Repository logo
 

Student Papers

Permanent URI for this collectionhttp://hdl.handle.net/10342/10600

Browse

Recent Submissions

Now showing 1 - 4 of 4
  • ItemOpen Access
    Mobile Device Management Policy
    (2022-04-08) Meadows, Sydney
    The use of mobile devices in the workplace has grown significantly over the years. Most adults do not leave home without their phones, laptops, tablets, or other portable media devices. With this expansion, there needed to be a policy put in place to protect those devices from cybersecurity threats and threats that can occur. This is how the Mobile Device Management (MDM) Policy was created and has been implemented and most companies throughout the world. In this paper, I will go into depth about the MDM policy and why it is important in today's world of technology, especially within the workplace.
  • ItemOpen Access
    The Dangers of Online Shopping
    (2022-04-19) Meadows, Sydney
    Online shopping has become a crucial part of society in today’s age of technology. Many of us face identity theft, credit card theft, and more just by putting our personal information on shopping websites. Downloading things like VPNs, Antivirus Software, and Firewalls is one of many ways you can stay safe while surfing the internet and buying things online. Even what we think are secure sites like Amazon, have hackers constantly looking for loopholes in their sites. For this project, I will explain what makes online shopping dangerous, what can help you stay safe while shopping, and ways to prevent information theft while shopping in the future.
  • ItemOpen Access
    Is Digital Piracy a Crime?
    (2022-04-19) Sutton, Raegine
    Digital piracy is the unauthorized illegal copying and distribution of digital copyrighted content. Copyrighted content refers to Intellectual Property. Property that consist of intangible creations of the human intellect. Individuals that download songs, movies, and art from a website for free are committing digital piracy. For instance, watching a video on YouTube and transferring the URL to a MP3 converter on a different website and converting it to an MP3 music file for free is illegal. There are numerous names for digital piracy depending on the specific type of content being copied and distributed however this paper will examine digital piracy as a whole. The paper will begin with introducing digital piracy. Then the psychological aspects of digital piracy, why people choose to do it. The paper will then discuss the dangers and attacks associated with digital piracy. Lastly, it will discuss the consequences, solutions, and end with a conclusion on digital piracy.
  • ItemOpen Access
    Protecting Yourself from Targeted Ransomware
    (2022-04-19) Alston, Marcus
    In the Dynamic Environment we live in today, there are many devices that are becoming obsolete. They are becoming ancient with the times and many new technologies are trending in a rapid rate. However, some of these new devices have threats that are advanced. One of these new threats is called targeted ransomware. Targeted Ransomware is a new cyber threat that could possibly create issues in a business or in an organization. In this essay we will be going over the effects of Targeted Ransomware, the Dynamic and Functionality of Targeted Ransomware and what are some preventive measures that are being created to prevent Ransomware.