Campbellsville University Computer Science Discussion

User Generated

xcnina

Computer Science

Campbellsville University

Description

please find the attached document and reply to student posts.student names in bold

Unformatted Attachment Preview

Read below student posts reply each in 130 words. Mohammad- Firstly, I have been blessed to be a part of this lovely class full of intellects. The coursework design was exceptional and outstanding with topics ranging from cybersecurity to information management. The course had a wide spectrum of different topics that helped me grow through out the program. I will be discussing the course work in relation to what I have learned and how this has helped me at my workplace. Management information system, as the name suggests is much more than that. It gives you an overview of the IT threats to understanding the IT infrastructure and managing the whole interconnected web of information within a company. We can learn big data analytics by reading several textbooks, but you have to understand how to implement this which can only be done by understanding the management side of this great technology. I am not a manager yet but this course has been of great help to me in understanding the various ways to deal with the cyber threats and also comprehending different protocols and procedures while handling company data. I have learned how to successfully comply with the company regulations while using any information on the data base. For instance, we have a ton of information stored on our private network/ servers which is protected. We use cisco AnyConnect to access this during this work from home time due to the pandemic. I have had many experiences where external elements try to penetrate into our private space. Our IT has set up strong fire walls and have taken other protective measures in order to protect our servers. This is one of the aspects where this course has helped me. One of the other topics that caught my attention is the ethical roles and responsibilities in IT which has helped me perform my tasks in a more ethical way. I have enjoyed my tasks in the best possible way by following the basic regulations set by the company. This includes proper handling of company data per the norms set by the management. In nutshell, this course has given the opportunity to learn and implement the basics of cyber security and information management. I will proudly use the knowledge that I have gained from this course in my future. JoyThis course has helped me to understand different types of the roles involved information systems in an organization and how they process data. Also learned about how to analyze data and document management as well as their impacts on performance from an enterprise performance management level. Especially because I work in a telecommunications domain it was really helpful to identify and analyze the impact of business networks and wireless broadband networks on businesses and organizations. Within the finance project it was helpful to enhance my skills on functions and financial values of IT security. As a part of Business relationship management team learning to analyze the need for enterprise resource planning (ERP) systems was a plus. Improved my knowledge in the area of data mining, predictive analytics, dashboards, scorecards, and other reporting and visualization tools in the management of information (John, 2015). One of my job responsibilities include analyzing and visualizing data from an enterprise data management system team that I work with. I work specially with a lot of financial data where I need to know how to process data and the functions that are required to secure data, this course has helped me in this aspect to learn about this kind of skills which in turn helped me in using at my work place. ERP systems is one of the topics which definitely did help me to improve my skill set at my job. Balanced score cards is something new which I learned in this course that is helpful in my organization for performance reviews and a better success rate of delivering software product. Co relating data and the methods to display data through visualization techniques is one of the best ways which I learned to present the client in a simple language (John, 2015). What I learnt is a good visualization involves two aspects, one is to represent data correctly with the connections and the other is to make it easier to the customers to understand complex data by breaking it down into simpler terms through visual diagrams. Data mining these days is applied in all the industries and majorly that finance industry which I work with has data mining applications, this hybrid course has helped me to increase my knowledge on these techniques as well. Overall this course has been a balance of management skills and technology skills which are both needed for people who are working in information management related field (John, 2015). Dinesh- It is a very well known fact that all organizations, irrespective of irrelevant of the domain or industry it is working for, are dependent upon Information Systems and Information Technology to the greatest extent. These organizations operate over the attributes and information provided by data they collect at the initiation stage and then keeps on proceeding by processing and utilization of these data by the support provided by the Information Systems and Management. Knowledge gained