ipl-logo

FCC Working Group Issues Report

621 Words3 Pages

Thesis Statement:
Purpose Statement
Reference

Snyder, S. (2015). FCC Working Group Issues Report on Cybersecurity Best Practices. Intellectual Property & Technology Law Journal, 27(6), 28-31.
The author was part of a Federal Communication Commission (FCC) working group that assessed the Cybersecurity Risk Management and best practices. The working group used various sources to include Federal agencies to cybersecurity experts from many industries to produce the final report. Based on the findings the suggestion is to use the National Institute of Standards (NIST) framework. The NIST framework is a collection of standards and guidelines which offer protection of critical infrastructure. This article is fairly recent (2015) which means the …show more content…

This information is very important and critical to our protection. Cyber criminals target smartphones in several ways and use them to steal personal and financial information, make purchases, and use the smartphone as a bot or a remote tool to steal other people’s information. The possibilities are endless and lie in the cyber criminal’s imagination. The victims, you, me, and everyone. I plan on using this information to bring awareness to the enemy we take everywhere and can’t live without, our smartphones.

George, T. (2014, December 1). The Next Big Cybercrime Vector: Social Media | SecurityWeek.Com. Retrieved November 3, 2015, from http://www.securityweek.com/next-big-cybercrime-vector-social-media
The author who has over 20 years of global information security points out some interesting items social media concerns we all need to be aware of. The cyber-criminal is always one step ahead. The author goes on discussing how the cyber-criminals have targeted social media to infiltrate corporations and the federal government. What is more concerning is that although most of the comprised computers have been fixed, there are many that still pose a risk and have not been properly assessed. I plan on using this information to highlight the risks associated with social media and discuss aspects of social …show more content…

(n.d.). Retrieved November 3, 2015, from https://www.staysafeonline.org/stay-safe-online/protect-your-personal-information/id-theft-and-fraud

StaySafeOnline.org is supported by The National Cyber Security Alliance. “NCSA's mission is to educate and therefore empower a digital society to use the Internet safely and securely at home, work, and school, protecting the technology individual’s use, the networks they connect to, and our shared digital assets. (NCSA).” This source offers a wealth of information on protecting your personal information, identity theft, and fraud. I plan on using this information to promote NCSA’s mission statement by educating and empowering people in my class.

Goodman, M. (2015). Future crimes: Everything is connected, everyone is vulnerable and what we can do about it. New York: Doubleday.
In this book/chapter the author talks about the online gaming industry and the threats against

Open Document