8
Mac study in Cyber Security By: Jacob Hughes

Macs in Cyber Security

Embed Size (px)

Citation preview

Page 1: Macs in Cyber Security

Mac study in Cyber Security

By: Jacob Hughes

Page 2: Macs in Cyber Security

Table of Contents Slide 3 – Intro Slide 4-6 – Important Information Slide 7 – Conclusion on Study Slide 8 - References

Page 3: Macs in Cyber Security

Intro Due to the increasing amount of users for Mac-OS computers,

it is only a matter of time until Macs are used in the business setting.

In an article about IBM and its Bring Your Own Device program, a total of 15,000 out of their 380,000 employees brought in Mac devices. This program gave them the information that they should allow employees to choose between Mac and PC rather than just supplying PCs.

With the wider use of Mac computers for business, I believe that the Cyber Security concentration at California State University, San Bernardino should incorporate Mac Security into its curriculum.

Page 4: Macs in Cyber Security

Information

With more people growing up using Macbooks and iPhones, it would sooner be better to include Apple products into the business world than to shun people and force them to learn to use Windows PCs.

The interconnectivity of our society proves that Cyber Security is a more integrated thing and needs to be taken to account on a personal level on what is causing a threat in the security.

So the best way to train the people that would be hired to protect the technological assets of the company, they should know how to protect all sorts of technology even if the “Business Standard” has always been Windows PC.

Page 5: Macs in Cyber Security

Information

Self explanatory picture.Although Windows desktopsAnd laptops are a majority of the market, Mac’s OS X iscurrently making its place inthe market as shown.

Page 6: Macs in Cyber Security

Information

While Windows PCs have been the business standard for many years dating back to 1982 when Windows first unveiled MS-DOS for computers giving the computer a Graphical User Interface, also known as a GUI.

Apple came up with a GUI just two years after in 1984

Windows 1.0 Mac system software 1.0

Page 7: Macs in Cyber Security

Conclusion Thus, I believe that training the future of “Cyber Security” and the

people who will hold the positions of Chief Information Security Officer should be informed in all of the areas of Security from Routers to Ethernet and from Windows to Macintosh.

Page 8: Macs in Cyber Security

References

Bort, Julie. "For the First Time, IBM Offers to Buy Employees a Mac and Will Become One of the Biggest Apple Shops." Business Insider. Business Insider, Inc, 28 May 2015. Web. 29 May 2015.

Pumphrey, Clint.  "10 Differences Between Macs and PCs"  08 August 2011.  HowStuffWorks.com. <http://computer.howstuffworks.com/macs/10-differences-between-macs-and-pcs.htm>  29 May 2015.