw cyber hackers crack through government networks in the U.S. and they were reportedly using home based computers. It was in 1998, that over 500 computers belonging to the U.S. government and military sectors were taken over by hackers where this event was later known as “Solar Sunrise.” The attack was an indication to the government particularly the Department of Defense of the extent to which an attack could be executed by adversaries having better resources and skills.…

    • 2349 Words
    • 10 Pages
    Great Essays
  • Improved Essays

    As people use smartphones more and more it is crucial that the smartphone keeps being safe. Important is to distinguish the ways security could be compromised. iOS jailbreaks for example, are bad for third party app developers and Apple since it enables users to download apps for free. However, in this chapter we will look for the security issues that are bad for the user, not for the companies. As there is a restriction as to how much we can cover here, we will only cover some the most important issues: permissions, lighter browsers, unofficial apps, network spoofing and data density.…

    • 787 Words
    • 4 Pages
    Improved Essays