SlideShare a Scribd company logo
1 of 8
Mac study in Cyber Security
By: Jacob Hughes
Table of Contents
 Slide 3 – Intro
 Slide 4-6 – Important Information
 Slide 7 – Conclusion on Study
 Slide 8 - References
Intro
 Due to the increasing amount of users for Mac-OS computers, it is only
a matter of time until Macs are used in the business setting.
 In an article about IBM and its Bring Your Own Device program, a total
of 15,000 out of their 380,000 employees brought in Mac devices. This
program gave them the information that they should allow employees
to choose between Mac and PC rather than just supplying PCs.
 With the wider use of Mac computers for business, I believe that the
Cyber Security concentration at California State University, San
Bernardino should incorporate Mac Security into its curriculum.
Information
 With more people growing up using Macbooks and iPhones, it would sooner be
better to include Apple products into the business world than to shun people
and force them to learn to use Windows PCs.
 The interconnectivity of our society proves that Cyber Security is a more
integrated thing and needs to be taken to account on a personal level on what
is causing a threat in the security.
 So the best way to train the people that would be hired to protect the
technological assets of the company, they should know how to protect all
sorts of technology even if the “Business Standard” has always been Windows
PC.
Information
Self explanatory picture.
Although Windows desktops
And laptops are a majority
of the market, Mac’s OS X is
currently making its place in
the market as shown.
Information
 While Windows PCs have been the business standard for many years dating
back to 1982 when Windows first unveiled MS-DOS for computers giving the
computer a Graphical User Interface, also known as a GUI.
 Apple came up with a GUI just two years after in 1984
Windows 1.0 Mac system software 1.0
Conclusion
 Thus, I believe that training the future of “Cyber Security” and the people
who will hold the positions of Chief Information Security Officer should be
informed in all of the areas of Security from Routers to Ethernet and from
Windows to Macintosh.
References
 Bort, Julie. "For the First Time, IBM Offers to Buy Employees a Mac and Will
Become One of the Biggest Apple Shops." Business Insider. Business Insider,
Inc, 28 May 2015. Web. 29 May 2015.
 Pumphrey, Clint. "10 Differences Between Macs and PCs" 08 August
2011. HowStuffWorks.com. <http://computer.howstuffworks.com/macs/10-
differences-between-macs-and-pcs.htm> 29 May 2015.

More Related Content

What's hot

The Top 7 Trends That Will Drive Embedded Technologies in 2019 & Beyond
The Top 7 Trends That Will DriveEmbedded Technologies in 2019 & BeyondThe Top 7 Trends That Will DriveEmbedded Technologies in 2019 & Beyond
The Top 7 Trends That Will Drive Embedded Technologies in 2019 & BeyondJohn W. Koon
 
Trends in recent technology
Trends in recent technologyTrends in recent technology
Trends in recent technologysai krishna
 
Internet of things
Internet of thingsInternet of things
Internet of thingsManje Gowda
 
24 7 internet of Everything Everywhere
24 7 internet of  Everything  Everywhere24 7 internet of  Everything  Everywhere
24 7 internet of Everything EverywhereGlenn McKnight
 
Top Internet & Technology Trends for 2014
Top Internet & Technology Trends for 2014Top Internet & Technology Trends for 2014
Top Internet & Technology Trends for 2014QNET Ltd
 
Ingrid Moerman, iMinds - UGent, iMinds The Conference 2013
Ingrid Moerman, iMinds - UGent, iMinds The Conference 2013Ingrid Moerman, iMinds - UGent, iMinds The Conference 2013
Ingrid Moerman, iMinds - UGent, iMinds The Conference 2013imec
 
Information Technology Infrastructure
Information Technology Infrastructure Information Technology Infrastructure
Information Technology Infrastructure Hurriya Saeed rana
 
IoT Technology Tutorial | IoT Technology Stack | IoT Project Hands-On | Edureka
IoT Technology Tutorial | IoT Technology Stack | IoT Project Hands-On | EdurekaIoT Technology Tutorial | IoT Technology Stack | IoT Project Hands-On | Edureka
IoT Technology Tutorial | IoT Technology Stack | IoT Project Hands-On | EdurekaEdureka!
 
