Performed the efficient and timely troubleshooting, remediation, and tracking of Level 2 and 3 functions, supporting Mac and PC clients on Windows-based network environment. Responsible for technical documentation, security administration, and conducting annual audit.
Supported technical infrastructures, including PC hardware, server operating systems, network administration, and network security, as part of IT team for 1000+ internal and remote employees. Became the go-to guy for advanced system troubleshooting, and for providing expertise and advice to team members.
This is a simulated attack & defense scenario of Iran attacking Israel with 3 nuclear bombs simultaneously. Very brief overview of the analysis.
This paper details the current threat of software piracy and contributes to future investigations of software-piracy that are needed to avoid the social and economic damage caused by software thieves (Holsapple, Iygengar, Jin, & Rao, 2008). It investigates the various stages within the software development cycle and determines the most vulnerable areas to theft and compromise. It measures the risks applied to the various threats, and details countermeasures to reduce the threats. The author found that the laws regarding copyright infringement need to be expanded. Software piracy laws need to be stricter in order to provide more deterrence. More unique countermeasures need to be created to stop software piracy from happening without breaking the games for the legitimate consumer.