in the Learning Process During the course of my learning process, the basic thing which I learned is that no organization can attain the stages of high yield and productivity just by replying over human resources, as, the support of information technology is very necessary for its sustainment in the industry. I also learned that the importance of information technology in a business unit has made it a compulsion for the formation of a different division of the business management group, namely, the Information Management section. It is having respective sections of IT Governance protocols, Risk Management parameters, Business strategies and functions, insights and analytics and ethics and code of conduct. Although all the factors are very closely related with the management protocols of the main business and corporate governance, yet, the difference lies in its mode of approach and functionality. I also learned as to how information systems have brought about a change in the modes of operations of an organization. Just for instance, initially organisations used to rely upon traditional marketing concepts for the promotion of their products and services, but, with the advent of information technology in full swing, social media network and Internet is the major platform to showcase products and services with a wide range of coverage at a cheaper cost than the traditional methods of marketing. I learned about data and record management, enterprise systems, geographic information systems, big data analysis, SDLC and ethics and responsibilities of a professional at the workplace and towards the society. Skills acquired in the Learning Process I acquired skills over a various multitude of the IT aspects which are functional in an organization. I learned the importance and methods of measuring and analyzing the benefits which a new strategy or concept can bring in the performance of an organization. The review methods like SWOT analysis and Balanced Scorecard features and the methods of preparing their reports and projections is understood by me during the learning process. I also gained skill as for how to attract customers and clients using the IT Tools based over Internet platform by means of social media websites and networks, search engines, semantics and digital marketing tools. Apart from these, I gained skills relevant in the fields of project management, risk management, data and record management and social metrics of the utility of Information Technology for an organization. Vinay- Critical Evaluation of Learning Outcomes In this topic, we are discussing the critical evaluation of learning outcomes. For this, here we are discussing the managerial decision making in IT industry, new skills for the business productivity and applying of newly gained knowledge in the organization. 1. Information Management/ IT and Managerial Decision Making In the IT systems, the process of decision making plays a virtual role. Every organization needs better decisions in order to increase productivity and growth. To update the better concept, the organization should be ready for keeping and enhancing the new formula. The main thing disaster occurs mostly through online marketing by the time of the goods delivery process. They are not even considering the ideas, issues facing by employees in organizations and most importantly they are neglecting the conflicts among various people due to the competition in the society (Jarvenpaa, 1988). 2. New Skills for the Future Profession Communication skills play a very important role in any business organization in order to perform their job perfectly by sharing and transferring information from one department to another. The company needs to perform all the activities which they think to do for business improvements because in present society most of the companies are quickly entering into this online business market due to its demand in people. According to my view, in any of the organization values, team strength and organizational knowledge based on these factors the management success or failure the diction making will be obtained (Rivera, 1996). 3. New Knowledge In order to obtain knowledge, we need to learn about the new technologies and systems. After that have to apply our knowledge in order to implement the organization growth. One of the major effects on the business strategies from the external factors is environmental policies. By this sales plan, we can improve our business in the upcoming years and also change some strategies to get more profits and develop business. Even though making these targets and more policies to improve their performance in the business organizations can experience more problems due to improper targets settings by the inexperienced employees which are unachievable (Waddell, 1994). Shiva- Case Scenarios in Cybersecurity Cyber-attacks have increased in the recent past with cybercriminals. They have been able to create more complicated schemes to enable them to attack a wide range of prey from governments, nongovernmental organizations, financial service firms, and manufacturing enterprises others (Wu et al., 2019). The following videos, as obtained from YouTube, are just but a mere representation of the vast presence of cyber-attacks in the corporate world and beyond. Worst Case Scenario In a financial services firm, a cyber attacker impersonates a client and contacts a staff at the payments department. The