. In this exercise, you will convert the essay you wrote in Project 3 to a PowerPoint presentation. Read this all through to the end once before you try it. 2. Find the image files you downloaded as

We're the ideal place for homework help. If you are looking for affordable, custom-written, high-quality and non-plagiarized papers, your student life just became easier with us. Click either of the buttons below to place your order.


Order a Similar Paper Order a Different Paper

. In this exercise, you will convert the essay you wrote in Project 3 to a PowerPoint presentation. Read this all through to the end once before you try it.2. Find the image files you downloaded as you will use them here.3. Outline and develop your presentation on paper or using a word processor first. You must have:  * A title slide, with a good title (not “PC Security Presentation”) that applies to the specific aspect of security you are discussing, and your name below the title.  * A slide which introduces your topic. State what it is, why it’s important.  * 2 or 3 slides which detail your topic.  * A conclusion slide, which sums up your details/findings.  * A Works Cited slide which has the URLs of the Internet references where you found your information.4. As you work this out, follow these guidelines:  * Title slide must use the Title slide format.  * Intro, detail and conclusions slides     * can use the Title and content format, or possibly Two content,     * must be bulleted,     * must have a relevant title at the top of the slide,     * must have “several” bullets of several words each. No blocks of text,     * should follow the good presentation principles you read about earlier,     * are where the 2 images go, anywhere you want in there but only 1 image per slide, appropriately sized and located, and     * each image must be referenced or discussed in one or more bullets.  * Works Cited slide should use the Title and body format, title is “Works Cited”.5. When you create your slides, be sure to:  * add a Theme to all slides.,  * have slide numbers on all slides except the title slide,  * use bullet symbols for all bullet points. Any style you want, but the same style on all slides,  * add a transition,  * spell check, and  * remember we are keeping it simple: no gifs, no videos, no audio, no animations, no links.6. When you’re ready, create your presentation. Begin by choosing a Theme, then set the title slide up since that shows first, then work along – add a slide, add content to a slide, etc. until the basics are all done.7. Now finish up by adding other required format items, like the slide numbers, transitions and spell check.8. Save your file. Call it PC Security Presentation

