ITC596 IT Risk Management | Wireless and Mobile Communication
How to successfully approach this task:
1.You will be provided with specific issues that you need to address in the forum discussions. These will be located in the first two (2) topics in the interact site.
2.Reflect on these questions and post your written responses on the forum and engage with your peers and their responses.
3.As this is a postgraduate course, it is expected that your written responses will provide you with an opportunity to express your personal and professional views. There are no correct answers, however, the way you justify your answers with validated evidence is key to this activity.
4.It is recommended that you post your responses as you get to the forum prompts in the topics in interact.
5.To successfully complete this task, you are required to curate, collect and save your responses in a word document to be submitted on Turnitin. Include the date and time this was posted on the forum. This activity's final mark will be provided prior to the final assessment item.
6.It is key that you respond and posts regularly and not post everything in the week that this assessment item is due.
Answer:
Forum 1
Wireless and mobile communication
Wireless is defined as a technology in which data or information transfer from one location to another location without using any electric wires. Wireless communication is used for communication purpose that means users can send data from one location to another and the main advantage of this technology is that it can be used for long distance (Wu, Wang, & Youn, 2014). The main application of wireless technology is mobile communication and there are many mobile organizations that are using this technology because it improved efficiency and productivity. There are much applications of this technology such as for communication purpose, in the military, satellite communication, and data transfer. If any person who wants to transfer data or information for long distance than wired technology ca
nnot be used because in wired technology there are many losses occur therefore wireless technology can be used. The main aim of this paper is to describe the importance of wireless technology in the field of mobile communication and also evaluate risks and threats if this technology.
Before wireless communication, wired technology is used but the main drawback of wired technology is that it cannot be used for long-distance communication. After that wireless technology developed and this technology reduced all drawbacks of wired technology. Many mobile communities use the technology for communication purpose and it is observed that in 2020 around 80% of people will use this technology for communication purpose because it changed the way of communication. This progressive technology delivers a stage where operators can transfer and obtains data or information from one site to another. This skill is utilized in many governments, businesses, and in banking sectors0 for transmission of material from one individual to another. In this contemporary generation, the proportion of wireless communication is growing quickly because this technology delivers better facilities and also increases overall efficiency.
Advantages of wireless mobile communication
There are many benefits of this technology which are following
- More efficient
- Flexible
- Easy to use
- Reduced power consumption
- Low cost
- Increase productivity (Osseiran, Boccardi, Braun, Kusume, Marsch, Maternia, & Tullberg, 2014).
Drawbacks of wireless mobile communication
- Slow in speed
- Less secure
- Increases many security
- Complex to assemble
- Maintenance cost is very high (Medbo, Börner, Haneda, Hovinen, Imai, Järvelainen, & Kyösti, 2014).
Recommendation
This advanced technology improved overall efficiency but there are few IT risks and threats occur in this technology such as loss of data, less secure, reduce speed and increase many security risks. These all are the main drawbacks of this technology but many people use this technology because it is very flexible and low-cost technology. This problem can be reduced if mobile organizations increase security system in communication and use encryption method for data transmission Because encryption method is one of the simplest methods to increase securities of your data in which data or information converted into particular code when data is transmitted through transmitter and at receiver this code again converted into original information. Users and employees can use security systems and a backup system like cloud computing to reduce security risks. This is a wireless process and it can be easily hacked which is one of the biggest problems of this technology. There are many hackers that use online servers to hack your data or information and it can be reduced by increasing the security system, using data backup plans, and through encryption method.
