Macs in Cyber Security

Preview:

Citation preview

Mac study in Cyber Security

By: Jacob Hughes

Table of Contents Slide 3 – Intro Slide 4-6 – Important Information Slide 7 – Conclusion on Study Slide 8 - References

Intro Due to the increasing amount of users for Mac-OS computers,

it is only a matter of time until Macs are used in the business setting.

In an article about IBM and its Bring Your Own Device program, a total of 15,000 out of their 380,000 employees brought in Mac devices. This program gave them the information that they should allow employees to choose between Mac and PC rather than just supplying PCs.

With the wider use of Mac computers for business, I believe that the Cyber Security concentration at California State University, San Bernardino should incorporate Mac Security into its curriculum.

Information

With more people growing up using Macbooks and iPhones, it would sooner be better to include Apple products into the business world than to shun people and force them to learn to use Windows PCs.

The interconnectivity of our society proves that Cyber Security is a more integrated thing and needs to be taken to account on a personal level on what is causing a threat in the security.

So the best way to train the people that would be hired to protect the technological assets of the company, they should know how to protect all sorts of technology even if the “Business Standard” has always been Windows PC.

Information

Self explanatory picture.Although Windows desktopsAnd laptops are a majority of the market, Mac’s OS X iscurrently making its place inthe market as shown.

Information

While Windows PCs have been the business standard for many years dating back to 1982 when Windows first unveiled MS-DOS for computers giving the computer a Graphical User Interface, also known as a GUI.

Apple came up with a GUI just two years after in 1984

Windows 1.0 Mac system software 1.0

Conclusion Thus, I believe that training the future of “Cyber Security” and the

people who will hold the positions of Chief Information Security Officer should be informed in all of the areas of Security from Routers to Ethernet and from Windows to Macintosh.

References

Bort, Julie. "For the First Time, IBM Offers to Buy Employees a Mac and Will Become One of the Biggest Apple Shops." Business Insider. Business Insider, Inc, 28 May 2015. Web. 29 May 2015.

Pumphrey, Clint.  "10 Differences Between Macs and PCs"  08 August 2011.  HowStuffWorks.com. <http://computer.howstuffworks.com/macs/10-differences-between-macs-and-pcs.htm>  29 May 2015.

Recommended