assessmentwk1
.docx
keyboard_arrow_up
School
University of Phoenix *
*We aren’t endorsed by this school
Course
110
Subject
Business
Date
May 14, 2024
Type
docx
Pages
2
Uploaded by CountLemurPerson1025 on coursehero.com
CYB/110 Week 1 Assessment
Ellen Williams
3/25/2024
Coming into this program, I was uncertain about my skills and abilities to complete this degree. I know I will need to study hard and take a few extra courses to build my confidence in the world of cybersecurity. Even though I have grown up with the internet and technology continuously evolving, I am not as tech-savvy as I would like. I have grown up with computers, so I am confident in navigating through the basic skills but for most of my education, I learned about Word, Excel, and PowerPoint. Looking at the modules helped me to bring back some knowledge of computers I had learned growing up. I was confident about managing user accounts during the lab. I remember learning how to set passwords, rename accounts, and add users from high school and college. From there it was easy to learn how to lock out guests and restrict access as well. I will say that it was easy to follow the directions during the lab and being provided with pictures helped tremendously. I mostly was insecure about not knowing about some of the operating systems. I did not know what jump lists or BitLocker were until I was shown how to disable them during the lab. To help my confidence in continuing this course, I made sure to look up and google anything that I was uncertain about. I want to learn as
much as I can about this field. Learning how to enable firewalls and encryption on my computer is helping me realize how easy it is to set up simple security measures for the future.
I will always make sure that my computer will have a password for access and will automatically ask for one anytime it goes to sleep. Making sure that I can limit access to my information will be key to protecting my assets. Managing any accounts that have access to my computer and keeping any files hidden or non-shareable will also help with security. I know many other security measures can be implemented to keep information safe.
I plan on taking some outside courses from study.org or Sophia.com so that I can learn more about computer technology outside of cybersecurity. A
few of the classes offered will help me to learn more about operating systems, Linux, SQL, and different programming languages. I will hopefully start an internship in my last year at Phoenix so that I may gain some hands-
on experience outside the classroom. I was also introduced to someone currently in the field and will be using her as a resource on what to expect after graduation or any outside certification programs that will continue to educate me. In my future career, I see myself using most of the skills I learned in the lab. Putting passwords to my account, managing accounts, and making sure my files are not sharable will be useful. I will be able to control who can see any sensitive files. Encryption and firewalls will be highly recommended to keep any files protected from malicious actors. I will continue to update and patch systems to eliminate as many vulnerabilities as possible. These basic implementations will help to combat many malicious actors trying to gain access to sensitive information. Learning these skills this week will help
me to continue to build my knowledge in cybersecurity, but I still have a long
way to go. With technology advancing I will also have to continue to learn even after graduation.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Give me a definition of "computer management," please.
arrow_forward
You are in your last semester of college and have been looking for a job. You have registered with the placement office and posted your résumé online, but the jobs that are available leave a bit to be desired. In one of your classes you overhear a classmate, Alex, talking about an interview he had last week. Alex said that he really wanted the job but didn’t think his interview went particularly well. He is currently waiting to hear back from the employer. As Alex was describing the position, you thought it sounded very interesting, but you wondered if it would be right for you to pursue the position since Alex had found it first.
Question: Do you have any obligation to tell Alex if you apply for the job?
arrow_forward
principles of information security
A) Discuss the relationship between Contingency planning security risk management and business continuity.
arrow_forward
You are in your last semester of college and have been looking for a job. You have registered with the placement office and posted your résumé online, but the jobs that are available leave a bit to be desired. In one of your classes you overhear a classmate, Max, talking about an interview he had last week. Max said that he really wanted the job but didn’t think his interview went particularly well. He is currently waiting to hear back from the employer. As Max was describing the position, you thought it sounded very interesting, but you wondered if it would be right for you to pursue the position since Max had found it first.
Question: If you interview for the job, how would you respond if asked how you heard about the opening?
arrow_forward
A new company just employed you as a system administrator. The company dealswith computers and installation of services as well as computer networking. Theyare currently experiencing threats of accidents and malfunction in their operationswith their clients. Online business has now become a major part of their businesssince many businesses are now moving to computer network operations. Theelectronic business security has become a major concern of most of your clients.The issue has become a major concern to your CEO and has asked you to handlethe concerns of your client as a newly appointed system administrator by holdbusiness meeting with your clients via zoom to address the following throughpresentation:
Explain the factors that increase the risk of E-business security
arrow_forward
A new company just employed you as a system administrator. The company dealswith computers and installation of services as well as computer networking. Theyare currently experiencing threats of accidents and malfunction in their operationswith their clients. Online business has now become a major part of their businesssince many businesses are now moving to computer network operations. Theelectronic business security has become a major concern of most of your clients.The issue has become a major concern to your CEO and has asked you to handlethe concerns of your client as a newly appointed system administrator by holdbusiness meeting with your clients via zoom to address the following throughpresentation:A. Identify eight (8) threats of accidents and malfunction in electronic businesssecurity.