Forum 2
Cyber attacks
Cyber attack is defined as an offensive maneuver which blocks computer systems, network systems, and personal devices. It is one of the most common problems for all organizations and communities because it encrypts data or information file in your computer systems (Rid, & Buchanan, 2015). The problem of cyber attack is increased rapidly in last few years and in 2017 WannaCry ransomware is one of the biggest cyber attack in which around one thousand computer systems were hacked and demand money to restore data or information. There are many types of cyber attacks which are following
- Phishing Attacks
- Cross-Site Scripting (XSS)
- Man-in-the-Middle (MITM) Attacks
- SQL Injection Attacks (SQLi)
- Denial-of-Service Attacks
- Ransomware attacks
- Spear Phishing Attacks
- Malware Attacks
Working process of cyber attacks
Cyber attack is the biggest problem in all countries and in which there are mainly three types of cyber attacks observed which are very harmful such as malware, ransomware, and phishing attacks. They communicate through e-mail or message and user click on fraud links through which hacker enter in human-computer systems and encrypt all personal files and block your computer systems. After that, they communicate with you through online websites and demand money to restore data or information. This problem increase by spam and fraud e-mails and messages and users read message after that hacker hack all details stores in your computer systems (Liu, Wei, Song, Liu, 2016).
Threats and risks of cyber attacks
There are many threats and risks occur due to cyber attacks such as social engineered Trojans, phishing, advanced persistent threats, unpatched software, network traveling worms, its impact on children and adults, loss your data or information and produce financial problems. Therefore it is one biggest problem for al IT management systems because many hackers blocked data or information file and also locked your computer systems and after that, they demand money to restore data files. Ransomware uses an algorithm process to block computer systems by sending e-mails and messages (Pan, Morris, & Adhikari, 2015).
Recommendations
A Cyberattack is defined as a risk factor for human-computer systems and networks which use malicious algorithm to block computer systems and encrypt your data files. This problem can be reduced by using various security systems and managers in an organization should provide proper training for this type of problem. There are main two processes can be used to reduce this type of problems such as use backup plan like cloud computing technology and robust filtering process. Robust filtering is used to block spam messages and e-mails and also remove fraud messages through which this problem can be resolved because hackers communicate with people by e-mail and messages and people should use backup systems in this type of situation (Isozaki, Yoshizawa, Fujimoto, Ishii, Ono, Onoda, & Hayashi, 2016).
References
Isozaki, Y., Yoshizawa, S., Fujimoto, Y., Ishii, H., Ono, I., Onoda, T., & Hayashi, Y. (2016). Detection of cyber attacks against voltage control in distribution power grids with PVs. IEEE Transactions on Smart Grid, 7(4), 1824-1835.
Liu, S., Wei, G., Song, Y., & Liu, Y. (2016). Extended Kalman filtering for stochastic nonlinear systems with randomly occurring cyber attacks. Neurocomputing, 207, 708-716.
Medbo, J., Börner, K., Haneda, K., Hovinen, V., Imai, T., Järvelainen, J., & Kyösti, P. (2014, April). Channel modeling for the fifth generation mobile communications. In Antennas and Propagation (EuCAP), 2014 8th European Conference on (pp. 219-223). IEEE.
Osseiran, A., Boccardi, F., Braun, V., Kusume, K., Marsch, P., Maternia, M., & Tullberg, H. (2014). Scenarios for 5G mobile and wireless communications: the vision of the METIS project. IEEE Communications Magazine, 52(5), 26-35.
Pan, S., Morris, T., & Adhikari, U. (2015). Classification of disturbances and cyber-attacks in power systems using heterogeneous time-synchronized data. IEEE Transactions on Industrial Informatics, 11(3), 650-662.
Rid, T., & Buchanan, B. (2015). Attributing cyber attacks. Journal of Strategic Studies, 38(1-2), 4-37.
Wu, S., Wang, H., & Youn, C. H. (2014). Visible light communications for 5G wireless networking systems: from fixed to mobile communications. IEEE Network, 28(6), 41-45.
Buy ITC596 IT Risk Management | Wireless and Mobile Communication Answers Online
Talk to our expert to get the help with ITC596 IT Risk Management | Wireless and Mobile Communication Answers to complete your assessment on time and boost your grades now
The main aim/motive of the management assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignments. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at urgenthomework.com are so much skilled, capable, talented, and experienced in their field of programming homework help writing assignments, so, for this, they can effectively write the best economics assignment help services.