Writing
UT Arlington Digital Security Threats To Information Presentation

University of Texas at Arlington

Question Description

Can you help me understand this Writing question?

Create a PowerPoint presentation to go with the technical report you are currently working on.

Look at the following information to help you with this assignment.

The Beginner's Guide to Microsoft PowerPoint

https://www.youtube.com/watch?v=XF34-Wu6qWU

How to avoid death By PowerPoint | David JP Phillips | TEDxStockholmSalon

https://www.youtube.com/watch?v=Iwpi1Lm6dFo

19+ PowerPoint Presentation Tips: To Make Good PPT Slides in 2019 (Quickly)

https://business.tutsplus.com/tutorials/powerpoint-presentation-tips--cms-29886

43 Effective PowerPoint Presentation Tips (To Improve Your Skills)

https://business.tutsplus.com/articles/37-effective-powerpoint-presentation-tips--cms-25421

Writing a PowerPoint Presentation

https://writingcenter.gmu.edu/guides/writing-a-powerpoint-presentation

Tips for Making Effective PowerPoint Presentations

http://www.ncsl.org/legislators-staff/legislative-staff/legislative-staff-coordinating-committee/tips-for-making-effective-powerpoint-presentations.aspx

Powerpoint: Presentation Tips

https://www.bates.edu/helpdesk/2011/05/14/powerpoint-presentation-tips/

Student has agreed that all tutoring, explanations, and answers provided by the tutor will be used to help in the learning process and in accordance with Studypool's honor code & terms of service.

Final Answer

hey buddy. Here is the complete solution to the assignment. It has been a pleasure working with you. Kindly invite me for your future assignments as well.😀

Digital Security Threats
To Information

AGENDA:
Introduction
Sources of Digital Security Threats
Computer and Network Vulnerabilities
Digital Security Threat Motives
Solution to Digital Security Threats Information

2

3

Technology plays a huge part on how information is stored and retrieved.
Some of its advantages are:

Better Information Management: Data files are now easily managed digitally. Hence, removed the manual work
and challenges of keeping them physically.
Efficiency and Accuracy: Have access to data anytime while ensuring accuracy and consistency.

However, with the convenience this gives, also comes risks and downsides.
This problem is the digital security threat to information.
As hacker communities, and their malicious motives arises, viruses have been
invented as well to manipulate and knock down information management.

4

Sources of Digital Security Threats
I. Weakness in communication Protocols and Information Network
Infrastructure.

Three-way Handshake

Communication Protocol

TCP

UDP

As information is being transferred, it is broken down into small package so it
can easily be transmitted to the network, then later on being reassembled at
the receiving point. Security is necessary on this process to ensure each
information packet is guaranteed.

But it is not the case all the time in the existing cyberspace protocols. There are
loopholes still in which unauthorized users are able to penetrate and intercept
these information packets.

This process creates TCP connection to both client
and server through a unique port number.

Sources of Digital Security Threats
II. Rapid Growth of Hackers Community

Major Cyberattacks:

The Internet Worm

Michaelangelo Virus
Smeg, Queeg and Pathogen Virus
Hackers are individuals breaching defense and

penetrating security on computer systems/networks
Before, they are the worst enemy to information systems, but
as tech...

NehaSeelam (2162)
Cornell University

Anonymous
Thanks for the help.

Anonymous
Outstanding. Studypool always delivers quality work.

Anonymous
Tutor was very helpful and took the time to explain concepts to me. Very responsive, managed to get replies within the hour.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4