attacker possesses account information of the client in question and instructs the staff to transfer money to an account that belongs to the attacker. If this account is not restricted, money is lost too, and the staff member bears the loss (Wu et al., 2019). Best Case Scenario A firm receives communication from the criminal who impersonates the manager. The communication instructs a member of staff to transfer money to another account that belongs to the attacker. The staff member becomes curious and brings the issue to the attention of his seniors. They discover that the request was fraudulent, and therefore the transfer of funds is not carried through. No money is lost (Wang et al., 2020). In another case: Worst Case Scenario A university finance staff receives an invoice through an email with payment instructions from a fraudster posing as a supplier. The staff employee makes the payments without validating the request. The company bears the loss (Sani et al., 2019) Priyanka- Cyberattack or the cybersecurity is any kind of the offensive targets that are targeted for the organizations or the employees or companies or personal or it can be anything. Cyberattacks occurs by threatening the malicious information if they have any. There are scenarios which differentiate between the worst and best cyberattack scenario are follows: Worst case scenario: Many researchers and the scientists declares to reduce the damage caused by the cyberattacks and the type of the shutdowns that occurs by the grids and the uses the internet by using the information that is stolen. Researchers claims that “reasons that they believe the cybersecurity research and policy communities will soon confront a much more diverse set of problems and opportunities comparatively than today. For example, Data breaches where the internet users are not being trusted with the security and the giving their personal data. Having and carrying the personal data and it’s been stolen for years and starts to manipulate and use the personal information to give to the data breaching activities (Christofaro, 2019). Best Case scenario: Ensuring all the information is protected within the organization and bringing the awareness to the employees regarding the cybersecurity issues and learning from them would impact less for the cybersecurity issues. Definitely monitoring and analyzing the threats and taking actions and preventing them to happen over again would decrease the activities. When it comes to finances, monitoring and confirming the large transaction and organizational documents being controlled would impact less for issues for the organization (Christofaro, 2019). Worst case scenario could learn from the best case scenario: Holding off the data breaches and monitoring and preventing before the action would help them to get take the action. Data scientists helps to develop the more powerful models which helps them to predict and manipulate the style and behavior and on what basis they work (Christofaro, 2019). Satish- Thank you providing a great article. The world had a revolutionary changed with the introduction of the mobile computing and hence there has been a boom for a lot of applications, most importantly the social media applications. Based on the list of social media sites provided, I mostly use LinkedIn and WhatsApp. I am technology geek and I always admire the technological revolution the world is experiencing each day. It fascinates me so much to a level that I do my level of research in every new technology that is out in market and is planning to build a new technology that integrates the Machine learning concepts with AWS. Since I am technologically aware of a lot of things LinkedIn helps me with keeping me to update with what is happening across the world. It is also a good platform for me to post my skill set and the achievements I get along my technological career. LinkedIn is a great platform for professionals who seek for employment at any level of their career. So, I’ll make sure I check LinkedIn at least once a day. My another most used application is WhatsApp. I used it a lot of communicate with my parents as my parents stay in a different country. We communicated via the normal calls or the video call or some time via the texts. It’s a great application which has grown leaps and bounds in no time. It came with new features like the story’s creation, group calling with more than 4 participants. The greatest achieved by WhatsApp is the acquisition by Facebook. From then on WhatsApp has gotten more recognition across the world and have recorder very less downtime even with the usage exceeding the double the users they previously had. From the list provided I don’t use a lot of applications. But I would be more interested in using Meetup and Quora. I will be moving to Canada in a few days and I guess Meetup add would be helpful in finding new friends and buddies I can play tennis with. So, I am pretty excited to start using the Meetup app and also Quora caught my eye for a lot of important information of various questions like sports, art, religion, current affairs etc. My favorite social media a network is Instagram and Twitter. Instagram is one of the latest social media platforms. One is a different platform because it emphasizes visual effects, while the other focuses on social communication. Founded in 2010, this platform is a multi-channel platform that can be used for both mobile applications