s Must be a minimum of 100 words each
1) Chapter 19: Social Engineering
Hello again class,
Lets talk about Social Engineering today.
Chapter 19 says that Social engineering is a process in which an attacker attempts to acquire information about your network and system by social means, such as talking to people in the organization. A social engineering attack may occur over the phone, by email, or in person. The intent is to acquire access information, such as user IDs and passwords. When the attempt is made through email or instant messaging, this is known as phishing, and it’s often made to look as if a message is coming from sites where users are likely to have accounts (eBay and PayPal are popular).
Now, lets watch the follow video on Social Engineering.
Video Tutorial – Hackers and Social Engineering – 3 Minutes:
Class, what did you learn from the resources above? Thoughts? Experineces?
2) Chapter 19: Locating Lost or Stolen Devices
While theft is certainly a risk, I think most mobile devices are lost. I have personally used the Find My Phone feature before and was able to determine that I had left my phone in a restaurant and retrieved it the same day. I was unaware before reading this text of the remote wipe option. I could see companies who use mobile devices wanting to have this feature available to destroy the contents if the device cannot be located. While it’s a nice to have for personal data, I can see it being essential in an increasingly mobile workforce that carries around customer data.
3) Chapter 19: Destruction and Disposal Methods
Hello again class,
Lets talk about “Destruction and Disposal Methods”.
Your reading says to think of all of the sensitive data written to a hard drive. Data drive can contain information about students, clients, users–about anyone and anything. That hard drive can be in a desktop PC, in a laptop, or even in a printer (many laser printers above consumer grade offer the ability to add a hard drive to store print jobs), and if it falls into the wrong hands, you can not only lose valuable data but also risk a lawsuit for not properly protecting privacy.
Watch the following Video.
Video Tutorial – Destruction of Drive Data – 5 Minutes:
Class, what did you learn from watching the video above? What is quick formatting vs standard formatting?
4) Chapter 21: Downloading Apps on IOS
Your reading talks about Downloading Apps for iOS.
Your reading materials says that Apple’s App Store opened for business in 2008 just ahead of the introduction of the iPhone 3G, which was natively capable of accessing the App Store. The App Store was designed to market and serve applications created with the iOS and Mac software development kits (SDKs). The term app was coined long ago as shorthand for application, but in the period during the naming of Apple’s store, the term saw a resurgence, and it is now mostly associated with mobile applications.
Video Tutorial – Not Downloading – 4 Minutes:
Class, what was some of the solutions provided by the video tutorial? Please be thorough in your responses.
5) Chapter 21: Understanding Bluetooth Connectivity
Chapter 21 talks about how to Establishing Bluetooth Connectivity.
Your reading says the IEEE 802.15 specifies wireless personal area networks (WPANs) that use Bluetooth for data-link transport. The concept is that certain paired devices will be capable of exchanging or synchronizing data over a Bluetooth connection, such as between a mobile device and a desktop or laptop computer. In other cases, the Bluetooth pairing can be used simply to control one device with another, allowing information to flow bidirectionally, even if that transfer does not result in its permanent storage on the destination. Examples of this latter functionality include a Bluetooth headset for a cell phone, a Bluetooth-attached keyboard and mouse, and pairing a smartphone or MP3 player with a vehicle’s sound system.
Now, lets watch the following video.
Video Tutorial – Connectivity of a BlueTooth Device – 3 Mintues:
Class, have you had any bad experiences with connecting to bluetooth? What are the disadvantages?
6) Chapter 21: Mobile OS Versions:
This chapter covered the 3 mobile OS’s Android, Apple iOS and Windows Mobile OS an d its connectivities. It also covered the comparison between each other mobile operating system and its core functionalities. All along I have been an Apple mobile user from the very first model and still continuing to upgrade to newer ones as when it is available. However, I only used Android OS in a Samsung phone when I was traveling to Europe since my iPhone was not unlocked. Unfortunately I never had a chance to use a Windows mobile phone but looking forward to get more details from this chapter. One particular section that caught my attention the number of version each mobile OS released from the beginning. Plenty of good information to learn and looking forward for this week lessons.