Case+study+3+week+2
pdf
keyboard_arrow_up
School
Keiser University, Port Saint Lucie *
*We aren’t endorsed by this school
Course
CTS2153CN3
Subject
Information Systems
Date
Dec 6, 2023
Type
Pages
2
Uploaded by samanthapetosa13
Chapter 3, Basic Computer Network Concepts
QSEN Scenario
You are teaching a group of patients about how to avoid phishing and pharming types of
e-mails. What information will you share?
Answer: Phishing or Pharming email will usually show up in your inbox as forgien outside
sources. You can usually spot if the email is not meant for you because they wount mention
your full name. They may even provide a link for you to follow and that is how they harvest your
personal information. The first give away will most likely be spelling errors amongst the
message or even in the subject heading.
Case Study 1
Cindy visits her favorite website on a lunch break using a hospital computer. After she
downloads a file, she notices that the computer is running very slowly. She realizes that the
hospital system might be infected with malware, so she contacts the IT department. After this is
resolved, she resolves to gain a better understanding of the forms of computer software
designed to damage or disrupt a computer system, because a damaged system is incapable of
providing the support required to manage healthcare information.
1. When Cindy researches this topic, what will she find in the difference between the two
techniques used to create a malware attack?
Answer: The difference between the two type of malware is one has to be downloaded,
like the case with Cindy downloading a file, the second type is going onto a webpage that has
malware in it. For example LimeWire has to be downloaded, or when you get a pop-up that says
you won a trip to the Bahamas those both have malware.
2. Regardless of the form the malware assumes, what are some of the basic precautions Cindy
or someone else at her institution should take to protect the computer system?
Answer: Some of the ways I protect my computer is i use anti virus or malware
protection, I dont resure passwords and my passwords are usually a line from a song. I also
dont open emails from people I dont know especially the ones with the subject (wE hAve A
serPreese Fer Yew).
Case Study 2
You are planning to return to school to advance your nursing career. Therefore, you purchased
a new laptop and need to create a Wi-Fi connection in your home. Your Internet provider uses a
combined router and modem for the Wi-Fi capabilities.
1. What type of Internet network will you establish?
Answer: Probably fiber-optic, Its the fastest. Its cost effective and most major providers
have lower rates because its not as accessible as cable internet.
2. Should you use network authentication? Explain the rationale for your answer.
Answer: With out any sort of authentication anyone with in the reach of your wifi can log
on and use it. With the help of a password only people with permission can use your internet
conecttion.
3. What computer software might you choose to prevent malware?
Answer: I use Mcafee and Kapsky to prevent my computer from getting loaded with
viruses. Both of these programs let me know if a website I am using or go into have malware or
any spyware.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help