. In this exercise, you will convert the essay you wrote in Project 3 to a PowerPoint presentation. Read this all through to the end once before you try it. 2. Find the image files you downloaded as
Phishing attacks security issue Ganga Adhikari Technology has developed drastically over the past few years, therefore, making lives easier and increasing access to information. Despite the advantages, hackers are taking advantage of the technology to access intellectual property and steal data from companies leading to damaged reputation, denial-of-access, fines, and lawsuits. (Gupta et al. 2016). Phishing attacks involve social engineering attacks where hackers pretend to be trustworthy information sources and send emails with malicious attachments, which, once downloaded or opened, lead to accessing the intellectual property of an organization. Therefore, for phishing attacks to occur, hackers have to create a message or email which seems credible, an example, one may receive an email from their bank prompting them to click a link and change their passwords. Once the links are clicked, the hackers can access all customer’s bank details or transfer finances without the user’s consent. Once the attack occurs, the company’s finances and reputation are affected since data is stolen and exposed, leading to customers’ lost confidence in the company. Some customers may file lawsuits against the company for leaking their private information, while the government may fine the company for failing to maintain a strong security system. To prevent such attacks, employee education is paramount, such that everyone understands how such attacks occur and instant reports are created when phishing attacks are detected. Generally, the attackers normally target individuals with limited knowledge of effective internet use. Therefore, equipping employees with skills ensures they can differentiate between credible and malicious emails received. The organization’s technical team should develop measures for detecting and eliminating malicious files. By installing antimalware programs in the company’s system, files and links are automatically scanned, the warnings are issued for potentially malicious files. The antimalware programs should automatically filter emails and text messages by automatically deleting malicious ones. Companies are forcing employees to use the spam filter option to ensure that suspicious emails are not accessed or opened. (Al-Hamar et al. 2019). Patching software is an effective mechanism where technicians install the latest software in the company’s system since hackers normally take advantage of outdated programs. However, ensuring continuously updated systems ensures that an organization’s intellectual property is always protected. Finally, scanning and vulnerability testing is effective for organizations in preventing potential attacks. Through security scans, organizations can actively check for malicious files and links accessed and then eliminate them. In conclusion, although phishing attacks have increased gradually in the past years, through proper security deployment and education programs, people can actively prevent them. For example, through user education, one understands how hackers take advantage of ignorance to send malicious links and files. While through the installation of appropriate security scanning software and spam filtering preventing the opening of malicious files. References Gupta, S., Singhal, A., & Kapoor, A. (2016, April). A literature survey on social engineering attacks: Phishing attack. In 2016 international conference on computing, communication, and automation (ICCCA) (pp. 537-540). IEEE. https://ieeexplore.ieee.org/iel7/7795276/7813678/07813778.pdf?casa_token=mY2jOHomUQIAAAAA:2wK5VZsFIhUerM3NLckVs4bw4Y_RIppqBpw_wBTVhPVnJwoVvMo6dg7GGn-htHfoKCwxDxIKRA Al-Hamar, Y., Kolivand, H., & Al-Hamar, A. (2019, October). Phishing attacks in Qatar: A literature review of the problems and solutions. In 2019 12th International Conference on Developments in eSystems Engineering (DeSE) (pp. 837-842). IEEE. https://ieeexplore.ieee.org/iel7/9058621/9072947/09073226.pdf?casa_token=qH83s9gcPmkAAAAA:WHyrKQEZVSYriV53jhzygkrHKdzDEhszs7JPMs_IN-tau0ZUqyZSLgd0-C60ueXV80RPcSI59A 3
. In this exercise, you will convert the essay you wrote in Project 3 to a PowerPoint presentation. Read this all through to the end once before you try it. 2. Find the image files you downloaded as
Phishing attacks security issue Technology has developed drastically over the past few years, therefore, making lives easier and increasing access to information. Despite the advantages, hackers are taking advantage of the technology to access intellectual property and steal data from companies leading to damaged reputation, denial-of-access, fines, and lawsuits. (Gupta et al. 2016). Phishing attacks involve social engineering attacks where hackers pretend to be trustworthy information sources and send emails with malicious attachments, which, once downloaded or opened, lead to accessing the intellectual property of an organization. Therefore, for phishing attacks to occur, hackers have to create a message or email which seems credible, an example, one may receive an email from their bank prompting them to click a link and change their passwords. Once the links are clicked, the hackers can access all customer’s bank details or transfer finances without the user’s consent. Once the attack occurs, the company’s finances and reputation are affected since data is stolen and exposed, leading to customers’ lost confidence in the company. Some customers may file lawsuits against the company for leaking their private information, while the government may fine the company for failing to maintain a strong security system. To prevent such attacks, employee education is paramount, such that everyone understands how such attacks occur and instant reports are created when phishing attacks are detected. Generally, the attackers normally target individuals with limited knowledge of effective internet use. Therefore, equipping employees with skills ensures they can differentiate between credible and malicious emails received. The organization’s technical team should develop measures for detecting and eliminating malicious files. By installing antimalware programs in the company’s system, files and links are automatically scanned, the warnings are issued for potentially malicious files. The antimalware programs should automatically filter emails and text messages by automatically deleting malicious ones. Companies are forcing employees to use the spam filter option to ensure that suspicious emails are not accessed or opened. (Al-Hamar et al. 2019). Patching software is an effective mechanism where technicians install the latest software in the company’s system since hackers normally take advantage of outdated programs. However, ensuring continuously updated systems ensures that an organization’s intellectual property is always protected. Finally, scanning and vulnerability testing is effective for organizations in preventing potential attacks. Through security scans, organizations can actively check for malicious files and links accessed and then eliminate them. In conclusion, although phishing attacks have increased gradually in the past years, through proper security deployment and education programs, people can actively prevent them. For example, through user education, one understands how hackers take advantage of ignorance to send malicious links and files. While through the installation of appropriate security scanning software and spam filtering preventing the opening of malicious files. References Gupta, S., Singhal, A., & Kapoor, A. (2016, April). A literature survey on social engineering attacks: Phishing attack. In 2016 international conference on computing, communication, and automation (ICCCA) (pp. 537-540). IEEE. https://ieeexplore.ieee.org/iel7/7795276/7813678/07813778.pdf?casa_token=mY2jOHomUQIAAAAA:2wK5VZsFIhUerM3NLckVs4bw4Y_RIppqBpw_wBTVhPVnJwoVvMo6dg7GGn-htHfoKCwxDxIKRA Al-Hamar, Y., Kolivand, H., & Al-Hamar, A. (2019, October). Phishing attacks in Qatar: A literature review of the problems and solutions. In 2019 12th International Conference on Developments in eSystems Engineering (DeSE) (pp. 837-842). IEEE. https://ieeexplore.ieee.org/iel7/9058621/9072947/09073226.pdf?casa_token=qH83s9gcPmkAAAAA:WHyrKQEZVSYriV53jhzygkrHKdzDEhszs7JPMs_IN-tau0ZUqyZSLgd0-C60ueXV80RPcSI59A 3

Writerbay.net

Do you need academic writing help? Our quality writers are here 24/7, every day of the year, ready to support you! Instantly chat with a customer support representative in the chat on the bottom right corner, send us a WhatsApp message or click either of the buttons below to submit your paper instructions to the writing team.


Order a Similar Paper Order a Different Paper
Writerbay.net