16.09.2015 Views

CIS 105 CheckPoint Cyber Security

For more course tutorials visit www.uoptutorial.com CheckPoint: Cyber Security • Resource: Ch. 12 in Computing Fundamentals • Due Date: Day 4 [Individual forum] • Read the following scenario: James was traveling for his job. The internet card provided by his company was not working and he had an important project due that day. James was in a small town about an hour away from the nearest internet kiosk, so he decided to drive around a nearby suburb to see if he could find a wireless system he could “borrow” to send out his project. James found a wireless system without a security key and, after parking near the home with the system, uploaded the project. Afterward, just for fun, James peaked into the computer on the wireless system and found, to his dismay, some bank accounts and passwords. • Think about how you would feel if James were parked outside your home, using your wireless network. • Refer to Ch. 12 in Computing Fundamentals • Explain the following in 350 to 700 words: Before this class, what means, if any, were you employing to protect yourself in the cyber world? What security measures are available to the average computer user? What is missing from the system James “borrowed?” Which do you think are most important? How might you change your approach to online security in the future? • Cite any resources used in APA format. • Post the CheckPoint as an attachment

For more course tutorials visit
www.uoptutorial.com

CheckPoint: Cyber Security
• Resource: Ch. 12 in Computing Fundamentals
• Due Date: Day 4 [Individual forum]
• Read the following scenario:
James was traveling for his job. The internet card provided by his company was not
working and he had an important project due that day. James was in a small town about
an hour away from the nearest internet kiosk, so he decided to drive around a nearby
suburb to see if he could find a wireless system he could “borrow” to send out his project.
James found a wireless system without a security key and, after parking near the home
with the system, uploaded the project. Afterward, just for fun, James peaked into the
computer on the wireless system and found, to his dismay, some bank accounts and
passwords.
• Think about how you would feel if James were parked outside your home, using your
wireless network.
• Refer to Ch. 12 in Computing Fundamentals
• Explain the following in 350 to 700 words: Before this class, what means, if any, were
you employing to protect yourself in the cyber world? What security measures are
available to the average computer user? What is missing from the system James
“borrowed?” Which do you think are most important? How might you change your
approach to online security in the future?
• Cite any resources used in APA format.
• Post the CheckPoint as an attachment


SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>CIS</strong> <strong>105</strong> <strong>CheckPoint</strong>: <strong>Cyber</strong> <strong>Security</strong><br />

Click Here to Buy the Tutorial<br />

http://www.uoptutorial.com/index.php?route=product/product&path=811&p<br />

roduct_id=12394<br />

For more course tutorials visit<br />

www.uoptutorial.com<br />

<strong>CheckPoint</strong>: <strong>Cyber</strong> <strong>Security</strong><br />

· Resource: Ch. 12 in Computing Fundamentals<br />

· Due Date: Day 4 [Individual forum]<br />

· Read the following scenario:<br />

James was traveling for his job. The internet card provided by his company was not<br />

working and he had an important project due that day. James was in a small town about<br />

an hour away from the nearest internet kiosk, so he decided to drive around a nearby<br />

suburb to see if he could find a wireless system he could “borrow” to send out his<br />

project.<br />

James found a wireless system without a security key and, after parking near the home<br />

with the system, uploaded the project. Afterward, just for fun, James peaked into the<br />

computer on the wireless system and found, to his dismay, some bank accounts and<br />

passwords.<br />

· Think about how you would feel if James were parked outside your home, using your<br />

wireless network.<br />

· Refer to Ch. 12 in Computing Fundamentals<br />

· Explain the following in 350 to 700 words: Before this class, what means, if any, were<br />

you employing to protect yourself in the cyber world? What security measures are<br />

available to the average computer user? What is missing from the system James<br />

“borrowed?” Which do you think are most important? How might you change your<br />

approach to online security in the future?<br />

· Cite any resources used in APA format.<br />

· Post the <strong>CheckPoint</strong> as an attachment

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!