Engineering Essays (Examples)

Studyspark

Study Document Study Document

Critical Information Literacy

Pages: 1 (280 words) Sources: 2 Document Type:Essay Document #:59120688

Cybercrime how to defend against social engineering
There
are several attack vectors for cybercriminals, which means that people need to have an equal number or more of ways to defend … attack vectors for cybercriminals, which means that people need to have an equal number or more of ways to defend these attacks. Social engineering is one tactic, and it works in part because the attackers essentially bypass formal defenses such as firewalls or antivirus. Instead, social engineering is “the art of exploiting the human flaws to achieve a malicious objective” (Breda, Barbosa & Morais, 2017). A typical social engineering attack would be a phishing scam, but others would include hackers tricking people into providing information, which is then used against them (Kaspersky, … others would include hackers tricking people into providing information, which is then used against them (Kaspersky, 2020).
Protecting personal information online where social engineering attacks are……

References

References

Breda, F., Barbosa, H., Morais, T. (2017) Social engineering and cyber security. Conference Paper.

Kaspersky (2020) What is social engineering? Kaspersky Labs. Retrieved April 15, 2020 from  https://usa.kaspersky.com/resource-center/definitions/social-engineering 

Studyspark

Study Document Study Document

MacBook Pro By Apple Inc Quality Management

Pages: 11 (3159 words) Sources: 5 Document Type:Essay Document #:17953236

… a meeting of the executive team. After the onset of the production of the program, there are two parties responsible involved, including the engineering program manager and the global supply manager. In Apple Inc.'s business operation, these two corporate positions spend the majority of their time in … product and takes it through manufacturing yet again, explicating the different versions that might have been leaked to the media. After that, the engineering program manager takes the beta MacBook Pro device with the intension of examination and feedback. Usually, numerous versions of the device are done … prospect for decreasing manufacturing expenses. Notably, having fewer parts means fewer procurements, inventories, handling, assembling, development, and processing and also decreased time for engineering, servicing, and also testing.
2. Developing and advancing a modular product design
The utilization of modules in television designing, streamlines, and shortens the ……

References

References

Hill, C. W., Jones, G. R., & Schilling, M. A. (2014). Strategic management: theory: an integrated approach. Cengage Learning.

Panzarino, M. (2012). This is how Apple\\\\\\'s top-secret product development process works. The Next Web. Retrieved from:  https://thenextweb.com/apple/2012/01/24/this-is-how-apples-top-secret-product-development-process-works/ 

Interaction Design Foundation. (2020). Apple\\\\\\'s Product Development Process – Inside the World\\\\\\'s Greatest Design Organization. Retrieved from:  https://www.interaction-design.org/literature/article/apple-s-product-development-process-inside-the-world-s-greatest-design-organizatio " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

Security In Communication Challenges

Pages: 10 (2871 words) Sources: 11 Document Type:Research Paper Document #:73429324

...Engineering Chapter 1: Introduction
Wireless communications are, to any extent, the most rapidly growing section of the communications sector. For this reason, it has seized the consideration and responsiveness of the media and the imaginings of the general public (Ijemaru et al., 2018). In the past decade, cellular communications systems have faced exponential growth and development and there exist billions of users all over the globe. Statistics indicate that by the culmination of 2018, there were approximately 5.1 billion individuals across the globe that subscribed to mobile services, and this signified approximately 67 percent of the world’s populace. Furthermore, the statistics indicate that more than 60 percent of the population in the world has accessibility to internet (GSMA, 2019).
In delineation, wireless communication takes into account the transmission of message signals through minimal energy radio frequency waves by utilizing open air, with the media aspect including both a transmitter and a……

References

References

Bagheri-Karam, G. (2010). Physical-Layer Security in Wireless Communication Systems. Ontario: Waterloo.

Chang, Z. (2019). Physical Layer Security in Wireless Communications. University Of Jyväskylä. Retrieved from:  http://users.jyu.fi/~timoh/TIES327/WPLS.pdf 

Chen, Q., Zhang, C., & Zhang, S. (2008). Secure transaction protocol analysis: models and applications. Springer-Verlag.