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
 Revealing the Potential and Risks From the Coming Together of IoT, AI, and C... Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...IndianAppDevelopers
 
It Innovation Presentation
It Innovation PresentationIt Innovation Presentation
It Innovation PresentationGfK MODE
 
Casestudypownership
CasestudypownershipCasestudypownership
Casestudypownershipk_ishii_
 
Top 10 Technologies to Learn in 2019 | Trending Technologies 2019 | Top 10 Te...
Top 10 Technologies to Learn in 2019 | Trending Technologies 2019 | Top 10 Te...Top 10 Technologies to Learn in 2019 | Trending Technologies 2019 | Top 10 Te...
Top 10 Technologies to Learn in 2019 | Trending Technologies 2019 | Top 10 Te...Simplilearn
 
Manfred-Touron-resume
Manfred-Touron-resumeManfred-Touron-resume
Manfred-Touron-resumevisual_resume
 
Manfred-Touron-resume
Manfred-Touron-resumeManfred-Touron-resume
Manfred-Touron-resumevisual_resume
 
Globally Connected
Globally ConnectedGlobally Connected
Globally Connectedvijayanand
 
Top 10 Trending Technologies To Master In 2021
Top 10 Trending Technologies To Master In 2021Top 10 Trending Technologies To Master In 2021
Top 10 Trending Technologies To Master In 2021LokeshLusifer
 

What's hot (20)

Iot
IotIot
Iot
 
IT Trends – A Personal Perspective
IT Trends – A Personal PerspectiveIT Trends – A Personal Perspective
IT Trends – A Personal Perspective
 
The Microsoft Way
The Microsoft WayThe Microsoft Way
The Microsoft Way
 
The Top 7 Trends That Will Drive Embedded Technologies in 2019 & Beyond
The Top 7 Trends That Will DriveEmbedded Technologies in 2019 & BeyondThe Top 7 Trends That Will DriveEmbedded Technologies in 2019 & Beyond
The Top 7 Trends That Will Drive Embedded Technologies in 2019 & Beyond
 
Trends in recent technology
Trends in recent technologyTrends in recent technology
Trends in recent technology
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
24 7 internet of Everything Everywhere
24 7 internet of  Everything  Everywhere24 7 internet of  Everything  Everywhere
24 7 internet of Everything Everywhere
 
Top Internet & Technology Trends for 2014
Top Internet & Technology Trends for 2014Top Internet & Technology Trends for 2014
Top Internet & Technology Trends for 2014
 
Ingrid Moerman, iMinds - UGent, iMinds The Conference 2013
Ingrid Moerman, iMinds - UGent, iMinds The Conference 2013Ingrid Moerman, iMinds - UGent, iMinds The Conference 2013
Ingrid Moerman, iMinds - UGent, iMinds The Conference 2013
 
Information Technology Infrastructure
Information Technology Infrastructure Information Technology Infrastructure
Information Technology Infrastructure
 
IoT Technology Tutorial | IoT Technology Stack | IoT Project Hands-On | Edureka
IoT Technology Tutorial | IoT Technology Stack | IoT Project Hands-On | EdurekaIoT Technology Tutorial | IoT Technology Stack | IoT Project Hands-On | Edureka
IoT Technology Tutorial | IoT Technology Stack | IoT Project Hands-On | Edureka
 
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
 Revealing the Potential and Risks From the Coming Together of IoT, AI, and C... Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
 
It Innovation Presentation
It Innovation PresentationIt Innovation Presentation
It Innovation Presentation
 
Casestudypownership
CasestudypownershipCasestudypownership
Casestudypownership
 
Top 10 Technologies to Learn in 2019 | Trending Technologies 2019 | Top 10 Te...
Top 10 Technologies to Learn in 2019 | Trending Technologies 2019 | Top 10 Te...Top 10 Technologies to Learn in 2019 | Trending Technologies 2019 | Top 10 Te...
Top 10 Technologies to Learn in 2019 | Trending Technologies 2019 | Top 10 Te...
 
ais 150
ais 150ais 150
ais 150
 
Manfred-Touron-resume
Manfred-Touron-resumeManfred-Touron-resume
Manfred-Touron-resume
 
Manfred-Touron-resume
Manfred-Touron-resumeManfred-Touron-resume
Manfred-Touron-resume
 
Globally Connected
Globally ConnectedGlobally Connected
Globally Connected
 
Top 10 Trending Technologies To Master In 2021
Top 10 Trending Technologies To Master In 2021Top 10 Trending Technologies To Master In 2021
Top 10 Trending Technologies To Master In 2021
 

Viewers also liked

NACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansNACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansMaurice Dawson
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 

Viewers also liked (6)

NACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansNACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New Orleans
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Similar to Macs in Cyber Security

Introduction of Cloud Computing By Pawan Thakur HOD CS & IT
Introduction of Cloud Computing By Pawan Thakur HOD CS & ITIntroduction of Cloud Computing By Pawan Thakur HOD CS & IT
Introduction of Cloud Computing By Pawan Thakur HOD CS & ITGovt. P.G. College Dharamshala
 
Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_ukJ
 
Decline Of Apple Essay
Decline Of Apple EssayDecline Of Apple Essay
Decline Of Apple EssayJamie Boyd
 
Platform Leadership
Platform LeadershipPlatform Leadership
Platform LeadershipSangmin Cha
 
