Up to 15% on top of the 100% of the grade can be earned as extra credit. To earn it, you need to submit a good quality research paper along
Up to 15% on top of the 100% of the grade can be earned as extra credit. To earn it, you need to submit a good quality research paper along the lines of one of the topics below. Up to 15% on top of the 100% of the grade can be earned as extra credit. To earn it, you need to submit a research paper along the lines of one of the topics below. “Quality” determined by: (a) Formatting, spelling and grammar, clear reference list (b) Relevance of topic and originality of material. (copy pasting text from Internet receives no credit) Template: Use IEEE or ACM word templates (e.g. ) Length: 6-12 pages (single or double spaced) Text and references: APA/MLA style Choose one topic Cyber security violations usually target networks, systems or apps. This course is obviously about systems or more specifically, operating systems. As discussed in class, different security mechanisms are incorporated into operating systems such as passwords, certificates, access controls, anti-virus etc. However, little research exists in the literature on the economics of installing these security or protection mechanisms. For instance, did you know that nearly 100% of “invalid certificate” warnings are false positives? While it is certainly not advisable to connect to web sites offering invalid or expired certificates, it is common experience that such warnings usually tend to be false alarms (e.g. the website perhaps just didn’t renew their certificate to avoid fees). But from an economics standpoint, it is useless effort expended by users, continuously bothered by false alarms, obstructing their productivity. Your job is to research on any five to ten such protection or security mechanisms offered by modern operating systems and then report on the economics of having those mechanisms: Survey and report on major data breaches or cyber security attacks where weaknesses of operating systems were exploited. Summarize about four or five of them and explain the economic impacts of those attacks. i.e., how much losses were incurred and how better protection mechanisms into the OS (either by the designers or by users) would have ed mitigate those losses. Provide full details.
Do you need us to help you on this or any other assignment?
Make an Order Now