Category: Tech & Engineering 2928
-
Spanning Tree Protocol and Its Security Issues
Table of Contents STP Attack Scenarios Recommendations Bibliography Footnotes Making protocols at layer 2 or otherwise Spanning Tree Protocol represents a great percent of attacks originating within the organisation. Using Ethernet PAUSE frames alongside STP makes networks more vulnerable to attacks. Most STP security threat issues include; becoming root, changing STP timers, modifying STP active…
-
CT Scanners and Techniques
Quoting the words of Jakub Mochon, CT product manager at Siemens Medical Solutions, let us state that the U.S. health system is very dependent on CT, it is absolutely evident (Dargan, 2009/2010, p.30). According to the data provided by McCollough et. al., the usage of CT scans has increased dramatically. You cannot get away from…
-
OneDrive: Installation, Registration, and Security Issues
Table of Contents Installing Registration Add Files or Folders to OneDrive Security Issues Sharing References Installing After I installed OneDrive for Windows, a copy of the installed version was downloaded to my computer and saved in a separate OneDrive folder, later synchronized with the cloud version. After installing the OneDrive for Windows desktop app on…
-
Hardware Components, Network, and Connection
Table of Contents LAN software and Hardware Components WAN software and Hardware Components Network Equipment Specification of Connection Media References Dreamz Inc. has significantly developed and expanded to include e-commerce services and branch offices in the scenario. As a result, using a sole (local area network) LAN network is insufficient to assemble the venture prerequisites,…
-
The Future Trends of Electric and Hybrid Propulsion Systems
Table of Contents Introduction The Context Methodology Ethical Implications Conclusion Reference List Introduction Aviation has always been associated with cutting-edge innovation, international activities, and experience, and therefore the global and rapid development of technology and other events of a global scale is reflected in it in the first place. For example, we can cite the…
-
Trojan Horse: Trojan-Horse Attack and How to Protect against Trojans
A Trojan horse is a computer program that contains malicious code designed to mislead users of their true intent. The malicious code is injected into legitimate software applications to allow a hacker to take control of an infected computer. It attacks computer systems by disguising itself as a familiar or legitimate system. The first reporting…
-
Technological Advancements Impact on Society
Table of Contents Introduction Innovation and Modern Technology Conclusion References Introduction Since the start of history, humans have been developing emerging innovations. From the creation of spears and knives made of rocks and sticks to help in the capture and slaughter of animals for sustenance, through the first invention of printing and the computer, there…
-
Crisis Case: United Express Flight 3411 Incident
The United Express incident happened at the Chicago OHare International Airport in the United States on April 9, 2017. The airline managers offered travel vouchers to four passengers who would vacate their seats for four staff members of the company. However, no passenger accepted, and the managers randomly selected people, including Dr. David Dao, who…
-
Data Mining and Visualization Discovery and Practice
The database used concerns the statistics of the current Covid-19 pandemic in the United States. Specifically, the chosen database is Child Victims by Age, which contains statistics on the prevalence of the disease among children in the country. The specific dataset shows the numbers and rates of child victims based on their age and state…
-
Data Visualization: Principles and Techniques
In order for the recipient to gain more insights into the data, it is of paramount importance to create a consolidated and distilled summary of the content. In most cases, creating a graphic component to the data demonstration has the advantage of being more accessible and memorable for the end-user. As a result, data visualization…