Infobulletin Oct14 - Smartwatches watching you?, Blanket Wi-Fi, Tether your p...
Infobulletin Oct14 - Smartwatches watching you?, Blanket Wi-Fi, Tether your p...Infobulletin Oct14 - Smartwatches watching you?, Blanket Wi-Fi, Tether your p...
Infobulletin Oct14 - Smartwatches watching you?, Blanket Wi-Fi, Tether your p...Co-Operative Systems
 
The Security Of Cloud Computing
The Security Of Cloud ComputingThe Security Of Cloud Computing
The Security Of Cloud ComputingJulie May
 
Moving enterprise IT to the cloud
Moving enterprise IT to the cloudMoving enterprise IT to the cloud
Moving enterprise IT to the cloudJan Wiersma
 

Similar to Macs in Cyber Security (14)

Introduction of Cloud Computing By Pawan Thakur HOD CS & IT
Introduction of Cloud Computing By Pawan Thakur HOD CS & ITIntroduction of Cloud Computing By Pawan Thakur HOD CS & IT
Introduction of Cloud Computing By Pawan Thakur HOD CS & IT
 
Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_uk
 
cloud security
cloud securitycloud security
cloud security
 
Technology update
Technology updateTechnology update
Technology update
 
Decline Of Apple Essay
Decline Of Apple EssayDecline Of Apple Essay
Decline Of Apple Essay
 
Platform Leadership
Platform LeadershipPlatform Leadership
Platform Leadership
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Infobulletin Oct14 - Smartwatches watching you?, Blanket Wi-Fi, Tether your p...
Infobulletin Oct14 - Smartwatches watching you?, Blanket Wi-Fi, Tether your p...Infobulletin Oct14 - Smartwatches watching you?, Blanket Wi-Fi, Tether your p...
Infobulletin Oct14 - Smartwatches watching you?, Blanket Wi-Fi, Tether your p...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
The Security Of Cloud Computing
The Security Of Cloud ComputingThe Security Of Cloud Computing
The Security Of Cloud Computing
 
Moving enterprise IT to the cloud
Moving enterprise IT to the cloudMoving enterprise IT to the cloud
Moving enterprise IT to the cloud
 
Cloud technology 10 years from now
Cloud technology 10 years from nowCloud technology 10 years from now
Cloud technology 10 years from now
 
INT 1010 03.pdf
INT 1010 03.pdfINT 1010 03.pdf
INT 1010 03.pdf
 

Recently uploaded

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 

Recently uploaded (20)

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 

Macs in Cyber Security

  • 1. Mac study in Cyber Security By: Jacob Hughes
  • 2. Table of Contents  Slide 3 – Intro  Slide 4-6 – Important Information  Slide 7 – Conclusion on Study  Slide 8 - References
  • 3. Intro  Due to the increasing amount of users for Mac-OS computers, it is only a matter of time until Macs are used in the business setting.  In an article about IBM and its Bring Your Own Device program, a total of 15,000 out of their 380,000 employees brought in Mac devices. This program gave them the information that they should allow employees to choose between Mac and PC rather than just supplying PCs.  With the wider use of Mac computers for business, I believe that the Cyber Security concentration at California State University, San Bernardino should incorporate Mac Security into its curriculum.
  • 4. Information  With more people growing up using Macbooks and iPhones, it would sooner be better to include Apple products into the business world than to shun people and force them to learn to use Windows PCs.  The interconnectivity of our society proves that Cyber Security is a more integrated thing and needs to be taken to account on a personal level on what is causing a threat in the security.  So the best way to train the people that would be hired to protect the technological assets of the company, they should know how to protect all sorts of technology even if the “Business Standard” has always been Windows PC.
  • 5. Information Self explanatory picture. Although Windows desktops And laptops are a majority of the market, Mac’s OS X is currently making its place in the market as shown.
  • 6. Information  While Windows PCs have been the business standard for many years dating back to 1982 when Windows first unveiled MS-DOS for computers giving the computer a Graphical User Interface, also known as a GUI.  Apple came up with a GUI just two years after in 1984 Windows 1.0 Mac system software 1.0
  • 7. Conclusion  Thus, I believe that training the future of “Cyber Security” and the people who will hold the positions of Chief Information Security Officer should be informed in all of the areas of Security from Routers to Ethernet and from Windows to Macintosh.
  • 8. References  Bort, Julie. "For the First Time, IBM Offers to Buy Employees a Mac and Will Become One of the Biggest Apple Shops." Business Insider. Business Insider, Inc, 28 May 2015. Web. 29 May 2015.  Pumphrey, Clint. "10 Differences Between Macs and PCs" 08 August 2011. HowStuffWorks.com. <http://computer.howstuffworks.com/macs/10- differences-between-macs-and-pcs.htm> 29 May 2015.