ITMG 481 Week 4 Computer Security & Hacking Cyber Security Essay

User Generated

esr2258

Computer Science

ITMG 481

ITMG

Description

Unformatted Attachment Preview

Name: ________________________ Date: ____________________ ITMG481 Week 4 Assignment (3% of Grade) APUS/Yocam Lesson 4 Review: Security & Hacking The purpose of this activity is to reinforce what you have learned so far about security and hacking. 1. What do we mean by “computer security” or “cybersecurity”? (Minimum word count: 60) _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ 2. How can cybersecurity concerns be differentiated from issues in cybercrime? (Minimum word count: 60) _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ 3. How are cybersecurity issues similar to and different from privacy issues affecting cybertechnology? (Minimum word count: 60) _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ 4. Who are computer hackers, and how has the term “hacker” evolved? (Minimum word count: 60) _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ 5. What is cloud computing, and what challenges does it pose for securing one’s personal information in cyberspace? (Minimum word count: 60) _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ 6. Can we construct a profile of a “typical cybercriminal”? (Minimum word count: 60) _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ 7. Why do many in the computer community oppose the use of “hacker” to describe cybercriminals? (Minimum word count: 60) _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ 8. Can this kind of hacking be justified on either legal or ethical grounds? (Minimum word count: 60) _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ 9. What, exactly, is cybercrime? (Minimum word count: 60) _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ 10. What is identity theft, and how has it been exacerbated by cybertechnology? (Minimum word count: 60) _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

View attached explanation and answer. Let me know if you have any questions.Hello :) Find attached:1) An outline (just to guide you!)2) Your assignment. All answers have >60 words and I cited all three references in APA format. Let me know if you have any questions.

Name: ________________________

Date: ____________________

ITMG481 Week 4 Assignment (3% of Grade)

APUS/Yocam

Lesson 4 Review: Security & Hacking
The purpose of this activity is to reinforce what you have learned so far about security and hacking.

1. What do we mean by “computer security” or “cybersecurity”? (Minimum word count: 60)
Although the concepts of “computer security” or “cybersecurity” still lack theoretical consensus, they are
usually related to reliability, availability, and safety of computer systems. These concepts are also related
to integrity, confidentiality, and protection of data (privacy). According to Richard Epstein (2007),
cybersecurity can be depicted as three main elements that are: (i) confidentiality, which refers to
unauthorized access prevention; (ii) integrity, which refers to protection of the integrity of the original
data; (iii) and accessibility, which refers to availability of resources for authorized users. Additional
authors, such as Neumann (2004), point out that cybersecurity is also preventing computer system misuse,
malfunction, and accident – which can both protect privacy and undermine access to information for
appropriate users. (Word count: 117)
2. How can cybersecurity concerns be differentiated from issues in cybercrime? (Minimum word
count: 60)
Cybersecurity concerns can be differentiated from issues in cybercrime by their definition. Cybersecurity
refers to the security of computers whereas cybercrime refers to crimes committed at onlin...


Anonymous
Great content here. Definitely a returning customer.

Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Similar Content

Related Tags