GSMA. (2019). Number of Mobile Subscribers Worldwide Hits 5 Billion. Retrieved from:  https://www.gsma.com/newsroom/press-release/number-mobile-subscribers-worldwide-hits-5-billion/ 

Gu, X., & Hunt, R. (2005). Wireless LAN attacks and vulnerabilities. the proceeding of IASTED Networks and Communication Systems.

Ijemaru, G. K., Adeyanju, I. A., Olusunyi, K. O., Ofusori, T. J., Ngharamike, E. T., Sobowale, A. A. (2018). Security Challenges of Wireless Communications Networks: A Survey. International Journal of Applied Engineering Research, 13 (8): 5680 – 5692.

IJEMARU, G. K., UDUNWA, A. I., NGHARAMIKE, E. T., & OLEKA, E. U. (2015). Evaluating the Challenging Issues in the Security of Wireless Communication Networks in Nigeria. International Journal of Innovative Technology and Exploring Engineering (IJITEE), Vol. 3, Issue 12, pp. 1-5, 2014.

Jain, A. (2013). Network Security-The Biggest Challenge in Communication. Advance in Electronic and Electric Engineering. Research India Publications.

Studyspark

Study Document Study Document

Competitive Advantage And Operations Management

Pages: 8 (2415 words) Sources: 6 Document Type:Research Paper Document #:99381670

...Engineering Operations Management 3
Purchasing
a. The product available for purchase is a pair of Chanel shoes. There are a number of things that I would take into consideration. Buying behavior is strongly related to whether the purchase is a high-involvement purchase or a low-involvement purchase. A high involvement purchase would involve significantly more time and research than might be the case for a low involvement purchase. Therefore, the amount of research, consideration and time that one would take for this pair of shoes will be dependent on whether the consumer views this purchase as high involvement or low involvement. As Deshmukh and Das (2012) note, social class can be a determinant of consumer behavior, and a pair of Chanel shoes is definitely one of those products. For some, this is a low involvement purchase and for others a high involvement one.
For me, this purchase fits a bit in the……

References

References

Deshmukh, G. & Das, R. (2012) Consumer buying behaviour for high involvement products. Asian Journal of Management. Vol. 3 (3) 153-157.

Halton, C. (2019) Credence good. Investopedia. Retrieved March 26, 2020 from https://www.investopedia.com/terms/c/credence-good.asp

Interbrand (2019) Best global brands. Interbrand Retrieved March 26, 2020 from https://www.interbrand.com/best-brands/best-global-brands/2019/ranking/

QSR (2017) The QSR Top 50. QSR Magazine. Retrieved March 26, 2020 from  https://www.qsrmagazine.com/content/qsr-50 

QuickMBA (2010) The value chain. QuickMBA.com. Retrieved March 26, 2020 from  http://www.quickmba.com/strategy/value-chain/ 

Zhang, B. (2018) The 10 best airlines to fly in North America. Business Insider. Retrieved March 26, 2020 from  https://www.businessinsider.com/best-airlines-in-north-america-for-2018-skytrax-2018-10 

Studyspark

Study Document Study Document

Royale Racing RP16

Pages: 6 (1922 words) Sources: 7 Document Type:Essay Document #:41916637

The Impact of Royale Racing on Race Club Engineering
Introduction
Royale Racing was established in 1968 by Bob King in Great Britain. The company produced single seater race cars until 1987 when ……

References

Works Cited

1973 Royale RP16 Formula Ford.  https://bringatrailer.com/listing/1973-royale-rp16/ 

“About Royale Racing.” Royale FCS Competition Services.  http://www.racingcarsforsale.co.uk/frameset-royale.htm 

Brazilian Formula Ford.  http://www.driverdb.com/standings/152-1970/cars/ 

Lawrence, Paul. Nowhere to Hide: The Story of Royale Racing Cars. TFM Publishing, 2001.

