Purpose of Project
You will research threats to a company's information technology and share your finding with the class using a 4-5 minute video and a discussion board post.
Project Topics
Your will research one of the following topics.
1.01 External Disasters (natural v. accidental v. intentional) ... not attacks on company but affects company
1.02 Internal Conditions and Failures (environmental v. hardware failure v. software failure)
1.03 Internal Human Threats (careless employees v. intentional acts of employees v. theft of intellectual property)
1.04 Competitor Threats (theft of intellectual property v. Predatory Pricing)
1.05 Hacker Types (3+ different types)
1.06 Acts of Hackers (copy v. alter v. delete)... what hacker gains and what company loses
1.07 Gaining access with malware (virus v. worm v. Trojan horse)
1.08 Gaining access with malware (spyware types V. ransomware)
1.09 Attempts to gain access (phishing v. social engineering v. password cracking)
1.10 Attacks (website defacement v. domain redirecting v. denial of service)
1.11 Electronic Eavesdropping Methods
1.12 Wasting Time and Bandwidth (External like Spam v. Employee initiated like Facebook)
Project Requirements Your project must include (but is not limited to the following:
• Definitions
• Examples
• For multiple terms, compare and contrast
• Specific ways this threat can harm a company and the possible financial impact of that harm. It is not enough just to say "the company could lose money." Be specific about how the company would lose money: loss of revenue, increase in expense, etc.
• What about tablets and smart phones that connect to the company's network?
• Briefly give at least one way to control against this threat.
Students succeed in their courses by connecting and communicating with an expert until they receive help on their questions
Consult our trusted tutors.