Upload
jacob-hughes
View
168
Download
0
Embed Size (px)
Citation preview
Mac study in Cyber Security
By: Jacob Hughes
Table of Contents Slide 3 – Intro Slide 4-6 – Important Information Slide 7 – Conclusion on Study Slide 8 - References
Intro Due to the increasing amount of users for Mac-OS computers,
it is only a matter of time until Macs are used in the business setting.
In an article about IBM and its Bring Your Own Device program, a total of 15,000 out of their 380,000 employees brought in Mac devices. This program gave them the information that they should allow employees to choose between Mac and PC rather than just supplying PCs.
With the wider use of Mac computers for business, I believe that the Cyber Security concentration at California State University, San Bernardino should incorporate Mac Security into its curriculum.
Information
With more people growing up using Macbooks and iPhones, it would sooner be better to include Apple products into the business world than to shun people and force them to learn to use Windows PCs.
The interconnectivity of our society proves that Cyber Security is a more integrated thing and needs to be taken to account on a personal level on what is causing a threat in the security.
So the best way to train the people that would be hired to protect the technological assets of the company, they should know how to protect all sorts of technology even if the “Business Standard” has always been Windows PC.
Information
Self explanatory picture.Although Windows desktopsAnd laptops are a majority of the market, Mac’s OS X iscurrently making its place inthe market as shown.
Information
While Windows PCs have been the business standard for many years dating back to 1982 when Windows first unveiled MS-DOS for computers giving the computer a Graphical User Interface, also known as a GUI.
Apple came up with a GUI just two years after in 1984
Windows 1.0 Mac system software 1.0
Conclusion Thus, I believe that training the future of “Cyber Security” and the
people who will hold the positions of Chief Information Security Officer should be informed in all of the areas of Security from Routers to Ethernet and from Windows to Macintosh.
References
Bort, Julie. "For the First Time, IBM Offers to Buy Employees a Mac and Will Become One of the Biggest Apple Shops." Business Insider. Business Insider, Inc, 28 May 2015. Web. 29 May 2015.
Pumphrey, Clint. "10 Differences Between Macs and PCs" 08 August 2011. HowStuffWorks.com. <http://computer.howstuffworks.com/macs/10-differences-between-macs-and-pcs.htm> 29 May 2015.