PLEASE USE SOURCES PROVIDED AND ONLY USE EXTERNAL IF IT

 PLEASE USE SOURCES PROVIDED AND ONLY USE EXTERNAL IF IT IS THE LAST OPTION

Research and learn about the three topics listed below. 

1.  Dataveillance  

2.  Cryptography

4.  Mobile Phone 

5.  Browser fingerprinting  

6.  Online Scams  

7. Cryptojacking

8. Cyber-Physical Attacks

9. IOT Attacks

10. Phishing

11. Ransomware

12. Worm 

13. Bluejacking

14. Blue Snarfing

15. Passwords

16. “Juice Jacking”

Create a slide presentation detailing the information on your chosen topics. Upload your presentation in the assignment box. (Refer to rubric)

Requirements:

Slide #1-Title, Your Name, INF Section, Date

Slide #2,3-Choice #1

Slide #4-5-Choice #2

Slide #6-7-Choice #3

Slide #8-Work Cited

Answer for each choice the following:

1. What it is (description)?

2. What are the security problem or issues?

3. How to reduce or eliminate the threat? How the security issue(s) could be prevented or protected?

Additional Presentation Requirements:
Images/diagrams/background/animation

Upload your presentation in the assignment box.

Additional Sources: 
https://onlinedegrees.sandiego.edu/top-cyber-securitythreats/ 
https://www.fbi.gov/investigate/cyber
https://staysafeonline.org/
Ransomware Attacks Take On New Urgency Ahead of Vote 

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions