Free Essay

En1420 Project Part 1 Example

In:

Submitted By pypers
Words 387
Pages 2
1. Introduction Paragraph (Establishing the Claim)
a. We live in a world today where private and sensitive material is being shared openly without any encryption or cover and this leads identity them, hackers stealing money from corporations, and governments breaking laws.

2. Topic Background Paragraph (The Warrant)
a. I will have to provide readers with some background on encryption and the flaws of unencrypted information going across the internet. In an attempt to show them that they lack privacy in certain areas that truly require privacy.
b. (W., 2014) (K., 2014)
3. Key Definitions Paragraph (The Warrant)
a. I will need to define what encryption, VPN, ports, packets, and a plethora of other terms.
b. (W., 2014)
4. Opposing Viewpoints Paragraph
a. (W., 2014) (C., 2000)
5. Main Point A Paragraph (Grounds/Support)
a. First main point is unencrypted private information is completely clear text for anyone monitoring the packets leading to identity theft.
6. Main Point B Paragraph (Grounds/Support)
a. Lack of encryption allows hackers to get into and gain access to things they are not legally allowed to do.
7. Main Point C Paragraph (Grounds/Support)
a. The need for encryption to stop governments from invading the privacy of its citizens and their personal information.
8. Summary and Conclusions

Works Cited
C., C. (2000, November 6). Introduction to Encryption. Retrieved October 7, 2014, from Symantec: http://www.symantec.com/connect/articles/introduction-encryption
D., G. (2013, November 14). Internet architects propose encrypting all the world’s Web traffic. Retrieved October 7, 2014, from arstechnica: http://arstechnica.com/security/2013/11/encrypt-all-the-worlds-web-traffic-internet-architects-propose/
J., A. (2014, February 23). Should All Web Traffic Be Encrypted? Retrieved October 7, 2014, from Coding Horror: http://blog.codinghorror.com/should-all-web-traffic-be-encrypted/
K., F. (2014, April 17). It's Time to Encrypt the Entire Internet. Retrieved October 7, 2014, from Wired: http://www.wired.com/2014/04/https/
S., G. (2014, July 29). Should the entire internet be encrypted? Retrieved October 7, 2014, from Technorati: http://technorati.com/entire-internet-encrypted/
W., G. (2014, January 17). A Beginner's Guide to Encryption: What It Is and How to Set it Up. Retrieved October 7, 2014, from Lifehacker: http://lifehacker.com/a-beginners-guide-to-encryption-what-it-is-and-how-to-1508196946

Similar Documents

Free Essay

Android: Is Open Source Better for the Masses?

...Android: Is Open Source Better for the Masses? Jarrod R. Worlitz ITT Technical Institute, Sylmar Campus EN1420 Abstract This paper makes the argument that Google’s Android Operating System and the open source platform it provides is superior to its major competitor, Apple’s closed source iOS. The focus will be on how the ecosystem of “smartphones” and other mobile devices (such as tablets and phablets) has been impacted by Google, Inc.’s decision to release the Android Operating System as “Open Source Software” (OSS), allowing for a wider adoption of the platform than was achievable by Apple Inc.’s iPhone, whose marketing strategy and decision to is control both hardware and software. The claim will be supported by explaining the superiority of Android in terms of its benefits to manufacturers, consumers, and software developers. Android: Is Open Source is Better for the Masses? One of the fastest growing technologies is mobile computing. This fascinating trend in communication was propelled in large by the introduction of smartphones. Smartphones provide instant access to information and programs only previously available users from a desktop PC. To be clear, there are many other such mobile devices on the market that do not qualify as phones, such as tablets and “phablets” (a hybrid phone and tablet) however their roots can be traced back to two major platforms. These platforms are maintained by some of the largest companies in a competitive market. The two...

Words: 2830 - Pages: 12

Premium Essay

Nothing

...56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course examines industry standards and practices involving the physical components of networking technologies (such as wiring standards and practices, various media and interconnection components), networking devices and their specifications and functions. Students will practice designing physical network solutions based on appropriate capacity planning and implementing various installation, testing and troubleshooting techniques for a computer network. Where Does This Course Belong? | | | NT2799 | | | | | | | | NSA Capstone | | | | | | | Project | | | | | NT2580 | | | NT2670 | NT2640 | | PT2520 | | Introduction to | | | | | | | | | | | Email and Web | | | | | Information | | | | IP Networking | | Database Concepts | | | | | Services | | | | | Security | | | | | | | | | | | | | | | | NT1330 | | | NT1230 | NT1430 | | PT1420 | | Client-Server | | | Client-Server | | | Introduction to |...

Words: 10839 - Pages: 44