arrow_forward
XYZ Company has been using a records management system to track where their documents are being delivered and processed. Since the use of this system, they have saved time, have been more productive and efficient. These benefits produced by the system are known as what?a) Economic Benefits
b) Intangible Benefits
c) Operational Benefits
d)Tangible Benefits
arrow_forward
A new company just employed you as a system administrator. The company dealswith computers and installation of services as well as computer networking. Theyare currently experiencing threats of accidents and malfunction in their operationswith their clients. Online business has now become a major part of their businesssince many businesses are now moving to computer network operations. Theelectronic business security has become a major concern of most of your clients.The issue has become a major concern to your CEO and has asked you to handlethe concerns of your client as a newly appointed system administrator by holdbusiness meeting with your clients via zoom to address the following throughpresentation:
Explain the methods of minimizing the risk of E-business security
arrow_forward
The company hires independent contractors to perform a variety of customer-focused tasks, such as complaint resolution, for its client, the financial services industry.
We get to know all of our contractors because, as the chief of staff puts it, "vetting of such contractors is very important because of the nature of our client's business. We've even watched contractors develop. We have one contractor with us today who started at 16 and is now a manager at 26."
The contractors are introduced to more than just the chief. Some of the contractors have been working with a customer for so long that if they leave, the crew must continue.
This company has 4,000 contractors and 226 full-time employees, so succession planning must take both into consideration.
When working with a contractor, it usually recommends to its financial services clients that they add the contractor to their at-risk registry.
The client will hire a full-time employee, and the contractor will learn new skills.
Select…
arrow_forward
Insecure usage of the many applications through mobile devices may allow cyber criminals to access sensitive information such as mail account and contacts information of your mobile devices. Many agencies have cautioned against the cyber vulnerability of the many popular games and applications and few others, used by tens of thousands of people who are confined to home due to the COVID-19 pandemic.
Using your own experience the various cyber threats in using these vulnerable apps can be? and what security measures we can adopt to combat them .
arrow_forward
A new company just employed you as a system administrator. The company dealswith computers and installation of services as well as computer networking. Theyare currently experiencing threats of accidents and malfunction in their operationswith their clients. Online business has now become a major part of their businesssince many businesses are now moving to computer network operations. Theelectronic business security has become a major concern of most of your clients.The issue has become a major concern to your CEO and has asked you to handlethe concerns of your client as a newly appointed system administrator by holdbusiness meeting with your clients via zoom to address the following throughpresentation:
outline the threats of computer crime
arrow_forward
Insecure usage of the many applications through mobile devices may allow cyber criminals to access sensitive information such as mail account and contacts information of your mobile devices. Many agencies have cautioned against the cyber vulnerability of thePage 3 of 3many popular games and applications and few others, used by tens of thousands of people who are confined to home due to the COVID-19 pandemic.Using your own experience the various cyber threats in using these vulnerable apps can be? and what security measures we can adopt to combat them .
arrow_forward
Principles of Information Security
Q : Explain how understanding the available cybersecurity defenses would help organizations prioritize risk mitigations as part of a defense-in-depth strategy
arrow_forward
Please i Want a good answer for this Question
Thanks In Advance.
arrow_forward
What role should a business manager play in helping determine the computer hardware that the organization will use?
arrow_forward
I may have the answer but I'm not sure
arrow_forward
Can someone pls help with this?
Contacting your representative is one way to engage in politics, but many Texans are unsure how to get in touch with their representatives or how to make their wishes known. This assignment is designed to allow you the opportunity to walk through the process of contacting a representative in the Texas Legislature. You will walk through the process but you are not required to actually call or email your representative. However, if you do reach out to your representative, please include the outcome.
Questions
1.Select an issue that you are concerned about. Explain in one paragraph why you are interested in this issue and what you believe should be done about it.
2.Research your issue and explain if and when this has come before the Texas Legislature in the past. If it has not, explain why you think it has not yet come before the legislature.
3.Pick a representative to write or call about your issue. Explain why you picked this specific…
arrow_forward
1. Research a selected Internet of Things (IoT) device or devices for your large organization.
2. Explain the strategic use of this IoT device(s) and its diffusion and implementation timeline in your organizational setting.
