Date of Submission
CIS 435 “Mobile Malware”
Q. Analyze the mobile device OS that you believe is the easiest to hack. Additionally, explain the ineffective security features that are utilized by this specific mobile device OS, and indicate the key reasons why you believe the security feature is failing to provide better protection. Provide a rationale for your response.
Android operating systems are easiest to hack of all the mobile devices’ OS. It is evident that cyber criminals come up with an android virus almost every 15 to 20 seconds thus due to security flaws making it vulnerable to cyberspace hackers.
According to Amir (2016), security personal claim Apple operating system is more reliable and secure in relation to spying evasion and data protection than both Windows and Android operating systems. In addition, they also state that of the three operating systems, Android operating system is often vulnerable to hacking and violation while Apple operating system is more reliable as a result of the presence of the Erase Data feature.
Android operating system is also a vulnerable system as it trusts the community of its developers and the user to choose the right verdict. If the user wants to download application, the system ask whether to download from ‘untrusted/unknown sources or not’, giving the user the choice to decide. The issue of downloading applications from untrusted/unknown sources put the operating system at risk. In addition, an Android operating system can easily be rooted, giving access to the user or cyberspace hackers to the deeper parts of the operating system.
Even though android operating system tries to protect its users from malicious criminals and softwares, if the user allows, this puts the operating system at ease of hacking and violation, not because the operating system is weak but due to the trust it offers the users and the community of its developers.
CIS 255 “Who’s the Boss?”
Q. Give your opinion on the number of users that you believe should know / retain the root password of an enterprise Linux system. Provide a rationale for your response.
A Linux system is an operating system that can be used by multiple persons and its ability to grant file permissions is one of the criteria it uses to protect itself against malicious content or tempering.
When creating a root password and account, it is important to know that the root account is utilized to upgrade RPMs, install packages, and perform most system maintenance. The root user is one who has the root password meaning they have complete access to the entire system thus logging into the enterprise Linux system as a root user is often done only when carrying out system administration or maintenance.
Therefore, due to the fact that having the root password gives you access to the entire system even when not need, in my opinion, only one person should have the root password. However, due to need of some files and folders, when one is denied access to these files, it necessary to use the system as a super-user.
A super-user is able to carry out sudo permissions that include actions such as resetting passwords for other users, network analysis, reading other users’ private files, installing, managing and removing software available for the other users and also rebooting the machine.
Due to the presence of such privileges to users of Linux system users it is necessary to have one super-user for 500 servers during normal operations, meaning for 4000 servers you’ll have eight super-users whereas you’ll only need the root user when operations are unsteady and off-the-hook, for instance, during security update thus not advisable during normal operations.
CIS 498 “Social Organizations and Core Competencies”
Q. Investigate the importance of effective change leadership in relation to an organization’s adoption of social media initiatives. Next, suggest two (2) ethical issues that a CIO may encounter when implementing social media initiatives. Propose (1) strategy for addressing each identified issue. Provide a rationale for your response.
Most of the times, change is often in the best durable motive of an organization, however, it can also cause extreme damage on the employees of the organization at times in the first stages of its conception through erosion of employees’ loyalty, engagement, and trust in the organization’s operations. It is evident that regularly when companies carry out certain actions for instance, manager training or more frequent communication with its employees, ahead of change, they are rarely effective. That is why, due to this reason, adoption of social media can help transition during change through; giving employees a role in shaping the future, shortening the distance between employees and leaders, helping drive employee behavior change as a result of transition, and offering companionship, support and space to process uncertainty. Social media does this in collaboration with managerial support, face-to-face communication, and real-time coaching (Clayton, 2015).
According to Relkin (2006), when implementing social media initiatives, CIOs often encounter ethical issues such as whether to notify the organization’s employees that their social operations are being supervised and monitored, or not to notify them, and whether CIOs should put in work in supervising employees utilization of social media in a business perspective, that is, in relation to information sharing, data access and privacy, and also suffer expenses, or should not take part in or experience these respectively. Such issues are vital and require a mutual employer-employee consensus, that is, on the utilization or misuse of the company’s assets for social media initiatives (for the organization or self-interest) and also on what employees should post or utter about their bosses on social media platforms.
Q. Select three (3) of the twelve (12) core competencies for IT professionals from Chapter 14 of the Roberts text. Rank each one (1) according to its importance for IT professionals to possess in order to develop their careers and compete in the job market. Justify your ranking.
The three main core competencies for IT professionals from Chapter 14 based on my opinion include; Organizational understanding, Problem solving and Communication.
Organizational understanding is the main pillar of an institution that is why it comes first. The ability of an IT expert to understand his/her roles, duties and responsibilities helps in the realization and achievement of the objectives of the organization. In IT problem solving is key, the IT expert should be able to solve any problems that come about and halt the normal system operation and come up with the best solutions possible to solve the problems. Finally, communication helps an IT expert to communicate the problems and the best alternative solutions to his sub-ordinates and on what to do so that they may implement the solutions.
Amir, U. (2016). Which Phone is more vulnerable to hacking – iPhone or Android? adopted from https://www.hackread.com/which-phone-is-vulnerable-to-hacking-iphone-or-android/
Relkin, J. (2006). 10 ethical issues confronting IT managers adopted from https://www.techrepublic.com/article/10-ethical-issues-confronting-it-managers/
Clayton, S. (2015). Change Management meets Social Media adopted from https://hbr.org/2015/11/change-management-meets-social-media