Braden MacDonald
ISA 3100 Section W01
Current Topics in Digital Security
Completed on 10/21/14
Style used: MLA
By submitting this assignment, I affirm that all of the writing presented here is an original creation except where the work of others is set off as a quotation that has been properly cited or is a duly paraphrased passage that is properly cited. Topic Number: 6
Topic: Good guys and bad guys (and bad things)
Definition & Summary: An online predator is a person who takes advantage of children and teenagers by using the anonymity of the internet to expose children to sexually explicit content, and seducing them into inappropriate relationships with the predator.
According to the U.S. Federal Bureau of Investigation, most predators dedicate a significant
…show more content…
"Evolutions in Browser Security." NSS Labs. N.p., 28 Oct. 2013. Web. 19 Oct. 2014. <https://www.nsslabs.com/reports/evolutions-browser-security>.
Earle, Aaron E. Wireless Security Handbook. Boca Raton, FL: Auerbach, 2006. Http://www.infosectoday.com/. Web. 19 Oct. 2014.
McCallister, Erika, Tim Grance, and Karen Scarfone. "Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)." NIST SP 800-122, Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) (n.d.): n. pag. National Institute of Standards and Technology. Apr. 2010. Web. 19 Oct. 2014. <http://csrc.nist.gov/publications/nistpubs/800-122/sp800-122.pdf>.
Niem, Tu C. "Bluetooth And Its Inherent Security Issues." Www.sans.org. N.p., n.d. Web. 19 Oct. 2014. <http%3A%2F%2Fwww.sans.org%2Freading-room%2Fwhitepapers%2Fwireless%2Fbluetooth-inherent-security-issues-945>.
"A Parent's Guide to Internet Security." FBI. FBI, 03 June 2005. Web. 16 Oct. 2014.
Webb, Tielle. "How to Test the Validity or Authenticity of a Website." Small Business. N.p., n.d. Web. 19 Oct. 2014.
Before moving far we must understand the meaning of a pervert and a predator. According to the online dictionary the term sexual predator is used to describe a “person seen as obtaining or trying to obtain sexual contact with another person in a metaphorically ‘predatory’ manner.” A pervert is defined as “a person whose sexual behavior is regarded as abnormal and unacceptable.”
"Internet Privacy." Congressional Quarterly Researcher 8.41 ( Nov. 6, 1998 ). Busse Library, Cedar Rapids . 6 July 2003 <http://library.cqpress.com/cqresearcher>
The FBI. FBI, 22 Oct. 2007. Web. The Web. The Web.
Write a short passage in the style of this author on a topic of your choice.
Network Security is the protection of the computer’s network though out the entire infrastructure. It can protect very important information and computer files to help prevent theft, spyware, malware, viruses, and more. Depending on if you have a public or private network, can determine what type of security settings you need for your network. All people are different on what they want to have secured or not, but most people do not know how to prevent people or things from getting in their network. “You must have a general understanding of security terminology and specifications as it relates to configuring hardware and software systems.”(Roberts, Richard M. 599). That quote states that by knowing and understanding security terms and specifics, you can
The propose research will address a problem confronting many two year institutions in the present-day (i.e. how to best plan, design, and implement WLAN technologies). While WLAN technologies offer the benefits of mobility, reduced installation time, and decreased cost, many challenges must be met by institutions deploying them (Geier, 2005). These issues are related to security, speed, interoperability, and equipment selection, ease of use, reliability, signal interference, installation, and health risks.
This assignment is my own work, presented in my own words, ALL sources of information have been cited and any direct quotations are contained within quotation marks.
Sujithra, M., & Padmavathi, G. (2012). Mobile Device Security: A Survey on Mobile Device Threats, Vulnerabilities and their Defensive Mechanism. International Journal of Computer Applications.
Miller, A.B. (2001), Bluetooth Revealed: The Insiders Guide to an Open Specification for Global Wireless Communications, 2nd Edition, USA, Prentice Hall [Accessed 6th April, 2008]
Finally, the current parental oversharing of sensitive information is a trending topic, as it is especially affecting today’s children, adolescents, and young adults. The longevity of anything posted on the internet makes it extremely hard to come up with any solutions to this issue, although it could be avoided if parents were more careful and thoughtful when posting anything regarding their
2. Unknown. Protecting your Privacy on the Internet (2003). Office of the Federal Privacy Commissioner. 29th March 2004. http://www.privacy.gov.au/internet/internet_privacy/
This paper is going to discuss wireless security from a broad view where I will go into why exactly wireless security is so important especially today as the ways in which we are communicating is changing dramatically. From there I will discuss the multiple wireless securities that are available to give a better understanding of the options given. Then I will go into why exactly not protecting your wireless can be so dangerous with some descriptions on the most dangerous wireless attacks out there today. Finally I will then discuss how we can better prepare for these types of attacks with a synopsis on several effective security methods that will help to ensure data is securely passed and kept hidden.
...n them and their friends. Online predators mainly exist on the Internet, because they take advantage of the anonymity that social networking sites provide. They usually treat their victims with kindness, attention and even gifts. Once the predator build trust with their victim, they will try to meet them in real life in hope that they can fulfill their fantasies of having sexual encounter with underage kids.
This essay received an "A." This essay's greatest strength is the writer's use of sophisticated syntax, employing phrases, and in dependent and independent clauses, modifying the main clauses, and creating a rhythmic reading pattern.
Introduction: This is a 21th century, technology is the most important and improved thing of the human life. It makes life easier and faster. Development of faster sophisticated technology we have better and fast life. So all we are connect each other by computer network. There are two different way of network: Wired and wireless. Now day we can found network almost everywhere. Home, business, public place, Airport, Planes, hospitals, school, train everywhere we can found networking. Therefore, almost every sector of the economy that has affected by wired and wireless technology. Wired network and wireless protect both has security, But in general wireless network is less secure than wired networks. For proper security AP (access point) and its antenna should be right position. Also add a wireless access point or use a wireless router we can connect to network wirelessly. AS we using more and more of devices (smart phones, tablet and computers) rely on wireless networking, we have to improve our network security too.