Quazi Hedayet’s Profile

Student
Active 2 years, 7 months ago
Quazi Hedayet
Display Name
Quazi Hedayet
Major Program of Study
Computer Systems Technology

My Courses

ENG 1121: Composition II, Spring 2019

ENG 1121: Composition II, Spring 2019

This is an advanced college course in communication skills that further develops your reading, analyzing, researching, and writing skills through literary and non-fiction readings and assignments. What you do in this class is not important simply for completing a requirement, as the skills you hone here will be integral to your success in your chosen course of study going forward.

ENG2575 OL70 Technical Writing, Fall 2021

ENG2575 OL70 Technical Writing, Fall 2021

Students communicate technical and scientific information to a variety of audiences through written and oral presentations, using electronic media such as the Internet, Power Point and graphics programs. Students also analyze readings in science and technology, study technical writing models and practice collaborative research and presentation. Prerequisite: ENG 1121 Equivalent to old course ENG 3773. This class meets online asynchronously. Please make sure that you join the correct section.

ENG2575 Tech Writing, SU2021

ENG2575 Tech Writing, SU2021

An advanced course in effective technical writing techniques, including traditional technical writing forms and internet communication.

My Projects

Technical Report on Technical Issues of Cybersecurity

Technical Report on Technical Issues of Cybersecurity

Today’s man can send and receive any type of data, whether it’s an e-mail, an audio or video file, with the press of a button, but has he ever considered how securely his data is being transmitted or sent to the other person without any information being leaked?? Cyber security is the answer. Cloud computing, mobile computing, E-commerce, online banking, and other cutting-edge technologies all require a high level of security. Any illicit conduct that involves the use of a computer as a major means of commission and theft is referred to as cyber crime. Any organization’s top security measures will always be data privacy and security. Many organizations feel cyber assaults are a severe danger to both their data and their business continuity, according to a countrywide poll of US technology and healthcare leaders. New cyber-attacks on Android-based devices will occur, but they will not be widespread. Attacks on online apps to extract data or transmit harmful code are still a problem. All small, medium, and large businesses are gradually adopting cloud services these days. In other words, the planet is gradually approaching the clouds. We can now communicate with anyone in any area of the world. However, security is a major worry for these mobile networks. Companies must guarantee that they are equally as fast to recognize risks, respond in real time, and avoid any type of breach in a world where we are eager to give over our personal information. The code of the internet is known as cyber ethics. When we follow these cyber ethics, there’s a strong chance we’ll be able to use the internet properly and safely. In our society and economy, digitization is becoming increasingly important. Cybersecurity concerns occur illegally owing to attackers wielding a magic incantation. Cybercrime is a collection of skills, strategies, methods, and processes that are designed to ensure security, computers, software, and information against viruses, attacks, damage, and unauthorized access. Spyware, virus, malware, phishing, hacking, spam, Internet worms, identity thefts, password frauds, firewall flaws, and other vulnerabilities are all on the rise. Cyberwarfare and cyberterrorism are inextricably linked. Globalization opens up a world of possibilities and ensures an easy existence. Nowadays personal and professional life is entirely hooked in to networked items and the automation in practically every stage of human life that has introduced smartness and luxury into standard of living. The first and most important step is to raise public awareness about cyber security.The first and most important step is to raise public awareness about cyber security. As the internet of things (IOT) gets populated with more devices the more challenges it brings to cyber security, these problems have been an obstacle to the growth of cyber security. Ransomware is the former, it is easily one the biggest issues of cyber security, it has been a plague to the cyber security industry for quite some time now. While ransomware is a very huge issue in cyber security, there is another issue that, although not as big or as old as ransomware, is currently growing and considering how fast this challenge is rising it might grow to be a much bigger concern than ransomware. The next problem is a complicated one, a challenge that has become a very huge headache for cyber security experts in recent years, this problem is cloud computing services. There is more to discuss about cloud computing, but it is time to move on to the biggest obstacle of cyber security. In this globalized world, the internet not only connected people together but also pushed the widespread use of digitization. For a company, it is important to ensure the implementation of cybersecurity so that they can protect the company’s property and technology, not only but also the data of their customers. Enterprises need to prepare a lot to implement cybersecurity, but for personal use in daily life, it is much simpler. There are several viable solutions to the advent of cyber-crime that produce relevant resolutions concerning preventive measures that may halt the continuous growth of online criminal activity.

My Clubs

Quazi Hedayet hasn't created or joined any clubs yet.

Quazi's Friends

Quazi hasn't created any friend connections yet.