Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Self-Reflection on Emerging Threats and countermeasures

Category: Arts & Education Paper Type: Essay Writing Reference: APA Words: 550

        I am dealing with Emerging Threats and countermeasures. This subject basically deals with the cyber-attacks and sharp actions for its solution. I have learned many new concepts from this course, and it is also one of the most interesting courses for observing. There is a number of theories I have learned, but this report deals with the practical application of these theories. But, currently, I am not working, but I have observed these theories many times.

In my course, chapter 6 deals with the depth defense. I have seen this theory in different movies especially in “Mission Impossible Rogue nation.” When the main character wanted to achieve that chip from their system, then its companion hacks the system and allow the character to gain that chip. But in case the system managers saw the defense failure immediately. For instance, they put a series of protective elements and enables the system again. This depth in the defense system creates a huge problem for the main character.

        The next theory from my course I have analyzed is related to the collection. In that theory, the data is collected through different means and converted into an organized manner. The theory I have observed during the internship is in the national data organizer. In that organization, I have observed how the data organizer programs work. I have observed that they have collected data from different means and then organized in a well-mannered way for the analysis. Moreover, this collection theory I have also observed in different movies from these movies I will mention only one, and that is “Die Hard 4” in that movie, the evil character hacked the national security data and collected the data about any individual that he wanted. In that movie, I have observed different theories related to my source. This movie gave me vast information related to the cyber-attacks on the collecting system data.

         The next theory I have observed practically is related to diversity. This theory I have observed is related to a different computer software application. These applications allow the user to search safe and enhance computer security. Moreover, another course theory I have analyzed, and that is related to the deception. This is one of the most important theories, and I have observed practically during the documentaries related to deception. This can be observed in huge technological websites like Google and Microsoft. If someone tried to hack these websites, then through the help of their deception wall, the identity is completely changed, and the user is distracted from the main goal of hacking their websites.

        They have created a deception liked through this. These managers are able to protect their site from any kind of attack. Another theory I have observed practically is related to correlation. This theory I also observed in different movies. These movies showed how the different security agents companies are able to protect their system by correlation. All of these theories will help me during my employment, and through these skills, I am able to learn different things quite quickly and efficiently. 

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Top Rated Expert

ONLINE

Top Rated Expert

1869 Orders Completed

ECFX Market

ONLINE

Ecfx Market

63 Orders Completed

Assignments Hut

ONLINE

Assignments Hut

1428 Orders Completed