“Royale.”  http://www.f3history.co.uk/Manufacturers/Royale/royale.htm?LMCL=nU3Mya 

Royale Race Tires. “About Us.” http://www.royaleracetires.com/about-us/

Ward, Ian. “Royale Racing.” The World of Automobiles, volume 17. Pennsylvania State University, 1974.

Studyspark

Study Document Study Document

Digital Forensics Importance Of Hash Values

Pages: 5 (1350 words) Sources: 5 Document Type:Essay Document #:47872866

...Engineering Hash Values in Digital Forensics
Introduction
Hash values denote condensed representations of digitized or binary content within digital material; however, they offer no additional information pertaining to the contents of any material interpretable by an individual. Moreover, the hash function is algorithms that convert variable-sized text quantities into hash values (which are fixed-sized outputs). Also called “cryptographic hash functions,” they facilitate the development of digital signatures, short textual condensations, and hash tables for the purpose of analysis (Fang et al., 2011; Kumar et al., 2012). In this paper, hash functions and their significance will be addressed.
Description
H (hash function) represents a transformation taking variable-sized input „m? and returning fixed-sized strings (h or hash value; i.e., h = H (m)) (Kumar et al., 2012). The hash functions possessing only the above property can be put to various broad computational uses; however, when applied to cryptography, they normally possess a few……

References

References

Fang, J., Jiang, Z. L., Yiu, S. M., & Hui, L. C. (2011). An efficient scheme for hard disk integrity check-in digital forensics by hashing with combinatorial group testing. International Journal of Digital Content Technology and its Applications.

Kaya, M., & Eris, M. (2017). Hash-based block matching for digital evidence image files from forensic software tools. World Academy of Science, Engineering, and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 11(10), 1068-1071.

Kumar, K., Sofat, S., Jain, S. K., & Aggarwal, N. (2012). SIGNIFICANCE of hash value generation in digital forensic: A case study. International Journal of Engineering Research and Development, 2(5), 64-70.

Netherlands Forensic Institute, (2018a). Technical Supplement Forensic Use of Hash Values and Associated Hash Algorithms. Ministry of Justice and security.

Rasjid, Z. E., Soewito, B., Witjaksono, G., & Abdurachman, E. (2017). A review of collisions in cryptographic hash function used in digital forensic tools. Procedia computer science, 116, 381-392.

Studyspark

Study Document Study Document

What Is Cybercrime And How To Deter It

Pages: 7 (2243 words) Sources: 5 Document Type:Research Paper Document #:58559500

… the best ways to prevent cybercrime is to educate the end user. The vast majority of cybercrimes come from phishing scams and social engineering, both of which prey on the end user. End users should know better than to click on suspicious links or give away passwords—but ……

References

References

Computer Hope. (2019). When was the first computer invented? Retrieved from  https://www.computerhope.com/issues/ch000984.htm 

Crane, C. (2019). 33 alarming cybercrime statistics you should know in 2019. Retrieved from  https://www.thesslstore.com/blog/33-alarming-cybercrime-statistics-you-should-know/ 

Schjølberg, Stein. (2017). The History of Cybercrime (1976-2016). Books on Demand.

Statista. (2020). Global digital population. Retrieved from  https://www.statista.com/statistics/617136/digital-population-worldwide/ 

Taylor, R. W., Fritsch, E. J., Liederbach, J., Saylor, M. R., & Tafoya, W. L. (2019). Cyber crime and cyber terrorism. NY, NY: Pearson.

Studyspark

Study Document Study Document

Advantages And Disadvantages Of Interrelationships Between Organizational

Pages: 16 (4728 words) Sources: 28 Document Type:Essay Document #:81594345

… also takes care of issues pertaining to navigation, training and development as well as licensing of the organization’s air crew. Secondly, Air India’s engineering department deals with matters pertaining to maintenance, repairing and renovating of aircrafts. In addition, the department is responsible for manufacturing of basic equipment ……

References

References

Air India. (2019). Board of Directors. Retrieved from:  http://www.airindia.in/board-of-directors.htm 

Aquinas, P. G. (2008). Organization structure and design. India: Excel Books India.

