You will research threats to a company's information technology and share your
Ask Expert

Be Prepared For The Toughest Questions

Practice Problems

You will research threats to a company's information technology and share your

Purpose of Project

You will research threats to a company's information technology and share your finding with the class using a 4-5 minute video and a discussion board post.

Project Topics

Your will research one of the following topics.

1.01 External Disasters (natural v. accidental v. intentional) ... not attacks on company but affects company

1.02 Internal Conditions and Failures (environmental v. hardware failure v. software failure)

1.03 Internal Human Threats (careless employees v. intentional acts of employees v. theft of intellectual property)

1.04 Competitor Threats (theft of intellectual property v. Predatory Pricing)

1.05 Hacker Types (3+ different types)

1.06 Acts of Hackers (copy v. alter v. delete)... what hacker gains and what company loses

1.07 Gaining access with malware (virus v. worm v. Trojan horse)

1.08 Gaining access with malware (spyware types V. ransomware)

1.09 Attempts to gain access (phishing v. social engineering v. password cracking)

1.10 Attacks (website defacement v. domain redirecting v. denial of service)

1.11 Electronic Eavesdropping Methods

1.12 Wasting Time and Bandwidth (External like Spam v. Employee initiated like Facebook)

Project Requirements Your project must include (but is not limited to the following:

• Definitions

• Examples

• For multiple terms, compare and contrast

• Specific ways this threat can harm a company and the possible financial impact of that harm. It is not enough just to say "the company could lose money." Be specific about how the company would lose money: loss of revenue, increase in expense, etc.

• What about tablets and smart phones that connect to the company's network?

• Briefly give at least one way to control against this threat.

Hint
Accounts & FinanceThreats in a business are typically external and are one of the four in SWOT analysis; strengths, weaknesses, opportunities and threats. They can include weather, the economy, material shortage if the computer system is hacked if employment in your industry is strong if the market dries up to name just but a few....

Know the process

Students succeed in their courses by connecting and communicating with
an expert until they receive help on their questions

1
img

Submit Question

Post project within your desired price and deadline.

2
img

Tutor Is Assigned

A quality expert with the ability to solve your project will be assigned.

3
img

Receive Help

Check order history for updates. An email as a notification will be sent.

img
Unable to find what you’re looking for?

Consult our trusted tutors.

Developed by Versioning Solutions.