Module 5- Putting It Together. Brooks.docx - Amanda Brooks...

This preview shows page 1 - 2 out of 2 pages.

The preview shows page 1 - 2 out of 2 pages.
Amanda BrooksCIS 201Module 5: Putting It TogetherPart 1:One of the difficulties in defending against cyber attacks that a USI student would faceinvolves universally connected devices. The book cites that the internet allows for someone halfway across the world to hack into the system. This could be ran by script kiddies who useattacking software that do the work for them, or by cybercriminals that want to steal personalinformation. This affects USI students because we are constantly on the internet. We are lookingthings up for school or for leisure. In addition, if someone hacked into the USI computernetwork, then they would have access to multiple computers that have a lot of data.Another difficulty potential threat is due to weak security update distribution. Asstudents, we aren’t actively looking for security updates to create an information securityperimeter to protect us. Because mainstream products usually alert us to these updates, many

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 2 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
N/A

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture