Social Media Causing Poor Mental Health

Social Media Causing Poor Mental Healthcollapsetop Of Formin This Stud

Social media causing poor mental health COLLAPSE Top of Form In this study researcher claim there is a correlation between high social media use and poor mental health (depression, anxiety, loneliness, etc.). Participants were asked to limit their time on each social media app to 10 minutes a day and then provide the researchers the data on their phones. Researchers found that the participants who limited their time on social media felt significantly better after a three-week period, reporting reduced depression (Walton, 2018). The predictor variable in this study is the participants cell phone use, more specifically, their time on social media applications. The outcome variable is their mental health, with less time on social media poor mental health should increase and decrease the presences of depression, anxiety and loneliness.

According to the data provided “People who limited their social media use to 30 minutes … reported less FOMO and less anxiety in the end, which the team suggests may just be a resulting of benefits of increased self-monitoring.” (para. 4). This means there is a positive correlation in this study, as the self-control and self-monitoring increase the outcome variable increases, their mental health improves. My proposed extraneous variable for this study is 140 undergraduate participants could be struggling with poor mental health due to their course load or schoolwork. As a fellow undergraduate I know how stressful college can be and with multiple classes with coursework daily I could find myself depressed due to lack of social interaction.

Extraneous variables “may reduce the likelihood of finding a significant correlation…they can cause changes in the outcome variable.” (Stangor, 2015, p. 175) it is possible that the undergraduates were finishing up their course causing an increase of positive mental health. References Stangor, C. (2015). Research Methods for the Behavioral Sciences (5th ed.). Stamford, CT: Cengage Learning Walton, A. G. (2018, November 18). New Studies Show Just How Bad Social Media Is For Mental Health. Retrieved May 6, 2020, from Bottom of Form Security Strategies in Windows Platforms and Applications Lesson 1 Microsoft Windows and the Threat Landscape © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Cover image © Sharpshot/Dreamstime.com Security Strategies in Windows Platforms and Applications © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. 1 Learning Objective(s) Describe information systems security and the inherent security features of the Microsoft Windows operating system. Describe threats to Microsoft Windows and applications. Security Strategies in Windows Platforms and Applications © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. 2 Key Concepts Information systems security and the C-I-A triad Microsoft Windows and a typical IT infrastructure Vulnerabilities of Microsoft Windows systems and their applications Security Strategies in Windows Platforms and Applications © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. 3 Information Systems Security Defense in depth A collection of strategies to make a computer environment safe Information security Main goal is to prevent loss Most decisions require balance between security and usability Security controls are mechanisms used to protect information Security Strategies in Windows Platforms and Applications © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. 4 Security Controls Security Strategies in Windows Platforms and Applications © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. 5 Type of Control Administrative Type of Function Preventive Detective Corrective Technical Physical C-I-A Triad Security Strategies in Windows Platforms and Applications © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. The practice of securing information involves ensuring three tenets of information security: confidentiality, integrity, and availability Known as the C-I-A triad Also known as the availability, integrity, and confidentiality (A-I-C) triad Each tenet interacts with the other two and, in some cases, may conflict 6 Confidentiality The assurance that the information cannot be accessed or viewed by unauthorized users Examples of confidential information: Financial information Medical information Secret military plans Security Strategies in Windows Platforms and Applications © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. A successful attack against confidential information enables the attacker to use the information to gain an inappropriate advantage or to extort compensation through threats to divulge the information. 7 Integrity The assurance that the information cannot be changed by unauthorized users Ensuring integrity means applying controls that prohibit unauthorized changes to information Examples of integrity controls: Security classification User clearance Security Strategies in Windows Platforms and Applications © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. 8 Availability The assurance that the information is available to authorized users in an acceptable time frame when the information is requested is availability Examples of attacks that affect availability: Denial of service (DoS) Hacktivist Security Strategies in Windows Platforms and Applications © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. 9 Microsoft Windows and Applications in a Typical IT Infrastructure IT infrastructure Collection of computers, devices, and network components that make up an IT environment Security Strategies in Windows Platforms and Applications © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. 10 Microsoft Windows and Applications in a Typical IT Infrastructure Common infrastructure components: Client platforms Network segments Network devices Server instances (often listed by function) Cloud-based offerings, such as Microsoft Office 365 and Microsoft Azure Security Strategies in Windows Platforms and Applications © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. 11 A Sample IT Infrastructure Security Strategies in Windows Platforms and Applications © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Windows Clients Client systems provide functionality to end users; customer-facing systems Include desktops, laptops, and mobile devices Each application can be deployed on client systems as either a thin or a thick client Windows 10 Newest and most popular Windows client operating system Security Strategies in Windows Platforms and Applications © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. 13 Windows Servers Server computers provide services to client applications Common server applications: Web servers, application servers, and database servers Windows Server 2019 Essentials, for small businesses Standard, for most server functions Datacenter, for large-scale deployments Security Strategies in Windows Platforms and Applications © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. 14 Microsoft’s End-User License Agreement (EULA) Software license agreement that contains the Microsoft Software License Terms Must be accepted prior to installation of any Microsoft Windows product Located in the Windows install folder or on the Microsoft website Security Strategies in Windows Platforms and Applications © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. 