3. Describe the risks this IoT device poses to future organizational revenue streams, expenses, and security.
4. Conclusions
arrow_forward
Which 4 methods allow clients to process digital payments from customers using QuickBooks Online Payments?(Select all that apply)
A. Running a card through a card reader attached to a mobile device
B. Entering payments manually as a Receive Payment
C. Taking client payment via cryptocurrency
D. Entering payments manually as a Sales Receipt
E. Entering payments manually as a Credit Memo
F. Sending a Sales Receipt to a customer via email
G.Taking client payment via the Pay Now button on an emailed Invoice
arrow_forward
Chapter 9 and 10 critical thinking questions
why would an email rule memo like this work better as an innovation driven company such as Tesla rather than a manufacturing company such as general motors
arrow_forward
please, I am trying to collect this data, but I am not getting it. help
arrow_forward
How do businesses that run in the cloud have to deal with the problems? This approach should be talked about in terms of its possible risks and benefits.
arrow_forward
List four reasons why your participation as a user of an information system is critical during the systems development life cycle, linking the concepts of user involvement and change management in a software implementation project.
Why is it so important to understand how a business process works when trying to develop a new information system?
arrow_forward
The purpose of this project is to research the cutting-edge technology available in the market place and
propose a practical use of it in Accounting Information System. The technology may be currently in use in a
limited capacity or may be a future concept. Students are expected to use books, articles, internet, and any other
available sources to collect information to do this project. Each source must be properly sited.
1) Description of the technology
2) Its use in a particular business cycle
3) Its benefits
4) Its disadvantages
arrow_forward
You are in your last semester of college and have been looking for a job. You have registered with the placement office and posted your résumé online, but the jobs that are available leave a bit to be desired. In one of your classes you overhear a classmate, Bernardo, talking about an interview he had last week. Bernardo said that he really wanted the job but didn’t think his interview went particularly well. He is currently waiting to hear back from the employer. As Bernardo was describing the position, you thought it sounded very interesting, but you wondered if it would be right for you to pursue the position since Bernardo had found it first.
Question: Should you apply for the job? Should you wait until Bernardo hears from the employer?
arrow_forward
Because automation relies on knowledge information technology, what is the reason for this dependence?
arrow_forward
19-Information systems are designed to support companies as a whole, departments, and employees. List and describe one type of information system that supports each one of the mentioned categories.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
BUSN 11 Introduction to Business Student Edition
Business
ISBN:9781337407137
Author:Kelly
Publisher:Cengage Learning
Essentials of Business Communication (MindTap Cou...
Business
ISBN:9781337386494
Author:Mary Ellen Guffey, Dana Loewy
Publisher:Cengage Learning
Accounting Information Systems (14th Edition)
Business
ISBN:9780134474021
Author:Marshall B. Romney, Paul J. Steinbart
Publisher:PEARSON
International Business: Competing in the Global M...
Business
ISBN:9781259929441
Author:Charles W. L. Hill Dr, G. Tomas M. Hult
Publisher:McGraw-Hill Education
Related Questions
- Give me a definition of "computer management," please.arrow_forwardYou are in your last semester of college and have been looking for a job. You have registered with the placement office and posted your résumé online, but the jobs that are available leave a bit to be desired. In one of your classes you overhear a classmate, Alex, talking about an interview he had last week. Alex said that he really wanted the job but didn’t think his interview went particularly well. He is currently waiting to hear back from the employer. As Alex was describing the position, you thought it sounded very interesting, but you wondered if it would be right for you to pursue the position since Alex had found it first. Question: Do you have any obligation to tell Alex if you apply for the job?arrow_forwardprinciples of information security A) Discuss the relationship between Contingency planning security risk management and business continuity.arrow_forward
- You are in your last semester of college and have been looking for a job. You have registered with the placement office and posted your résumé online, but the jobs that are available leave a bit to be desired. In one of your classes you overhear a classmate, Max, talking about an interview he had last week. Max said that he really wanted the job but didn’t think his interview went particularly well. He is currently waiting to hear back from the employer. As Max was describing the position, you thought it sounded very interesting, but you wondered if it would be right for you to pursue the position since Max had found it first. Question: If you interview for the job, how would you respond if asked how you heard about the opening?arrow_forwardA new company just employed you as a system administrator. The company dealswith computers and installation of services as well as computer networking. Theyare currently experiencing threats of accidents and malfunction in their operationswith their clients. Online business has now become a major part of their businesssince many businesses are now moving to computer network operations. Theelectronic business security has become a major concern of most of your clients.The issue has become a major concern to your CEO and has asked you to handlethe concerns of your client as a newly appointed system administrator by holdbusiness meeting with your clients via zoom to address the