and desktop sites. I use Instagram for inspiration and the ability to connect with my friends. In my opinion, Instagram is a great network for businesses to utilize because they can create their own page and post pictures of their products for consumers to view. Instagram also allows users to use hashtags and tag companies in their picture, resulting in some free advertising, especially when a new product comes out. Instagram is a great tool for brands (Etter, Ravasi and Colleoni, 2019). Security is an important issue of concern in today's world. Everyone is passionate about their importance on social media and sometimes shows a false identity. However, they are not objects that some people often try to monitor people for updates. The previous concept was that social networks were responsible for creating a lonely and lonely atmosphere for people. It will enable Instagram to take people's social life to a new level. Everyone needs to register an account to log in and provide them with unique credentials to interact with other subscribers. Now, the company is turning to social media to promote and promote advertising. This is because the social traffic that always exists continues to grow regardless of time or place of work. Instagram now provides a security feature that allows we to view your profile without permission. I like Twitter because the variety of content. I think brands do great at using twitter because they can respond to consumers. Today, many social media applications have found a way to combine them seamlessly. Twitter, Instagram, and Facebook are especially intertwined and transparent. Knowing these interconnections can help parents or guardians figure out how to use Instagram through their child's activities and other social media applications. Twitter has certain demographic information that is actually active in the community (Borah, Banerjee., Lin, Jain and Eisingerich, 2020). Whether it is a discussion of politics or social humor, there will always be a Gantse- wide variety of people to discuss. Twitter is a convenient way to quickly resolve customer concerns. Many companies respond to followers' tweets, asking questions about products, or seeking help on specific issues. Twitter is also an effective way to warn consumers, customers about policies, recalls, upcoming events or sales, and other important notifications and advertising changes. Read below student posts reply each in 130 words Tarun- What is a Cyber Attack? A cyber-attack is an offensive launched with cybercriminals doing individual about more processors upon a unique about many computers about systems. A cyber-attack can maliciously damage networks, keep data, and practice a breached network, which is a shipping time concerning different relapses. Cybercriminals follow a variety of techniques to start a cyberattack, including malware, phishing, ransomware, refusal of co-operation, with other organizations. (Liu, Wang, & Tang, 2020). Worst-Case scenario: DDoS: The Worst-Case Scenario URL: https://youtu.be/ojHKn1xH3U8?t=11 Across the past many months, I have often questioned regarding the opinions on that slate of DDoS attacks aimed upon these business management, including one question that becomes up plus and experience repeatedly: "Is the worst yet to happen?" To stay fair, I do not remember for sure, though it got them reminiscing of whatever the "worst" case scenario could happen, which caused this happening. On, September from last year, Izz ad-Din al-Qassam becomes involved in cyber warfare upon U.S. financial systems, and it is a conflict among which all have had a great deal of apparent success if we believe that their goal was to inconvenience U.S. bank customers by providing online business doors difficult as several minutes at the moment. Companies do typically provided remarks on Pastebin ere an intervention is to happen, including service for organizations before-mentioned as FS-ISAC own heightened experience of ill-disposed business experts including reduction methods that ought to give a measure of comfort. Nevertheless, the charges have remained with every succeeding spring demonstrating to obtain extra potent than that end. Consequently, over U.S. groups possess related downtimes that last counterparts of everything they all experienced the current year. Single key hither means that while more substantial than twenty companies possess remained targeted, six major groups should catch more extra concentration than some rest. It seems that Izz ad-Din al-Qassam may mean targeting a family of companies to sharpen their abilities and to deceive us because of their plans. Some communications should maintain relatively uniform coverage from those charges, while the commercial business and state leaders strive to know what does genuinely useful also something all aim to deliver. (Wu, Chen, Li, Luo, Liu, & Liu, 2020). Rebels that would never leave a free press for concern about the results that an extensive discussion could hold on their management may occur depending upon the power from the evidence in that U.S. can negatively influence the users' opinion on the security from a unique economic system. It begins by concentrating their energies at the school, including some shortest answer to some unwarranted charges, with the significant six targeted groups. A spearfishing attack offered to distribute malware including the purpose of damaging national group rules, including ATM