15 Microsoft EULA Sections Security Strategies in Windows Platforms and Applications © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Updates Additional Notices—Networks, Data, and Internet Usage Limited Warranty Exclusions from Limited Warranty Windows Threats and Vulnerabilities Successful attack: One that realizes, or carries out, a threat against vulnerabilities Security Strategies in Windows Platforms and Applications © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. 17 Risk Any exposure to a threat Threat Any action that could lead to damage, disruption, or loss Vulnerability Weakness in an operating system or application software Windows Threats and Vulnerabilities A threat is not necessarily dangerous Fire in fireplace = desirable Fire in data center = dangerous For damage to occur, there has to be a threat Attackers look for vulnerabilities, then devise an attack that will exploit the weakness Security Strategies in Windows Platforms and Applications © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. 18 Anatomy of Microsoft Windows Vulnerabilities Ransomware Malicious software that renders files or volumes inaccessible through encryption Attacker demands payment using cryptocurrency for the decryption key Well-known ransomware attacks CryptoLocker Locky WannaCry Security Strategies in Windows Platforms and Applications © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Most ransomware encrypts data and demands a payment using cryptocurrency in exchange for the decryption key. 19 Discovery-Analysis-Remediation Cycle Security Strategies in Windows Platforms and Applications © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. A recurring three-step process for addressing attacks 20 Discovery Once an attack starts, attackers become as inconspicuous as possible Need to compare suspect activity baseline (normal activity) to detect anomalies Common method of accomplishing this is to use activity and monitoring logs Security Strategies in Windows Platforms and Applications © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. 21 Analysis Security information and event management (SIEM) tools Collect and aggregate security-related information from multiple sources and devices Help prepare data for correlation and analysis Current vulnerability and security bulletin databases Help you determine if others are experiencing same activity Security Strategies in Windows Platforms and Applications © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. 22 Remediation Contain any damage that has occurred, recover from any loss, and implement controls to prevent a recurrence Security Strategies in Windows Platforms and Applications © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. 23 Common Forms of Attack Threat Description Phishing Generally start with a message that contains a link or image to click, or a file to open; taking these actions launches malware attacks Malware Malicious software designed to carry out tasks that the user would not normally allow Denial of service (DoS) Any action that dramatically slows down or blocks access to one or more resources Injection attack Depends on ability to send instructions to an application that causes the application to carry out unintended actions; SQL injection is common Security Strategies in Windows Platforms and Applications © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. 24 Common Forms of Attack (Cont.) Threat Description Unprotected Windows Share A situation that allows attackers to install tools, including malicious software Session hijacking and credential reuse Attempts by attackers to take over valid sessions or capture credentials to impersonate valid users Cross-site scripting Specially crafted malicious code used to attack web applications Security Strategies in Windows Platforms and Applications © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. 25 Common Forms of Attack (Cont.) Threat Description Packet sniffing The process of collecting network messages as they travel across a network in hopes of divulging sensitive information, such as passwords Security Strategies in Windows Platforms and Applications © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. 26 Summary Information systems security and the C-I-A triad Microsoft Windows and a typical IT infrastructure Vulnerabilities of Microsoft Windows systems and their applications Security Strategies in Windows Platforms and Applications © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. 27 Week 5 Assignment Application: ANOVA Study: The Alpha Shoe Company When you read published research studies, you find experimental studies in which one or more variables are manipulated. One example is a study on whether students with windows in their classrooms give their instructors higher evaluations than students with no windows in their classrooms. You could do a basic comparison of these two groups with a t test, which you studied in Week 4. Perhaps it would be more interesting to have additional levels of environment. You might compare instructor evaluations when students are in a class with no windows, a class with windows that look out to a parking lot, a class with windows that look out to a park, or a class with no windows but pictures of windows on the wall. Since you have multiple levels of the factor, environment, an ANOVA would help you understand the differences between each. This Assignment will give you practice conducting a study with multiple levels of a factor by working once again with the Alpha Shoe Company. Since many research studies rely on the ANOVA for analysis, you will enhance your ability to understand the results of research studies that you evaluate in the future. Scenario: Imagine that Alpha Shoe Company wants to do a second study on the vertical lift basketball players can gain from their shoes. Recall that they believe that how high a player can jump is affected by the type of shoe that player wears. They identified 25 professional basketball players and randomly assigned each of them to wear one of the five types of shoe, then measured how high each player jumped. Each player’s jumping height is given below in inches: Pluto Omega II Beta Super Delta Gamma 29.........................0 Assignment: To complete this Assignment, submit by Day 7 answers to the following. Use SPSS to compare the means of the scores of these five shoes with a one-way ANOVA. Save and submit both your SPSS data file and your output. · Before comparing the scores with an ANOVA, state your null and alternative hypotheses in words (not formulas). · Identify the independent and dependent variables. · Name the levels in your identified factor. · State the within-group degrees of freedom and explain how you calculate it. · State the between-group degrees of freedom and explain how you calculate it. · Identify the obtained F value. · Identify the p value. · Explain whether the F test is significant. Explain how you know and what it tells you. · Explain what you can conclude about the effect of shoe choice on vertical lift (jumping height). · Should you conduct a post hoc test? Why or why not? If yes, conduct a Tukey HSD post hoc analysis. Explain what the results tell you about type of shoe choice and vertical lift. · Submit three documents for grading: your text (Word) document with your answers and explanations to the application questions, your SPSS Data file, and your SPSS Output file. · Provide an APA reference list.