Preview

Cyber Security

Satisfactory Essays
Open Document
Open Document
368 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Security
Checkpoint: Cyber Security

Checkpoint: Cyber Security I have a multitude of passwords to memorize in an effort to maintain my privacy and security. It is unfortunate that cyber world users must constantly deploy measures to keep their personal information private. Before this class I was certainly aware of the potential dangers that could occur in cyberspace, prevention always has been my goal. I have security protection in place against attacks such as viruses, spam, malware, spyware, and adware and I ensure that the protection is up-to-date as it is essential part of prevention is to remain current. Other security measures an average user may do is to maintain their system is to allow Microsoft Windows to perform automatic updates. These updates can provide additional security measures to the system info structure. Running regular maintenance such as a system defragmentation will keep the system up-to-date and in proper order. The average user should also password protect their personal information. If the wireless network James used had been password protected James would not have had the opportunity to enter the network without first inputting the password.. I would feel violated to know that someone was using my wireless network without my authorization I would be horrified to know that individual was plundering through my private things. Securing a personal computer and a wireless network with a password is extremely important otherwise the system is open and vulnerable toward an attack. Furthermore, James was placing himself at risk by entering an unknown unsecured network. When I review the network settings on my wireless network I am able to view data, websites and activity going through my network. I enjoy this feature because I am able to see what my children are doing when they are online. I teach my boys how to protect themselves while online. In the future I plan to remain aware of any potential treats and I will review any new

You May Also Find These Documents Helpful

  • Better Essays

    In order for ZXY Inc. to make sure that their entire organization is secure, some proposals have been put into place to protect the company. The company needs to make sure that the network, their employee’s, company devices, and communications are secure from the outside world. The proposals that have been put into place cover such areas as: access control methods, authentication, user’s accounts and passwords, cryptography, remote access, network attack mitigation, malware and device vulnerabilities, and web and e-mail attack mitigation. These proposals when combined together help form an entire security policy for ZXY Inc. to use in order to protect all company assets.…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Powerful Essays

    Network Security

    • 581 Words
    • 3 Pages

    1. A(n) hub____ is a standard network device for connecting multiple Ethernet devices together by using twisted-pair copper or fiber-optic cables in order to make them function as a single network segment.…

    • 581 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Computer Security

    • 810 Words
    • 4 Pages

    The difference between laws and ethics is laws are mandated and ethics are the basis of laws and the “right or wrongs” a person believes in.…

    • 810 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Cliff, A. (2001, July 3). Intrusion detection systems terminology, part one: A – H. Symantec. Retrieved from http://www.symantec.com/connect/articles/intrusion-detection-systems-terminology-part-one-h…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Satisfactory Essays

    Cyberslacking

    • 387 Words
    • 2 Pages

    “A recent survey sponsored by the American Management Association and the ePolicy Institute reported that more than one-quarter of employers have fired employees for the misuse of email, and about one-third have fired employees for misusing the Internet”, stated by the authors Ivancevich, J., Konopaske R., Matteson, M., (2011)(p.229). Chapter 8 discusses different misbehaviors in the job environment. One of those misbehaviors is cyberslacking; this term is referred to employees who surf the internet, while at work for personal reasons such as: “Viewing pornographic sites and news sites, shopping, stock trading, vacation planning, gaming, chatting, in other words, engaging in general non-business Internet activities on company time and using company resources”, stated W. Block (2001)(p.33).…

    • 387 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cyber Security

    • 635 Words
    • 3 Pages

    The Merriam-Webster’s Dictionary defines cyber security measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack Most people think that hackers are just people that want to mess up your computer, but real hackers break into systems because they want to see what they can do, then they might leave a message on the victims computer, but that’s it. So, the computer security people protect from those other hackers that want to mess up peoples computers. The means we take can as individual to protect ourselves in the cyber world is be anyomous on websites, don’t post your personal information ,have virus protection install on your computer, get spy ware , get spam guard protect towards your email accounts, and have firewall software protection on your computer.…

    • 635 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Network Security

    • 678 Words
    • 3 Pages

    This assignment consists of two (2) sections: an infrastructure document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for.…

    • 678 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Cyber Security

    • 4964 Words
    • 20 Pages

    This research paper tackles the issues that faces Cloud Computing today and gives the experts and industry’s point of view on the matter. The aspects explored are the significant industry questions that have risen about the use of Cloud Computing, business value, organization impact, adaptability, limitations, initial cost of implementation, and the severe business security risks due to centralization of resources. Brian Proffitt will argue in is IT World article [24], there are some serious limitations with cloud computing that is being blithely ignored such as bandwidth limitation, storage, and availability. Interviews conducted with colleagues that are experts in the Enterprise Systems network arena reveals that, the impact is all in planning before implementation, the selected architecture and the security policy. Findings in manuscripts and online libraries reflect that Cloud Computing is a technological revolution that provides computer resources as a service; offering flexible IT usage, computing efficiency through improved utilization and reduced administration and infrastructure costs. Users are not limited to applications confined to a computer, data stored to a hard drive, or bounded by the organization’s network. Also known as the sum of Software as a Service (SaaS) and Utility Computing, Cloud Computing is argued to be more efficient and scalable. My hope is to identify the common issues that face Cloud Computing in organizations that have implemented it, and find the answer or probable solutions.…

    • 4964 Words
    • 20 Pages
    Best Essays
  • Powerful Essays

    Information Security

    • 874 Words
    • 4 Pages

    A threat agent is the facilitator of an attack however; a threat is a constant danger to an asset.…

    • 874 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Cyber Security

    • 12723 Words
    • 51 Pages

    play a major role in almost every crime that is committed. Every crime that is…

    • 12723 Words
    • 51 Pages
    Powerful Essays
  • Good Essays

    CyberSecurity

    • 754 Words
    • 3 Pages

    DDoSDDoS means Distributed Denial of Service and what that means is that it spams a target with so many request to the point that the target is really slow and inoperable or crashes.…

    • 754 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cyber Security

    • 1903 Words
    • 8 Pages

    A. C´ardenas , R. Moreno, “Cyber-Physical Systems security for the Smart Grid,” CPS Workshop 2011.…

    • 1903 Words
    • 8 Pages
    Good Essays
  • Good Essays

    While there are many threats out there today many of these threats are almost always targeted towards anything to do with business and money because they are always looking to gain free access to money sources or a way to steal things from companies or customers who have done business with them in the past. I am going to choose a local Company which is a very big store chain here in my state and a good many other states around the area, it is called Wal-Mart, they offer everything from car parts, food, pet supplies, normal supplies for daily use, electronics, clothes, just about anything you can imagine they have it and along with an online store as well to ship from other stores or to ship to homes.…

    • 1196 Words
    • 4 Pages
    Good Essays
  • Good Essays

    information security

    • 528 Words
    • 3 Pages

    Information Security Attributes: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are composed in three main portions, hardware, software and communications with the purpose to help identify and apply information security industry standards, as mechanisms of protection and prevention, at three levels or layers: physical, personal and organizational. Essentially, procedures or policies are implemented to tell people (administrators, users and operators) how to use products to ensure information security within the organizations.…

    • 528 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Information Security

    • 1992 Words
    • 8 Pages

    * You can embed a mobile site into an app at a later stage of development…

    • 1992 Words
    • 8 Pages
    Good Essays