Thursday, November 21, 2019

Cybersecurity Best Practices Assignment Example | Topics and Well Written Essays - 2500 words

Cybersecurity Best Practices - Assignment Example The safety of one’s computer, network or personal information need to be protected by viruses, identity thieves, malware and any other form of threat. The steps to be taken to protect the above and safeguard personal systems shall be addressed in relation to two case studies analysed herein. Upon receiving a new computer for the home environment, it is necessary to ensure this system is as secure as possible. Both the computer and the home network need to be protected from viruses, hackers and malware. The home network should be guarded from external threats because it is used to perform sensitive transactions such as online banking services, online shopping among others that may require one to share private information. It is this information that hackers seek access to, in order to attempt to steal a person’s identity and use their credit card information or bank details, for example, to access the victim’s finances. In addition to numerous security tools and programs that one can install into their computer and use to keep the system secure, it is advisable to take an interest in hacking methods, so that one knows when their system is under threat. It is due to this type of negligence that many victims fail to prepare themselves properly in case of an attack. This lack of preparedness has also seen efforts to recover from cyber-attacks rendered ineffective. Such information can be found online in trusted websites, with training on the latest hacking methods and scams being identified and addressed. It is therefore important for individuals to take up some time and learn about hacking and methods of countering the same. In order to secure this type of network, the following steps should be undertaken. The setting up of a home network has the advantage that an individual can have access to the internet from any point within the premises either

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.