Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

Discuss one of the most important things you will take from this course. You do not have to document your sources for this question. It is an opinion question.response for Anjaneyulu PallatiInformatio

Discuss one of the most important things you will take from this course. You do not have to document your sources for this question. It is an opinion question.

response for Anjaneyulu Pallati

Information systems security course provided security principles and practices of information systems. I also understood the basic principles and practices in information systems security. I understood what the foundation theory is behind computer security, what the common threats are, and how to play with the games with attackers. A software program which is intended to damage computers and networks is called a malware. It also has about Hacking is the process of identifying the weaknesses of the systems to gain the access to the system.  Hacking is one of the most dangerous cyber crimes when compared to other cyber crimes because hacking includes all types of computer crime. The second type of cyber crime is phishing. It's when cyber criminals leak personal information of famous people through email and other social networking sites. Cyber hack can be launched from one system to another system and from multiple networks.  Hackers use a variety of tools to launch attacks, including malware, ransomware, exploit kits, and other methods. By targeting the computer and its network connection, or the computers and network of the sites that a user trying to access, an attacker may be able to prevent you from accessing email, websites, online accounts, or other services that rely on the affected computer. It also taught about data breach. Data breach is a confirmed incident in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed in an unauthorized fashion. It enlisted the database security issues and solutions, including models, architectures, and mechanisms for database security. It stated program security issues, including virus, worm, and logical bombs, the basic concepts and general techniques in security auditing and risk assessment. It also explained about the issues related to administration security, physical security, and program security. It determined appropriate mechanisms for protecting information systems ranging from operating systems, to database management systems, and to applications.

response for Sai Ram Nellutla

This course has helped significantly on what to do and what not to do especially in the work environment. Being a healthcare industry-oriented worker, a lot has been consumed from this course that will help to be in a secured environment amidst myriad number of people constantly trying to obtain sensitive data every day. It is difficult to state one important thing that I consumed from the course but everything I learnt has its own importance.  But if I have to choose, I think the information gained on social engineering attacks, email parsing helps me a lot in day to day life. By gaining the knowledge on social engineering attacks and the ways to tackle them, I acquired the abilities to tackle such attacks in my day to day life where these kinds of attacks are most expected. Also gaining the knowledge on email scraping helps me in identifying the source of the malicious emails I receive which looks similar to genuine emails but are sent as a trap to fetch sensitive data.

Also, the knowledge on user technology security, security of data communications,  beating the malware and spam, learning about back up strategies expanded my scope in this field and will help be one or the other time as I make progress in my career.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question