Practice PT - Big Data And Cybersecurity Dilemmas - AP COMPUTER SCIENCE - Assigment

864 words - 4 pages

Name:
Practice PT - Big Data and Cybersecurity Dilemmas
To help explain your topic you will write responses to the prompts below. Your responses must provide
evidence of the extensive knowledge you have developed of your topic and its impacts. Write your responses
so they would be understandable to someone who is not familiar with the topic. Your response to any one
prompt must not exceed 300 words.
Individual Written Responses:
a. Describe the dilemma.
● What are the details of your specific issue or instance of the dilemma?
● Explain both sides of the issue and the potential beneficial and harmful effects. Your description
should include:
○ the populations that are impacted by both the beneficial and harmful effects.
○ the potential consequences of choosing one side of the argument over the other.
Although it seems like common sense to use data encryption in business and other entities for security,
Backdooring encryption algorithms is considered as the best way to enforce cryptographic control. The NSA
(National Security Agency) has taken the decision to impose “backdoors” in response to ​terrorist attack​s and
robberies, which are the most common issues nowadays. For example, the attack in San Bernardino, CA,
revealed the lack security that our society has, resulting on the death of 14 people. Members of the FBI tried to
track and investigate terrorist's iPhone, ultimately cracking the PIN code on the device in order to find more
evidence from another possible attack to the nation from those people. The FBI required support from Apple and
suggested a “backdoor” in order to obtain more information about the criminals. After analyzing their decisions, I
decided to strongly support the idea of providing a “backdoor” among cyber industries because it will protect the
entire nation (the population in general) and will lead to find real criminals that live among us. However, this
decision also has its negative side, including the invasion to the right of privacy, even if it’s protecting the life of
tons of people. Organizations such as the ​Electronic Privacy Information Center​ and the ​Electronic Frontier
Foundation​ challenged the “backdoors” imposed by the NSA, saying that it would have the effect not only of
subjecting citizens to increased and possibly illegal government ​surveillance​, but that the strength of the
encryption could not be evaluated by the public as its design was classified secret, and that therefore individuals
and businesses might be hobbled with an insecure communications system.
b. Explain the computing “innovation” that gave rise to this dilemma, both how it functions and how it is
used.
● Connect what you researched to terminology and ideas you have learned in this course, and
specifically during this unit.
● Your description does not need to be overly technical, but should aim to explain elements of the
technology that you think the “average” person might not know...

More like Practice PT - Big Data And Cybersecurity Dilemmas - AP COMPUTER SCIENCE - Assigment

Computing Fields And How They Vary - Orientation To Computer Science - Essay

1003 words - 5 pages Free ... . Computer science is the best fit for me, and I chose it for several reason. I have always had talent with computers. They have always made sense to me, and I always figured that my career would involve them; I just did know how. Then, I took AP Computer Science my senior and fell in love with Java programming. I scored a five on the exam, and I loved solving those problems. I also love the logic that is in mathematics. This works degree is perfect for me because I love math and programming. As of right now, I do not have any desire to study anything else. ...

AP Computer Science Review Document - Eaton High School - Essay

470 words - 2 pages ... Literature Circle Self-Assessment Rubric YOUR SCORE __12___/12 Lit Circle Objective: Increase our understanding of texts through meaningful, interpretive and evaluative analysis, discussion, and presentation. Indicate your role: Discussion Director/Questioner Line Illuminator Connector Researcher *When assessing yourself, please highlight or underline the details below that describe your performance today. And DON’T ...

ENG 114 Source Evaluation Assignment

633 words - 3 pages ... doing the research on computer networks, network and system security and cybersecurity. He earned his PhD about computer science from the University of Buckingham in England. Therefore, these two author are both earned their degree in the internet security area and they are the professors from University of Carabobo and University of Kentucky, which means they have professional knowledge about mobile payment security. The title is " Secure ...

ABC Sex Education - The Ultimate Essay - Camden High School - Essay

865 words - 4 pages ... ://www.amazon.com/Skytech-Gaming-ST-SHADOW-II-002-Computer -Desktop/dp/B0771BZY8Z AP Computer Science Principles Effective Fall 2017 Page 1​ of 3 https://www.videoblocks.com/video/wifi-symbol-logo-a-sign-for-wireless-int ernet-loop-black-rhhcqvwuzjd58gqj0 Computing Innovation 2c)  VR has many beneficial benefits. One of these is the ability to bring office workers digitally together in events such as conferences and meetings. In this case, rather than just ...

Climate Change And Cyber Security - English - Essay

2220 words - 9 pages Free ... to critical infrastructure and information risk. The correlation can assist companies to come up with successful cybersecurity policies. In the virtual space, firewalls, computer servers, routers and related technology rest at the utmost border, or edge, of a secure computer network. These cyber tools create a borderline between susceptible internal sources and external networks, and hackers time and again concentrate on getting through these ...

