Sign In
Not register? Register Now!
Pages:
4 pages/≈1100 words
Sources:
12 Sources
Style:
APA
Subject:
Education
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 17.82
Topic:

CSEC 610 Final Exam Assignment: The FBI and Apple

Essay Instructions:

CSEC 610 Final Exam
General Instructions (Please review carefully!)
This exam represents 20 percent of your total class grade. Your total exam grade will range from 0 to 100 points. 
1. Prepare your exam in Word format (doc or docx).
2. Do not include any quotations in your answers. Do not copy and paste from any resources.
3. Please be sure to clearly indicate your answer to each question and sub-question. Your answer to each question must contain at least 200 words or it will receive no credit. 
4. Comply with scientific citation style IEEE or APA. Include in-line citations and a reference list at the end for each question. There should be at least two references for each question – these references should not include our textbooks.
5. The exam is due by Sunday, 11:59 PM, U.S. Eastern Time. Late submissions will receive an exam grade of zero.

Essay Sample Content Preview:

Final Exam
Name:
Instructor:
Institution:
Date:
1. The FBI and Apple had a dispute related to unlocking cell phones which are encrypted to protect users' data and privacy. Summarize the key aspects of the argument and select and argue one position (Apple or the FBI). Also, think of a possible "middle ground" solution that would have at least pacified both parties involved. Smart phones, iPhone included, are part and parcel of people’s lives presently. They are the one-stop storage for virtually everything that can be considered personal, from pictures, to access codes and other sensitive pieces of information. Such information is usually a very prime target for cyber criminals and other hackers. People might not be in a position to secure their information, since connectivity to the internet poses a risk to everyone, and presents the need to be protected by the phone manufacturing companies (Hodson, 2016).
The deadly San Bernardino terrorist attack brought the FBI to the doorstep of Apple Inc. They needed information from personal phone records of the terrorists, which would shed further light on the entire case.FBI believes the killings are part of a larger organization and the data in the handset may be a vital lead. The agency has requested Apple to break into the phone. Apple, citing priorities in cyber security and the security of millions of its customers, has vehemently refused to break into the phone setting the stage for a legal battle that has moved from California magistrate judge Sheri Pym, who ordered Apple to crack the phone to the House of Representatives in Washington DC (Hodson, 2016).
The request by FBI borders on the privacy of millions of users of the same iPhone model and if granted the technology would make citizens vulnerable in the face of the law. According to Apple the FBI wants a "back door" access to own phones through software that is capable of unlocking any iPhone remotely in someone's physical location (7 Key Facts about the Apple & F.B.I. Dilemma. (2016). If granted Apple devices would be, weakened regarding security and privacy. Apple must not give in to such a request at whatsoever level. However, the two parties can compromise their stands and come to an amicable solution.
2. Describe the role of cyber security within the emerging "Internet of Things" environment. Explain privacy concerns associated with the emerging technology and how cybersecurity will address them. The connectivity brought about by the ‘internet of things,’ poses a myriad of cyber safety issues. Appliances connected to the world web through wireless connection continue to suffer the brunt of malicious hacks(Ma, 2011).Most of these devices have a little memory which limits the level of security that they can handle Low-level security means they become a prime target for hackers who maliciously take control of the devices (Ma, 2011). Cyber security is thus a primary concern.
Security concerns associated with the web of things varies. One concern is the possibility of rogue access points presented by the interconnection of devices in the ‘Internet of things’ ("Security Challenges of the Internet of Things", 2016). Internet of things connected through this acce...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These APA Essay Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!