assignment

User Generated

bh33

Computer Science

Description

Complete Project 1-2 in your textbook with the following modifications [part A and Part B pictures are attached ] (5 pts)

List five tools you are using to protect yourself again cyber threats. Provide a two sentence overview of each tool and provide a URL to the tool. (5 pts)

Research your digital footprint, without being specific, what information is available to the public? Provide 5 specific results (Google is not specific) and the provide the procedures to remove your information from the results. (5 pts)

Please submit a SINGLE .pdf file containing your entire submission. The submission must be created using a Word Processor (ie Word, Google Docs, Libre Writer, Pages, etc). No screen captures, handwritten notes or any other format will be accepted.

Unformatted Attachment Preview

Chapter 1 Introduction to Security cated by the size of the bubble. ing Story." Click one of the bubbles and read the story. 5. Click Read a bit more. 3. Scroll down the page to view the data breaches. Note that the size of the breach is indi 4. Scroll back up to the top and note that the color of the bubbles that have an “Interest- 6. Click Click to see the original report. 7. Read about the data breach. When finished close only this tab in your browser. Click Show Filter to display the filter menu. 9. Under “Organisation" click Retail. 10. Under “Method of Leak” click Hacked. How many bubbles appear? 11. Under “Organisation" click Government. 12. Under “Method of Leak” click Inside Job. How many bubbles appear? 13. Under “Organisation" click All. 14. Under “Method of Leak” click All. 12 15. At the top of the graphic click Method of Leak so that the bubbles display how the leak occurred. Which type of leak is the most common? Why do you think this is the case? 16. Does this visual convey a better story than the textual data in the previous project? 17. Close all windows. Project 1-3: Scan for Malware Using the Microsoft Safety Scanner -ON PROJECTS In this project you will download and run the Microsoft Safety Scanner to determine if there is any malware on the computer. description. 1. Determine which system type of Windows you are running. Click Star Control Panel, System and Security, and then System. Look under System type for th 2. Open your web browser and enter the URL www.microsoft.com/security/scanner/en search engine to search for "Microsoft Safety So 3. Click Downl rity Awareness Project 1 Chapter 1 Introduction to Security 31 17. Scroll back to the top of the page. 18. Now create a search based on criteria that you are interested in, such as the Payment Card Fraud against Retail/Merchants during the current year. 19. When finished, close all windows. Enter HANDS-ON PROJECTS Project 1-2: Examine Data Breaches—Visual In this project you will view the biggest data breaches resulting in stolen infor- mation through a visual format. 1. Open your web browser and enter the URL http://www .informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/ (if you are no longer able to access the site through this web address, use a search engine to search for “Information Is Beautiful World's Biggest Data Breaches”). 2. Click Hide Filter to display a visual graphic of the data breaches, as shown in Figure 1-6. lot World's Biggest Data Breaches interesting story Selected losses greater than 30,000 records (updated 16th July 2015) YEAR BUBBLE COLOUR YEAR METHOD OF LEAK BUBBLE SIZE NO OF RECORDS STOLEN DATA SENSITIVITY SHOW FILTER Australian msrabon Department Premera Anthem MSpy Slack Uber British Airways IRS 80.000.000 latest US Office of Personnel Management (2nd Breach) Adult Friend Finder JP Morgan Chase Home Depot Carefirst 56.000 000 76,000,000 US Office of Personel Management Commsung Health Series Sony Pictures Ashley Madison com Staples Twitch.tv European Mozilla Central Bank Japan Airlines Neiman Marcus Target Ebay 70.000.000 Domarkas UPS 145.000.000 France AOL Korea Credit NASDAD Bureau NewOR Fas MacRumour.com Kissinger Cables NMBS Yahoo Japan Tomatom 2.400,000 SnapChat veure 2014 08. Ateart Crescent Health ine. Walgreen Cantal Hudson Car Electric Facebook Living OVH sodob ms Social South Africa Rocco Adobe 36,000,000 Evernote Ubisoft "unknown wood Community College 50.000.000 Florda Departement of uende Justice Indiana University Vodafone 50.000,000 Nintendo Scribd Twitter 2013 Apple Greek government Aarogate Medical Ubuntu Washington Stato court of the Figure 1-6 World's Biggest Data Breaches Source: Information is Beautiful
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hello, yo...


Anonymous
This is great! Exactly what I wanted.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags