Access over 20 million homework & study documents

Swipe To Unlock Summary

Content type
User Generated
Subject
Business
School
Boston University
Type
Homework
Rating
Showing Page:
1/4
Running head: SUMMARY OF YOUR PERSONAL LEARNINGS 1
Summary of Your Personal Learnings
Student’s Name
Institutional Affiliation

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/4
SUMMARY OF PERSONAL LEARNINGS 2
Summary of Personal Learnings
Written by Mehta, Neel, Aditya Agashe, and Parth Detroja, Swipe to Unlock is a mind
captivating book addressing various technological concepts in the modern world. The book sheds
light on multiple technological concepts applied in everyday life. While some of these technologies
are beneficial in some ways, some have adverse impacts on societies. It highlights how the
proliferation of the Internet is changing the world. One of the personal learning from this book entails
the existence of illegal economies existing in the modern world. Indeed, the book illustrates how
cybercriminals can hold one’s computer for “ransom.” Criminals develop a certain type of malware
that is capable of encrypting one’s computer data, deeming the computers irrelevant. One of the
examples of such malware is known as the WannaCry, which affected close to 150 nations across the
world, rendering thousands of computers useless. WannaCry caused an estimated loss of $billion.
This technology, although harmful and detrimental to humans, is an economic opportunity for
cybercriminals.
Notably, Ransomware, is synonymous with WannaCry and invades one’s computers, encrypts
files and threatens the affected party to pay ransom to have the data decrypted. In doing so, the
criminals make money illegally, especially because people are not ready to lose vital information that
might be stored in their computers. One may be curious to know how this malicious malware gains
access to the victim’s computer. The book makes this question clear to the readers. According to this
book, Ransomware gains access through one’s an email attachment or a dangerous download. It takes
advantage of potential flaws in a computer OS, thus allowing the attacker to run some codes on the
computer. Once they are successful, the owner can barely access the files on the computer unless the
attacker gives a decryption key.
Based on this reading, the takeaway is that individuals playing management and other related
roles in companies ought to be apprised of the dangers that such malware presents to their operations.
In businesses where technology is widely applied, the risk of such malware could mean significant
fiscal losses. Such losses are likely to happen because a potential attack could paralyze operations in
business organizations. When one becomes aware of such risks, they are likely to employ procedures
to prevent malware from gaining access to their computers. Some of these strategies include avoiding
downloading pirated software and installing antivirus software. In doing so, individuals will be
securing themselves from destructive malware. Most importantly, they would be denying illegal
economies an opportunity to thrive.
The book gives interesting information about specifications given by manufacturers as they
market their gadgets, such as MacBook, Samsung Galaxy phone. It opens one to the relevance of
these specifications. For instance, a significant number of people are not conversant with features,
such as Super AMOLED display, Processer of 2.9 GHz quad-core Intel Core i7, or Turbo Boost of up
to 3.9 GHz. The book simplifies this into a layman’s language. For instance, the book suggests that

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/4

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 4 pages?
Access Now
Unformatted Attachment Preview
Running head: SUMMARY OF YOUR PERSONAL LEARNINGS Summary of Your Personal Learnings Student’s Name Institutional Affiliation 1 SUMMARY OF PERSONAL LEARNINGS 2 Summary of Personal Learnings Written by Mehta, Neel, Aditya Agashe, and Parth Detroja, Swipe to Unlock is a mind captivating book addressing various technological concepts in the modern world. The book sheds light on multiple technological concepts applied in everyday life. While some of these technologies are beneficial in some ways, some have adverse impacts on societies. It highlights how the proliferation of the Internet is changing the world. One of the personal learning from this book entails the existence of illegal economies existing in the modern world. Indeed, the book illustrates how cybercriminals can hold one’s computer for “ransom.” Criminals develop a certain type of malware that is capable of encrypting one’s computer data, deeming the computers irrelevant. One of the examples of such malware is known as the WannaCry, which affected close to 150 nations across the world, rendering thousands of computers useless. WannaCry caused an estimated loss of $billion. This technology, although harmful a ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Great content here. Definitely a returning customer.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4