following throughpresentation: Explain the factors that increase the risk of E-business securityarrow_forwardA new company just employed you as a system administrator. The company dealswith computers and installation of services as well as computer networking. Theyare currently experiencing threats of accidents and malfunction in their operationswith their clients. Online business has now become a major part of their businesssince many businesses are now moving to computer network operations. Theelectronic business security has become a major concern of most of your clients.The issue has become a major concern to your CEO and has asked you to handlethe concerns of your client as a newly appointed system administrator by holdbusiness meeting with your clients via zoom to address the following throughpresentation:A. Identify eight (8) threats of accidents and malfunction in electronic businesssecurity.arrow_forward
- XYZ Company has been using a records management system to track where their documents are being delivered and processed. Since the use of this system, they have saved time, have been more productive and efficient. These benefits produced by the system are known as what?a) Economic Benefits b) Intangible Benefits c) Operational Benefits d)Tangible Benefitsarrow_forwardA new company just employed you as a system administrator. The company dealswith computers and installation of services as well as computer networking. Theyare currently experiencing threats of accidents and malfunction in their operationswith their clients. Online business has now become a major part of their businesssince many businesses are now moving to computer network operations. Theelectronic business security has become a major concern of most of your clients.The issue has become a major concern to your CEO and has asked you to handlethe concerns of your client as a newly appointed system administrator by holdbusiness meeting with your clients via zoom to address the following throughpresentation: Explain the methods of minimizing the risk of E-business securityarrow_forwardThe company hires independent contractors to perform a variety of customer-focused tasks, such as complaint resolution, for its client, the financial services industry. We get to know all of our contractors because, as the chief of staff puts it, "vetting of such contractors is very important because of the nature of our client's business. We've even watched contractors develop. We have one contractor with us today who started at 16 and is now a manager at 26." The contractors are introduced to more than just the chief. Some of the contractors have been working with a customer for so long that if they leave, the crew must continue. This company has 4,000 contractors and 226 full-time employees, so succession planning must take both into consideration. When working with a contractor, it usually recommends to its financial services clients that they add the contractor to their at-risk registry. The client will hire a full-time employee, and the contractor will learn new skills. Select…arrow_forward
- Insecure usage of the many applications through mobile devices may allow cyber criminals to access sensitive information such as mail account and contacts information of your mobile devices. Many agencies have cautioned against the cyber vulnerability of the many popular games and applications and few others, used by tens of thousands of people who are confined to home due to the COVID-19 pandemic. Using your own experience the various cyber threats in using these vulnerable apps can be? and what security measures we can adopt to combat them .arrow_forwardA new company just employed you as a system administrator. The company dealswith computers and installation of services as well as computer networking. Theyare currently experiencing threats of accidents and malfunction in their operationswith their clients. Online business has now become a major part of their businesssince many businesses are now moving to computer network operations. Theelectronic business security has become a major concern of most of your clients.The issue has become a major concern to your CEO and has asked you to handlethe concerns of your client as a newly appointed system administrator by holdbusiness meeting with your clients via zoom to address the following throughpresentation: outline the threats of computer crimearrow_forwardInsecure usage of the many applications through mobile devices may allow cyber criminals to access sensitive information such as mail account and contacts information of your mobile devices. Many agencies have cautioned against the cyber vulnerability of thePage 3 of 3many popular games and applications and few others, used by tens of thousands of people who are confined to home due to the COVID-19 pandemic.Using your own experience the various cyber threats in using these vulnerable apps can be? and what security measures we can adopt to combat them .arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- BUSN 11 Introduction to Business Student EditionBusinessISBN:9781337407137Author:KellyPublisher:Cengage LearningEssentials of Business Communication (MindTap Cou...BusinessISBN:9781337386494Author:Mary Ellen Guffey, Dana LoewyPublisher:Cengage LearningAccounting Information Systems (14th Edition)BusinessISBN:9780134474021Author:Marshall B. Romney, Paul J. SteinbartPublisher:PEARSON
- International Business: Competing in the Global M...BusinessISBN:9781259929441Author:Charles W. L. Hill Dr, G. Tomas M. HultPublisher:McGraw-Hill Education
BUSN 11 Introduction to Business Student Edition
Business
ISBN:9781337407137
Author:Kelly
Publisher:Cengage Learning
Essentials of Business Communication (MindTap Cou...
Business
ISBN:9781337386494
Author:Mary Ellen Guffey, Dana Loewy
Publisher:Cengage Learning
Accounting Information Systems (14th Edition)
Business
ISBN:9780134474021
Author:Marshall B. Romney, Paul J. Steinbart
Publisher:PEARSON
International Business: Competing in the Global M...
Business
ISBN:9781259929441
Author:Charles W. L. Hill Dr, G. Tomas M. Hult
Publisher:McGraw-Hill Education