Burns, T., & Stalker, G. M. (2005). Mechanistic and organic systems. Organizational Behavior, 2, 214-25.

Choo, S., & Bowley, C. (2007). Emerald Article: Using training and development to affect job satisfaction. Journal of Small Business and Enterprise Development, 14(2),339 - 352.

Cichocki, P., & Irwin, C. (2014). Organization design: A guide to building effective organizations. Kogan Page Publishers.

Civil Aviation. (2019). About Us: Organizational Setup. Retrieved from:  http://www.civilaviation.gov.in/en/aboutus/orgsetup 

Cunliffe, A. L. (2008). Organization theory. New York: Sage.

Cunliffe, A. L., & Luhman, J. T. (2012). Key concepts in organization theory. New York: Sage.

Studyspark

Study Document Study Document

Cyber Crime IT Security Auditing

Pages: 11 (3165 words) Sources: 7 Document Type:Research Paper Document #:36684821

… encompass automated audit instruments such as off-the-rack security auditing systems or auditor-developed instruments, or even manual review methods like auditing checklists and social engineering attack checklists.
Audit processes involve several steps. According to 3D Networks, auditing is a 7-step process (Suduc et al., 2010), the steps being ……

References

References

Almatari, O. and Helal, I., and Mazen, S., and El Hennawy, S. (2018). \\\\\\"Cybersecurity Tools for IS Auditing.\\\\\\" The 6th International Conference on Enterprise Systems, At Limassol, Cyprus 10.1109/ES.2018.00040.

Davis, W. S., & Yen, D. C. (Eds.). (2019). The information system consultant\\\\\\'s handbook: Systems analysis and design. CRC press.

Diamantopoulou, V., Tsohou, A., & Karyda, M. (2019). From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. In Computer Security (pp. 238-257). Springer, Cham.

Khan, M. (2017). Computer security in the human life. International Journal of Computer Science and Engineering (IJCSE), 6(1), 35-42.

Lenghel, R. D., & Vlad, M. P. (2017). INFORMATION SYSTEMS AUDITING. Quaestus, (11), 178.

Manaseer, S., & Alawneh, A. (2019). ON CYBERSECURITY AUDITING AWARENESS: CASE OF INFORMATION AND COMMUNICATION TECHNOLOGY SECTOR. International Journal of Computer Science and Information Security (IJCSIS), 17(7).

Suduc, A. M., Bîzoi, M., & Filip, F. G. (2010). Audit for information systems security. Informatica Economica, 14(1), 43.

Studyspark

Study Document Study Document

Coronavirus COVID 19

Pages: 9 (2907 words) Sources: 4 Document Type:Essay Document #:604304

… as having COVID 19 for that reason—though they are still being counted as infected persons by most media outlets (National Academies of Sciences, Engineering, and Medicine, 2015).  By far the most common symptoms are fever, cough and fatigue, and it is as of yet unclear what percentage ……

References

References

Chen, N., Zhou, M., Dong, X., Qu, J., Gong, F., Han, Y., ... & Yu, T. (2020).  Epidemiological and clinical characteristics of 99 cases of 2019 novel coronavirus pneumonia in Wuhan, China: a descriptive study. The Lancet, 395(10223), 507-513.

Kekatos, M. (2020). Ventilating too soon. Retrieved from  https://www.dailymail.co.uk/health/article-8201783/Some-doctors-moving-away-ventilators-virus-patients.html 

Myers, S. L. (2020). China Spins Tale That the U.S. Army Started the Coronavirus Epidemic. Retrieved from https://www.nytimes.com/2020/03/13/world/asia/coronavirus-china-conspiracy-theory.html

National Academies of Sciences, Engineering, and Medicine. (2015). Improving diagnosis in health care. National Academies Press.

Oliver, D. (2020). Coronavirus genetic material stayed on surfaces for up to 17 days on Diamond Princess cruise, CDC says. Retrieved from  https://www.usatoday.com/story/travel/cruises/2020/03/24/coronavirus-diamond-princess-cabin-surfaces-contaminated-cdc-report/2905924001/ 

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".