Student Papers
Permanent URI for this collectionhttp://hdl.handle.net/10342/10600
Browse
Recent Submissions
Item Open Access Mobile Device Management Policy(2022-04-08) Meadows, SydneyThe use of mobile devices in the workplace has grown significantly over the years. Most adults do not leave home without their phones, laptops, tablets, or other portable media devices. With this expansion, there needed to be a policy put in place to protect those devices from cybersecurity threats and threats that can occur. This is how the Mobile Device Management (MDM) Policy was created and has been implemented and most companies throughout the world. In this paper, I will go into depth about the MDM policy and why it is important in today's world of technology, especially within the workplace.Item Open Access The Dangers of Online Shopping(2022-04-19) Meadows, SydneyOnline shopping has become a crucial part of society in today’s age of technology. Many of us face identity theft, credit card theft, and more just by putting our personal information on shopping websites. Downloading things like VPNs, Antivirus Software, and Firewalls is one of many ways you can stay safe while surfing the internet and buying things online. Even what we think are secure sites like Amazon, have hackers constantly looking for loopholes in their sites. For this project, I will explain what makes online shopping dangerous, what can help you stay safe while shopping, and ways to prevent information theft while shopping in the future.Item Open Access Is Digital Piracy a Crime?(2022-04-19) Sutton, RaegineDigital piracy is the unauthorized illegal copying and distribution of digital copyrighted content. Copyrighted content refers to Intellectual Property. Property that consist of intangible creations of the human intellect. Individuals that download songs, movies, and art from a website for free are committing digital piracy. For instance, watching a video on YouTube and transferring the URL to a MP3 converter on a different website and converting it to an MP3 music file for free is illegal. There are numerous names for digital piracy depending on the specific type of content being copied and distributed however this paper will examine digital piracy as a whole. The paper will begin with introducing digital piracy. Then the psychological aspects of digital piracy, why people choose to do it. The paper will then discuss the dangers and attacks associated with digital piracy. Lastly, it will discuss the consequences, solutions, and end with a conclusion on digital piracy.Item Open Access Protecting Yourself from Targeted Ransomware(2022-04-19) Alston, MarcusIn the Dynamic Environment we live in today, there are many devices that are becoming obsolete. They are becoming ancient with the times and many new technologies are trending in a rapid rate. However, some of these new devices have threats that are advanced. One of these new threats is called targeted ransomware. Targeted Ransomware is a new cyber threat that could possibly create issues in a business or in an organization. In this essay we will be going over the effects of Targeted Ransomware, the Dynamic and Functionality of Targeted Ransomware and what are some preventive measures that are being created to prevent Ransomware.