Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Topic: The topics are listed below. Description: You are to create (8-10) slide PowerPoint presentations on (1) the following topics below. You will take a

Topic: The topics are listed below.

Description:You are to create (8-10) slide PowerPoint presentations on (1) the following topics below.

You will take a deeper dive into a topic

Additional Info: Minimum (8-10) Slides Max. Ensure you have a slide that includes a title page and your references

Your presentation will be based on a simple rubric: - Did you explain the topic well? Did you answer every part of the topic? How well is your PowerPoint put together? - Visual appeal, creativity is a +, did you include images, video(small clips preferred) etc . . - Do you have the correct amount of slides & also include references? - Are you using the proper terminology and including them in your slide?

Choose (1) topic to do your presentation on

You're going to dive deeper into one of these topics, or if something else interests you, you are free to do your presentation on that! Discuss it with me beforehand. Some of these topics we have not covered, but I'm giving you free rein on something you would like to cover.

1. What are some different types of phishing? How can you protect yourself from phishing attempts such as Vishing, SMSIng, Phishing, etc . . ? What are the signs of phishing attempts? How can you tell if a link is fake? Provide a real-world example of measures you can take to protect yourself.

2. How does the Great Firewall work? China takes internet censorship to the next level. Its comprehensive protection policies gave the system the nickname Great Firewall of China. Provide a real-world example of how firewalls can be used. You can show it being used positively or negativelyyour choice.

3.How does a VPN work? How does it protect you? How do 14 eyes affect VPN usage? Are there pros and cons to a VPN? what is GPS spoofing? Do all VPNs give that protection? Does using a VPN mean you are completely anonymous? How do Tor and onion routing work? Provide a real-world example of how you can utilize a VPN.

4. What makes up the mechanics of password protection? Passwords protect our sensitive information to ensure confidentiality. What a user and developer need to keep in mind when handling passwords? What makes a strong password? Provide a real-world example of how we can create stronger passwords.

5. What types of social engineering should we be aware of? In layman's terms, social engineering (human hacking) is hacking without code. How do they obtain the information? How can we protect ourselves from being a victim of social engineering? Provide a real-world example of how an attack could happen.

6. How do these big tech companies keep us hooked and track our data? What do they do will all the information they've obtained from us? I recommend watching a Netflix movie called The Social Dilemma (2020). Provide a real-world example of how our data can be used for personalization.

7. How does a SQL injection attack unfold? Provide a real-world example.

8. What are some steps to take control back of your privacy (digital life)? What can you do to protect yourself and your family members? Should you be more cautious of the information you put out there? Could this information be farmed to be used in a social engineering attack? Provide a real-world example of how sharing too much information could be dangerous.

Resources / Materials: You can use videos, articles, and textbooks to complete your assignment. Please make sure to include your references.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Restaurant Concepts, Management, And Operations

Authors: John R Walker

8th Edition

1119393582, 9781119393580

More Books

Students also viewed these General Management questions

Question

=+c) What is/are the response(s)?

Answered: 1 week ago

Question

Do not come to the conclusion too quickly

Answered: 1 week ago

Question

Engage everyone in the dialogue

Answered: 1 week ago