owner processing servers, related to anything South Korean groups encountered last period. At one period, the full capacity of robot made to turn upon that one sequence, outdoors one forewarning. Kiran- Today the cybersecurity attacks are top in mind and went coming to the recent news about the high-profit incidents that are happened which involves the democratic national committee and the yahoo dominating headlines. Due to these incidents, it leads to significant fallout for all the individuals and the companies who are facing the issue. Whether everyone realizes or not the cybersecurity is the greatest risks which are facing by the small and medium business. It is common for the business to face the attacks which are small, and they can bounce back for the little damage that has happened. Let us discuss the worst-case scenario where the companies cannot find a better solution to sort it out. A perfect storm and its Monday were every employee start there day casually and start working and share their weekend talks. Later about 11 O’clock they found that the website is not working and the latest they noticed none of the sites are working (Taylor & et al., 2018). Sometime later the IT team pings that by 11:45 say that everything is working better and running week without any problem. But in reality, it is not true exactly and they did not identify that is a denial attract and the IT team will consider that different defense strategy just in the case which is hit by another attack. Based on the company size the attack will range and the downtime will be $1 to $1000000. This denial attack will not be the primary goal for the hacker he just smokes the screen and get access of the system and interrupt and disturb the customer's privacy by toughing the spam emails. Later the employees get the messages and the complaints from the customers that they are been interrupted with the unusual activities (Fuller, C. J. (2019). Priyanka- Cyberattack or the cybersecurity is any kind of the offensive targets that are targeted for the organizations or the employees or companies or personal or it can be anything. Cyberattacks occurs by threatening the malicious information if they have any. There are scenarios which differentiate between the worst and best cyberattack scenario are follows: Worst case scenario: Many researchers and the scientists declares to reduce the damage caused by the cyberattacks and the type of the shutdowns that occurs by the grids and the uses the internet by using the information that is stolen. Researchers claims that “reasons that they believe the cybersecurity research and policy communities will soon confront a much more diverse set of problems and opportunities comparatively than today. For example, Data breaches where the internet users are not being trusted with the security and the giving their personal data. Having and carrying the personal data and it’s been stolen for years and starts to manipulate and use the personal information to give to the data breaching activities (Christofaro, 2019). Best Case scenario: Ensuring all the information is protected within the organization and bringing the awareness to the employees regarding the cybersecurity issues and learning from them would impact less for the cybersecurity issues. Definitely monitoring and analyzing the threats and taking actions and preventing them to happen over again would decrease the activities. When it comes to finances, monitoring and confirming the large transaction and organizational documents being controlled would impact less for issues for the organization (Christofaro, 2019). Worst case scenario could learn from the best case scenario: Holding off the data breaches and monitoring and preventing before the action would help them to get take the action. Data scientists helps to develop the more powerful models which helps them to predict and manipulate the style and behavior and on what basis they work (Christofaro, 2019). Reference Bhuvana- Mobile users are becoming the primary targets for the attackers where they have been into deep troubles. Unknowingly, several internet users and social media users are prone to threats due to ineffective use and inappropriate sharing of information. People on social media tend to share their personal information. It led to several cyber crimes, which noticed that cybercrimes and their impacts were increased around 43%, and there is no doubt this will be inherited in the coming years with more devastating results. In 2018, users of Facebook, Twitter, and Whatsapp had been affected by cyber threats in which that impact was never recorded before. Millions of social media users and their information were attacked, which resulted in the loss of personal and professional information. This included credit card details, addresses, mobile numbers, and other contact details that have been hacked by attackers. IBM has overcome many downfalls managing cybersecurity issues, and now it became the most influential company that has successfully defended and disrupted several cyber attacks. The company has focused on customizing its security services and increased the reliability to a great extent. It has designed customer-driven security software applications using which the company enabled many internet and mobile users to manage their information effectively. It expanded its storage capabilities by improving and acquiring cloud infrastructures and services. On top of that, it restricted the accessibility to its employees to access the information by complying with the Privileged Access Management (Samkova, 2018). Therefore, it can be seen that social media platforms like Facebook and WhatsApp also should deploy customized services. Social media companies have deployed customer-driven services, but they did not quantify and strengthen the authentication and authorization facilities. Hence, Facebook and WhatsApp can follow the strategy of IBM to facilitate users with proper utilization of online resources and prevent social hacks and privacy disruptions (Shackelford & Kastelic, 2014). Praveen- Facebook Facebook is one of the platforms with the largest number of users thus will market the website effectively. Facebook has the most accurate and effective micro targeting of audience in terms of income, age, gender, location and interest of individuals.Using Facebook is cheap.Facebook has been plummeted that is people are required to use plat forms where they can pay for effectiveness (Jeske, 2016). Twitter Twitter is known as the most effective platform where the content is delivered in time that is there is no delay.This platform is the most cost-effective and time saving, where tweets are quickly delivered.Although twitter is the second platform with the largest number of audience, the number continues to decline thus it’s not reliable for future.Twitter is highly affected by direct automation and rampant spam, which at times it can be frustrating to the users (Dolan, 2016). Instagram Instagram is the popular and greatest platform which has the largest audience since it is used by adults and teenagers, thus making marketing effective.This app favors an advert that involves visual products that is videos and images.Most of instagram users are teenagers and youths whose purchasing power is low (Tuten, 2017.). The best plat form for a web developer can market their website is through Facebook since its pros are reasonable and the pros have over done the cons. Most of business people come up with business ideas and lack time to create websites where they can advertise their products and services. This is good business since individual can with entrepreneurs worldwide. The potential customers of this business idea are entrepreneurs who don’t have websites where they can advertise their products and services.A web developer can market the website on social media platforms to attract more clients. Now days the use of social media platforms is the trending system and so advertisement through this platforms will increase number of customers. Web developer can use Facebook to advertise the website since it’s the most popular platform. Nikhil- Pinterest: Pinterest is an excellent blogging platform for business owners and entrepreneurs. Companies can benefit from great feedback and interesting content, they can also display their products on an attractive blog. Investors and brand advocates can start their own pin boards and showcase their ideas. You can, through this site, find out which marketing agencies, product manufacturers, blogs, book publishers and blogs to partner with. According to Mashable, Pinterest has almost one billion users around the globe, but the new trend amongst today's youngsters is not to put their brand avatar on the website's profile but to create Pinterest boards instead. It is a great opportunity for brands to take advantage of the current, highly viral trend of Pinterest boards, which have over 30 million users per month worldwide, according to Brandline. There is one dedicated Pinterest board for each million followers of a brand and users can add their messages, pictures, gifs. According to Nadella, Pinterest is one of the highest used social media platforms, but a lot of businesses don't even know what to do with it. To learn more about Pinterest marketing and ideas for how to use Pinterest for your business. (Kaur, G. (2016)). Youtube: Another popular channel for communication between businesses and customers is YouTube Partner. This channel has been around since 2009, and provides an easy way for businesses to communicate with existing and potential customers. Each video featured on this channel includes a link to your website, business cards, contact information and even coupons and offers. YouTube comment functionality allows users to talk about your videos with friends, on television, in publications, and even in person. The company hosts event videos, full-length documentaries, reviews and even offers discounts to customers that leave nice comments in response to other customers' comments. Tumblr: Tumblr has a 'blog zone' where users can create and share their own blog. Many girls and young teens use Tumblr because of the ways it allows them to post personal details. In addition, girls and young teens use Tumblr to create their own fan-fan boards. A fan-fan is a group of friends who share a fandom or interest. Because girls and young teens use Tumblr, they post many of their personal thoughts and pictures, and Tumblr is the place where users gather. After blogging, users could read and share. (Stelzner, M. (2014)). Monica- Virtualization software virtually divides physical resources, which results in efficient usage of them. Virtualization can make it possible to use one computer like two or more computers, as it makes running of two or more operating systems on a single PC possible. By using virtualization