Information System Paper On Digital IT - York University - Essay

4589 words - 19 pages ... Nevin Buconjic in class, digital IT is facing some critical issues now and as a city we should work together to resolve the problems and promote economic development. Some of the issues include; there not enough Computer Science graduates and Programs in the city. Sault Ste. Marie has two college institutions that offer computer science and often after graduation, the students move to different school to complete the program or move to different ...

Veterans Affair Data Theft Issue - Universoty Of The Cumberlands ,legal Regulations - Essay

521 words - 3 pages ... UNIT - 1 ASSIGNMENT - 2 Legal Regulations Compliance and Investigation Case Scenario: Veterans Affairs Data Loss Evaluation Based on the information provided in this case, A burglary turned into a massive data theft, the agency employee had taken home his work computer which had a lot of sensitive information regarding Veterans. The article says that 26.5 million records were stolen which included, Social Security Numbers, Date of Birth as well ...

Sylaabus Verview For Precalculas - Chelmsford High School - Math Precalculas

946 words - 4 pages ... AP Physics 1 Instructor: Mr. Kuffer Course Overview Prerequisites 1. 80% or higher in Honors Algebra 2 (3202); or higher level math course; or 90% or higher in Academic Algebra 2 (3103). 2. 80% or higher in Honors Chemistry (4610) or 90% or higher in Academic Chemistry (4911). 3. Recommendation of prior year's Science Teacher. Textbook Cutnell & Johnson Physics 9e Big Ideas for AP Physics 1 Big Idea 1: Objects and systems have properties such as ...

Causation Essay Identity Theft Is Real - College English - Essay

514 words - 3 pages ... precaution, never respond to unfamiliar emails as this is another clever ploy of hackers and identity thieves. Only use trusted data sources and be careful with where and with whom you share your personal information.  Subscribing to a trusted cybersecurity agency to monitor your information and mitigate losses caused by identity theft is another solution. As our society continues the trend toward the internet, we can be sure that identity theft will sadly always be a real and prevalent crime ...

Analysis Of The Ap Chinese Language

1473 words - 6 pages ... indicates how well students have accomplished the objectives (Brown & Abeywickrama, 2010).The AP Chinese exam is a computer-based test. General advantages of computer-based test include: increased administration and scoring efficiency; reduced costs; improved test security, consistency and reliability, fewer response entry and recognition errors etc. (Thelwall, 2000). Students read directly from a computer screen, listen through a headset ...

The Benefits Of Deploying A Data Warehouse Platform - Sri Venkateswara College Of Engineering - Assignment

790 words - 4 pages ... their organization's historical activities -- both successes and failures. While big data and analytics do have their place, data warehousing stands out as a practical, proven practice for analyzing structured business data in order to support data-driven decision making. What is a data warehouse platform? A data warehouse is best defined by the type of data it stores, and the people who use it. Designed for decision support and BI activities, the ...

The Fight Against Cyber Security Threat - SERC Access - Essay

783 words - 4 pages ... Cyber security induction assignment According to Goutam (2015), Cyber security is defined as processes and technologies manufactured to safeguard computers, networks, data and software from unlawful access. Experts predict that there will be approximately 200 billion connected things by the year 2020; These include cities; cars; planes; and homes (Cerrudo, 2018). Overall, I have a positive view on technology, however I also feel that it is ...

Data Breach At Equifax The Challenges And The New Cyber Threats - UNB - Assignment

2763 words - 12 pages Free ... marketplace. C. THE NEW CYBER THREATS The countries of the world need to be conscious of the severity of this cybercrime problem. A study conducted by cybersecurity ventures predicts these crimes will cost the world $6 trillion a year by 2021. (Rafter, D., 2018) This is a big number, but this should not take anyone who has followed the exploits of hackers and online scammers in 2018 by surprise. Cybercrimes have become big news, with large data ...

Lab #7 Case Study On Digital Millennium Copyright Act: Napster - Legal Issues In Information Systems - Lab 4

1039 words - 5 pages ... the District Court and lost an Appeal. They filed for bankruptcy and were bought by Best Buy (Director of Dra Operations It Grc and Cybersecurity Programs Educause Joanna Lyn Grama & Grama, 2014). Describe the provisions of the Digital Millennium Copyright Act. There are four and you only have to meet one of them to be protected even though you might be an offender for one of the others. But you must meet all requirements of the single safe ...

Computer Science Trends Biology Issues - Tennessee State University English - Research Paper

1224 words - 5 pages ... -do-computer-science-degree. “Who Earns Bachelor's Degrees in Science and Engineering?” STEM Education Data and Trends, www.nsf.gov/nsb/sei/edTool/data/college-14.html. “Why Do so Few People Major in Computer Science?” Dan Wang, 27 Aug. 2017, danwang.co/why-so-few-computer-science-majors/.thor “Biology Majors Guide.” Worldwidelearn.com, www.worldwidelearn.com/online-education-guide/science/biology-major.htm. Drew, Christopher. “Why Science Majors ...