Cyber Security for Daily Life

From TSAS Library
Jump to: navigation, search

A slide show of some of the topics I went through in the TulsaTech class "Cyber security and forensics." Though it may not be the most polished thing in the world, I wanted to at least make the average computer/phone user aware of the different types of security threats that one could face while online and give a couple of basic tips to help deal with them. Mainly how one could keep their private information secured and to keep their computer or devices properly functioning.

Profmoore.jpg
Jaidyn Moore 2020
House Fine Arts House
Advisor Cheyenne Butcher
Plans Cyber Security
Advice Make a plan at the beginning of the year, see if it is possible or acceptable, see how everything is going to work, and give it your best.
Type Presentation
Subject Cyber security
Discipline Science

How It Began

A sort of TED talk like presentation.

How It Changed

Things didn't go exactly as planned, of course as stated many times it's not the most polished thing in the world but I feel like I could have maybe added more.

Reflection

While going to the Tulsa Tech for this capstone, I've learned many different things. Sure there was the initial cyber security, but I've also learned small bits of networking, and operating systems. Mainly different types of cyber attacks as shown in the slideshow, but also different types of connections to computers, different types of resources for those connections such as the different wires and connections setups. In operating systems it was mainly going through what basic things one had on their computer such as the search bar and the start button and where all the different settings were, but there were a few new things such as different terminologies for systems and shortcuts. The courses were also more themed around Microsoft computers, so we only used the different versions of Windows, though somethings that are applied there can be applied to other systems and computers. The course was also more focused on the business side of cyber security and how different companies should protect their systems. It never really focused on the average user except in some occasions. To sum it all up, I wish there was a little more to it that touched on security and more on forensics. There were some things I was expecting to be there but never touched on or even glanced at.