Preview

Safe Internet/Computer Practices: Case Study

Better Essays
Open Document
Open Document
1317 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Safe Internet/Computer Practices: Case Study
Safe Internet/ Computer Practices
Today the world is moving more quickly than ever before. One thing crucial to the advancement of our modern society is technology. While there are many great things about these new developments, there are still dangers. Setting up a personal home computer or allowing a teen to start a profile on Facebook, are two scenarios where it is critical to engage in proper security and privacy practices. These provisions will allow one’s self and one’s family to safely experience all that today’s technology has to offer.
Setting Up Security On A Mac
Upgrading technology can be an exciting endeavor, however it is important to remember that a personal computer requires some steps in order for it to be ready for safe use.
…show more content…
This will deter anyone seeking free Internet from using mine; which normally slows down the speed. This also helps prevent someone from entering my network to search for my personal information.
Password Strength
Due to my lack of antivirus, I take password security very seriously. Apple support requires minimum password settings, as seen in Figure 1. The password must contain a letter, number, capital letter, at least eight characters, and not be uses in the past year. (Apple Support, 2015). Figure1: (Apple Support, 2015)
In addition to the required Apple password, I also change the password no less than every 180 days. While this may not be completely necessary for a personal computer, I would much rather overprotect than suffer the consequences of not being secure enough. When it comes to protecting my personal information, caution is always the best policy. I also have added a password to access my computer and another to make changes to my computer settings. This prevents someone from stealing my computer and being able to access all of my
…show more content…
I consider it very important to stick with the guidelines you set with a teen. If I tell my child that they are not to lie about their age on Facebook and they choose to do so, their account will closed. Freedom can be a wonderful thing for teens, but as a parent it is crucial to remember that their safety is your number one priority. I do think if you are completely honest with them about the reasons for your rules, and they are truly for their own safety, then there will not be problems. Honestly in 2015, teens need to learn about responsible social media behavior as much as they need to learn any other life skill. Avoiding the Internet is just not a practical option

You May Also Find These Documents Helpful

  • Powerful Essays

    NT 1230 FINAL EXAM REVIEW

    • 542 Words
    • 2 Pages

    used to make sure that you don’t reuse the same password when changing the password? Enforce Password History…

    • 542 Words
    • 2 Pages
    Powerful Essays
  • Good Essays

    Chapter 20 WOS review

    • 512 Words
    • 3 Pages

    What should you configure on an iOS device if you want your data erased after ten failed logon attempts?…

    • 512 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4577 Words
    • 19 Pages

    In this Hi-Tech era, there is a great demand to identify and authenticate the individuals. Till now we are totally dependent upon Passwords and Pin Numbers for identification. How secure are passwords? With the numerous passwords that an individual has to remember, they are often forgotten,…

    • 4577 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    07: Password and Ref

    • 4381 Words
    • 33 Pages

    The PASSWORD EXPIRE option can be used to force a user to change his or her password at the time of the next login.…

    • 4381 Words
    • 33 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 4 Assignment 1

    • 333 Words
    • 1 Page

    In the user domain, the most important security control is training. Regular training on the user and best practices of IT assets is a must. Users need to be trained (and regularly refreshed) on how to create strong passwords, as well as avoid allowing unauthorized access to their system. They need to be trained to identify social engineering and phishing scams, as well as how to physically secure their system when they are not using it.…

    • 333 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 5 Assesment 1

    • 477 Words
    • 3 Pages

    situation you lost that you can't have access to all the password have this policy enable.…

    • 477 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    You don’t want your neighbors or street boys use your internet connection as you are paying yourself and if they get access to the network they might have access to your browsing history and data you stored locally.…

    • 367 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Passwords – for example sharing passwords, insecure passwords, storing username and passwords in public web browsers. This makes your security level low giving easy access to hacker and viruses.…

    • 914 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The year is 2010, the era is the 21st century; and we, citizens of the world, are living in the Information Age. Our information is made available on the Internet where it can be viewed by millions. The days where our data was recorded on scraps of paper and left in a box in an office along with thousands of other registers are long gone. Our personal data is permanently recorded in the hard drives of computers where they can be analysed and exploited by anyone with access to that computer; or worse, identity thieves and hackers may get their hands on the data.…

    • 3006 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    SEC 280 Week 4 Case Study

    • 425 Words
    • 2 Pages

    Home computing has security issues quite different from yet includes all of the ones we face at work. At work Network Administrators secure everything for us and limit what we can access. Many people are not aware of what should be done or how to do it at home to assure the same level of security.…

    • 425 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    We’re secure! We use passwords!” How many of us have heard this claim? Or even – “We’re secure! We have a password policy!” Use a password or to calculate the world today, the password policy is not enough. To set a password in most cases the first line of defence, and much more. “A recent survey by Rainbow Technologies Inc. indicates that the use of insecure passwords can be costly -- and potentially risky -- for corporate data.”[Rosencrance] This paper focuses on the use of passwords and password policy good aspects and bad aspects, set of defined passwords according to password polices scenario that arise…

    • 2513 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    A password is a string of characters used to access information or a computer. Passphrases are typically longer than passwords, for added security, and contain multiple words that create a phrase. Passwords and passphrases help prevent unauthorized people from accessing files, programs, and other resources. When you create a password or passphrase, you should make it strong, which means it's difficult to guess or crack. It's a good idea to use strong passwords on all user accounts on your computer. If you're using a workplace network, your network administrator might require you to use a strong password.…

    • 639 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Cyber Security

    • 312 Words
    • 2 Pages

    knew about, now you have a problem. Everything you tried to keep a secret is now about to be…

    • 312 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Safe Travel

    • 732 Words
    • 3 Pages

    Encrypt Your Data: Just in case your laptop should fall into unauthorized hands, you should make sure your hard drive is encrypted. Laptops with Windows Vista Enterprise or Ultimate come equipped with BitLocker drive encryption. If you aren’t using one of these versions of Windows Vista, and your company has not implemented any other sort of enterprise-wide encryption solution, you can use an open source solution such as TrueCrypt to protect your data.…

    • 732 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    GOOD ONLINE SECURITY HABITS Submitted by: Rashi Kashyap Submitted to: Miss Aarti Vig CREATE STRONG PASSWORDS AND CHANGE THEM ACCORDINGLY Passwords are the keys to the kingdom and are often the only thing standing between your private information and the rest of the world.  Make passwords long and complex  Use a mix of upper and lower case letters  Use numeric and special characters when possible …

    • 334 Words
    • 4 Pages
    Satisfactory Essays