Research and learn about the three topics listed below. 1.

 

Research and learn about the three topics listed below. 

1.  Dataveillance 

2.  Distributed Denial of Service Attacks

3.  Internet Parental Control Software  

4.   Internet Anonymity 

5.  Cryptography

6.  Biometrics

7.  Big Data (Data Analytics)

8.  Artificial Intelligence (AI – deep learning applications)

9.  Browser fingerprinting  

10. Facial Recognition

11. Virtualization

12. Blockchain  

13. Machine Learning

14. Application Security 

15. Cryptojacking

16. Cyber-Physical Attacks

17. Autonomous Vehicles

18. Smart Medical Devices

19. Electronic Medical Records

20. Smart Systems/Devices

Create a slide presentation detailing the information on your chosen topics. Upload your presentation in the assignment box. (Refer to rubric)

Requirements:

Slide #1-Title, Your Name, INF Section, Date

Slide #2,3-Choice #1

Slide #4-5-Choice #2

Slide #6-7-Choice #3

Slide #8-Work Cited

Answer for each choice the following:

1. What it is (description)?

2. What are the security problem or issues?

3. How to reduce or eliminate the threat? How the security issue(s) could be prevented or protected?

Additional Presentation Requirements:
Images/diagrams/background/animation

Upload your presentation in the assignment box.

Additional Sources: 
https://onlinedegrees.sandiego.edu/top-cyber-securitythreats/ 
https://www.fbi.gov/investigate/cyber
https://staysafeonline.org/
Ransomware Attacks Take On New Urgency Ahead of Vote 

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

work on the Logical Modeling Design and to specify the

  work on the Logical Modeling Design and to specify the entries, columns and their relationship. Use an entity-relationship ER diagram to visualize the database.  Your schema should include some attributes that make it possible to include some transactions that involve aggregate functions. For example, a school schema would allow for

Progressive Corporation: Describe the various activities of

Write an analysis based on the SWOT/Positioning/Fit framework. Then answer the following questions based on the  Progressive Corporation Case – 1. What are the different segments within the automobile insurance industry? How do they differ? 2. Describe the various activities of Progressive’s value chain? 3. What level of fit do

Your director has tasked you with creating a draft for

Your director has tasked you with creating a draft for a security policy. Select one of the twelve topics listed below and summarize what the policy is and any key points you would implement within the company. Explain why you chose those points and how they work to protect your

McDonaldization of Education

Weber argued that the society was actively moving away from traditional ways of life to an increasingly rationalized way of life. He uses the example of bureaucracy and the increasing reliance on technology to support his idea of rationalization. Bureaucracy, for Max Weber, and McDonaldization, for George Ritzer, represent a

Scenario You are an independent contractor who has been hired

Scenario You are an independent contractor who has been hired by a multinational technology company to increase productivity at one branch office. The location in question is failing miserably and your contract with this company is a last ditch effort to bring this location’s productivity up, or else it will

Scenario The Chief Marketing Officer (CMO) of the local community

  Scenario The Chief Marketing Officer (CMO) of the local community center wants to add Augmented Reality (AR) and Virtual Reality (VR) technology to the marketing strategy. The CMO wants the membership to increase by 10% in the next three months. You are the marketing director, and the CMO wants

Mark Jarman’s sonnets are titled “unholy” sonnets

Description PROMPT FOR ESSAY 1 Mark Jarman’s sonnets are titled “unholy” sonnets. This word choice implies that his sonnets describe incidents that might be considered the opposite of holy (that which is sacred, saintly, devoted to a deity, worthy of devotion). And yet the sonnets also seem to describe incidents

Socks are Hot We long for comfort and style in

Socks are Hot We long for comfort and style in our dress. Sometimes the stylish fashions are not comfortable, but when it comes to socks, we can have both style and comfort now. Why settle for boring old dark dress socks when you can instead wear vibrant, colorful socks that

Sustainable development has been defined as balancing human needs with

  Sustainable development has been defined as balancing human needs with the protection of the natural environment so that these needs can be met not only in the present, but in the indefinite future. Water resources are a big part of planning for sustainability. (NOTE: Do NOT use the same project

Step 1: Compare and contrast the functions of the spleen

  Step 1: Compare and contrast the functions of the spleen and thymus.   In a one to two page paper, include the following information: Explain the anatomical location and physiological function of the thymus and spleen.   Discuss a condition in which removal of the spleen may be beneficial.  Include any warning signs or symptoms that may help you

Literary Analysis: Statement on the Assassination of Martin Luther

Throughout Unit 1 and Unit 2 you have read a variety of readings focusing on empathy and leadership. For this assignment you will demonstrate your mastery of those two concepts by analyzing one of the five speeches that you have read. Statement on the Assassination of Martin Luther King, Jr.

Write a three-page paper that includes the following: · Explanation

   Write a three-page paper that includes the following: · Explanation of the business problem and the requirements for its solution. · A proposal for an information technology solution. · Description of how the information technology solution aligns with the current business needs. Be sure to: · Describe all business

For the PowerPoint presentation, each slide must contain at least

For the PowerPoint presentation, each slide must contain at least one image. For the research report, your group may use any format — single-spacing or double-spacing; footnotes or end notes; etc. — as long as the format is used consistently, but the report must contain separate headings for each section

Comparing Ambulance Deployment Plans

 Watch the video on, Emergency Support Function (ESF) (https://www.youtube.com/watch?v=Y3X5MAbdfXc&feature=youtu.be) Also, read the Accessibility score: Medium Click to improve Actions State of Florida Ambulance Deployment Plan Actions (attached to assignment). Research and find another state ambulance deployment plan. Compare and contrast the two plans. Identify the strengths and weaknesses of each

Mission Command Paper: Battle of Chipyong-Ni (Col Freeman)

 Analyze the commander’s performance in a pre approved historical battle. The analysis will evaluate how effectively or ineffectively the commander executed 4 out of 6 mission command. Command Principles: build cohesive team through mutual trust, create a shared undertstanding, provide clear commander intent, exercise discipline initiative, use mission orders, and

The first ten questions are multiple choice questions For those

The first ten questions are multiple choice questions For those questions that require calculation, please calculate using the appropriate math symbols. Please write down the steps in the word document. The last ten questions are open ended questions Please answer each questions with detailed calculation. Please the answers and the

The need for an emerging technology topic that falls in

  The need for an emerging technology topic that falls in one of the following categories: emergency response, the computer age, training technology, fire extinguishment technology, or future trends. Examples for each topic can be found in the textbook. How the fire department contributes to the research that organizations are