Case+study+3+week+2

pdf

School

Keiser University, Port Saint Lucie *

*We aren’t endorsed by this school

Course

CTS2153CN3

Subject

Information Systems

Date

Dec 6, 2023

Type

pdf

Pages

2

Uploaded by samanthapetosa13

Report
Chapter 3, Basic Computer Network Concepts QSEN Scenario You are teaching a group of patients about how to avoid phishing and pharming types of e-mails. What information will you share? Answer: Phishing or Pharming email will usually show up in your inbox as forgien outside sources. You can usually spot if the email is not meant for you because they wount mention your full name. They may even provide a link for you to follow and that is how they harvest your personal information. The first give away will most likely be spelling errors amongst the message or even in the subject heading. Case Study 1 Cindy visits her favorite website on a lunch break using a hospital computer. After she downloads a file, she notices that the computer is running very slowly. She realizes that the hospital system might be infected with malware, so she contacts the IT department. After this is resolved, she resolves to gain a better understanding of the forms of computer software designed to damage or disrupt a computer system, because a damaged system is incapable of providing the support required to manage healthcare information. 1. When Cindy researches this topic, what will she find in the difference between the two techniques used to create a malware attack? Answer: The difference between the two type of malware is one has to be downloaded, like the case with Cindy downloading a file, the second type is going onto a webpage that has malware in it. For example LimeWire has to be downloaded, or when you get a pop-up that says you won a trip to the Bahamas those both have malware. 2. Regardless of the form the malware assumes, what are some of the basic precautions Cindy or someone else at her institution should take to protect the computer system? Answer: Some of the ways I protect my computer is i use anti virus or malware protection, I dont resure passwords and my passwords are usually a line from a song. I also dont open emails from people I dont know especially the ones with the subject (wE hAve A serPreese Fer Yew).
Case Study 2 You are planning to return to school to advance your nursing career. Therefore, you purchased a new laptop and need to create a Wi-Fi connection in your home. Your Internet provider uses a combined router and modem for the Wi-Fi capabilities. 1. What type of Internet network will you establish? Answer: Probably fiber-optic, Its the fastest. Its cost effective and most major providers have lower rates because its not as accessible as cable internet. 2. Should you use network authentication? Explain the rationale for your answer. Answer: With out any sort of authentication anyone with in the reach of your wifi can log on and use it. With the help of a password only people with permission can use your internet conecttion. 3. What computer software might you choose to prevent malware? Answer: I use Mcafee and Kapsky to prevent my computer from getting loaded with viruses. Both of these programs let me know if a website I am using or go into have malware or any spyware.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help