Part A (20 pts)
Provide step-by-step instructions on how to secure your smartphone based on the following website https://www.fcc.gov/smartphone-security [Choose 2 that correspond with the last two digits of your student ID number.
Example:
- If your ID number is 2123494 and you have an Android, you would go to https://www.fcc.gov/smartphone-security/Android and then you would go to threat 9 & 4 and write a step-by-step instruction corresponding to the trusted sources and wiping the data on your phone.
Instructions should be in a tutorial format. Without having any technical experience, someone should be able to follow along and improve their personal security
The tutorial should include the following:
- A minimum 5 step process (10 pts)
- my number is 7 & 4
Part B (20 pts)
In Module 3, multiple supplementary resources were provided. Create your “top ten” list of tips based on the supplied materials. You must select at least 1 tip from each supplied resource (20 pts) in the following format. Sources MUST be from 2018 or later.
- Tip. Tip Description. source
- Example:
- Secure your devices. Use a passphrase, password, or fingerprint to secure your device from casual intrusion. https://its.ucsc.edu/news/mobile-device-backup-pla… (Published 4.23.2018)
Note: The supplementary resources are:
- malware protection strategies, Apple slows down iPhones, google’s search project with china to meet government censorship guidelines, “nothing to hide argument” in regard to privacy, Microsoft Azure, FCC smartphone security checker, protecting yourself from identity theft
Part C (20 pts)
Blockchain and cryptocurrency place security management solely on the user. Unlike a bank, if you lose your Blockchain wallet, you can never recover the wallet. Go to wallet.pirl.io and step through the Security Awareness Message
For part C, I am looking for a flier – a one-page document – the security awareness product(s) is (are) the output of the security awareness program. The products are sometimes called security awareness artifacts. Here is a brief explanation of the security awareness program/product -> https://www.mediapro.com/blog/infographic-abcs-awareness-programs/ & com/Resources/Trustwave-Blog/9-Ways-to-Create-a-Security-Awareness-Program-People-Won-t-Hate/”>https://www.trustwave.com/Resources/Trustwave-Blog…
The product should contain the title of the event (2 pt), address the security weaknesses of an online wallet (4 pts each for a maximum of 16 pts), and provide an alternative to wallet.pirl.io (2 pts)
Examples of security awareness posters -> https://www.pinterest.com/genamannone/cybersecurity-poster-examples/


0 comments