software, one PC can be used simultaneously as two computers, where one is physical and the others are virtual computers. I completely agree with the advantages of virtualization software listed in weekly readings. This software makes the use of IT resources efficiently; as a result, the procedures are performed in less time, and the processing and execution become faster without demanding additional hardware devices. The installation or backup of the operating system is done at the speed of backup document files. The virtual operating system is treated as a group of files. Even if the device or software gets hacked, recovery is possible on a virtual machine (Metzler, 2011). Virtualization software allows you to run two or more operating systems on the same device at the same time. For example, if you are using windows 10 and need applications that only support Linux, you can use a virtual operating system, that will divide the hard drive into two parts. Similarly, virtualization software also helps in running applications only supported by old versions of the operating system. This software reduces cost, makes recovery of data possible after the attack, quick processing, and execution and enhances the productivity, agility, and efficiency of IT resources. There are many virtualization software like OpenVZ, Hyper-V, Power VM, and VMware ESXi. The virtualization software also results in the creation of serious security concerns like VM sprawl, low control, and visibility on the network, resource wastage, and critical data in VM. Server sprawl causes exhaustion of virtual resources and physical servers. This causes high pressure on procedures. In virtualization, this server sprawl is even more (Brooks, Caicedo, & Park, 2012) Priyal- Benefits of Virtualization Software Virtualization can improve the IT agility, flexibility as well as scalability. As such, it creates a notable cost of savings becoming one of the critical benefits of virtualized software. Another essential advantage of virtualization of software is its ability to enhance workload mobility in a significant way and increase the performance alongside the availability of resources. It enhances resiliency and reduces downtime by cloning machines, which could be affected in the event of a disaster (Kist et al. 2019). Besides, it also increases efficiency and productivity as a result of a few servers. The IT team can maintain physical hardware using relatively less time. The server allows one to install, maintain, and update all machines avoiding tedious work of server to server. Controlled independence also gets enhanced through the virtualization of software. Developers get provided with the ability to spin up a virtual machine quite quickly without necessarily impacting the production space. It is as a result of the virtualized environment being segmented into the virtual machines (Kist et al. 2019). Moreover, virtualization software is associated with being organizational and environmental. It remains more green-friendly due to the ability to cut down numbers of physical servers. Such a move consequently leads to a reduction in the amount of power used, reducing the carbon footprint. The reduction of power also translates to the business expenses, significantly reducing and the resources invested elsewhere. The physical and software resources are not only wasted by the existence of virtual sprawl but also significantly burden the IT with new manual processes. In essence, this increases the security risk as noted by Zheng et al. (2017) Hypervisors also remain susceptible to hacking posing another severe security concern. Due to the security risks highlighted, I would suggest to my organization to invest heavily in technology. New technology and constant updating of systems would aid in keeping the would-be hackers at bay
Purchase answer to see full attachment
Explanation & Answer:
130 Words
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running Head: DISCUSSION RESPONSE PAPER

Discussion Response Paper
Name
Institution

DISCUSSION RESPONSE PAPER

2

Discussion Response Paper
Tarun
Tarun begins by defining a cyber-attack and then goes ahead to provide the DDos as the
worst-case scenario. The DDoS attack was initiated by Izz ad-Din al-Qassam targeting US
business management and financial system. Tarun’s post is especially informative and educative
because is it attempts to engage the reader to apply critical thinking on the current issues of
cybercrimes. For example, Tarun considers the DDoS attack as the worst-case scenario but
promises the audience that the worst is yet to happen. Moreover, the post criticizes firms for
using cybercrime cases to lie their customer about the strict measures taken to protect them. But
the writer did not state the financial losses experienced from the DDoS attack to be considered as
the worst cyber attack event. In summary, I agree with Tarun aspect of cybercrime and the need
for business to provide clear information about cyber protection of their customers.
Kiran
According to Kiran, the worst-case scenario for a cyber-crime is when the firm is unable
to bounce back to normal operations. Kiran points out those small firms are most affected by
cyber-crime because they lack better solutions to sort it out. Kiran gives an example where a
company websites stop working at 11:00 a.m., ...


Anonymous
Awesome! Made my life easier.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags