Question

"Each day before leaving our homes, we protect the property within. By locking our doors, closing...

"Each day before leaving our homes, we protect the property within. By locking our doors, closing our windows, or activating our security systems, we go to great lengths to ensure that our homes have the necessary safeguards in place to thwart potential intruders and those who may try to steal our personal and precious belongings.

When it comes to our confidential personal information, however, many of us fail to realize that this information is readily available and able to be hacked at a moment’s notice. Just like the locks on our homes protect the very livelihood we hold dear, we must take decisive action to protect ourselves and our personal information from the burdensome ramifications of a cyber attack. Although many of us are aware of the dangers that could result from sharing information with others, we often lack the knowledge that we need to protect ourselves and our families.

In this fast-paced, digital age, nearly everything we do is connected to a computer and the internet, including our communications, our entertainment, transportation, shopping, banking, and even our medical histories and prescriptions. Through technological advances, we are able to send and receive more information than ever before - sometimes - in mere seconds. The amount of information about us that is available online grows each day as our families, friends, employers, banks, doctors, schools and other contacts depend on electronic data. Access to this abundance of information requires great responsibility on our part as consumers and has focused new importance on the field of Cyber Security.

Cyber Security is the practice of protecting our electronic data by preventing, detecting, and responding to cyber-attacks. With each convenience that technology has brought into our lives, the level of inconvenience has also been elevated by making it easier for hackers to obtain our personal and private records, and in turn, making it more difficult for us to prevent it from occurring. Simply withdrawing money from an ATM, electronically filing our taxes, or refilling a prescription online can put us at risk for being hacked. With several recent and high profile examples of cyber attacks, we have all become more aware of this growing problem and, unfortunately, become either a victim or know someone who has experienced this rising epidemic of crime." NY State Senator Michael F. Nozzolio on the New York State Senate web site.

What have you done to assure the security of your electronic data and assets? What are you planning to do to enhance your security? Explain what you've done, plan to do, or what you may be considering, and for each instance, explain how it's accomplished, what it protects, and any flaws (vulnerabilities) it may have.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Question :

What have you done to assure the security of your electronic data and assets? What are you planning to do to enhance your security? Explain what you've done, plan to do, or what you may be considering, and for each instance, explain how it's accomplished, what it protects, and any flaws (vulnerabilities) it may have.

Answer:

The measures taken by me to assure the security of electronic data and assets are as follows:

  • Strong passwords : Securing access to data by establishing passwords ensures utmost safety. Passwords are to changed frequently
  • Storing data on removable disks ensuring its safety. Removable disks are safe to carry with yourself. Protection of the removable disks can be ensured only when carried in safe hands.
  • Installing an antivirus software. It is a must step to protect yourself from online unwanted attacks
  • Installing a strong firewall and anti malware softwares.
  • Taking regular backups of data ensures that data is not lost due to unwanted attacks.

The followings steps shall be taken to enhance the security further :

  • Encryption of data through installing encryption software in the laptop
  • Updating of data and program time to time on regular intervals.
  • Always logging off systems or turning off terminals when not using to ensure that there is no unauthorized access to data.
Add a comment
Know the answer?
Add Answer to:
"Each day before leaving our homes, we protect the property within. By locking our doors, closing...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • IT Law

    employees regarding the risk of cybercrime attacks.”Nedbank clients were in shock on Thursday morning, after it was reported that 1.7 million customers may have had their data breached. Nedbank client's identity numbers, addresses and contact details may have been breached after a "data security incident" at a direct marketing company. According to a statement, Nedbank said they have investigated a data security issue that occurred at the premises of a third-party service provider, namely Computer Facilities. Computer Facilities is a...

  • Law

    employees regarding the risk of cybercrime attacks.”Nedbank clients were in shock on Thursday morning, after it was reported that 1.7 million customers may have had their data breached. Nedbank client's identity numbers, addresses and contact details may have been breached after a "data security incident" at a direct marketing company. According to a statement, Nedbank said they have investigated a data security issue that occurred at the premises of a third-party service provider, namely Computer Facilities. Computer Facilities is a...

  • Peer Reviewer: Describe the problem in your own words. What is the scope? What is the...

    Peer Reviewer: Describe the problem in your own words. What is the scope? What is the severity? Is the problem statement objective? Explain why or why not. Describe the problem statement quality and provide one suggestion for improvement. How was the problem measured? Explain the derivation of the metric and the baseline and the unit of the metric. Make a comment on the quality of the metric used, providing one alternative or additional metric for the problem. List the factors...

  • I need your thoughts about this article. Pew Research recently reported that “roughly six-in-ten U.S. adults...

    I need your thoughts about this article. Pew Research recently reported that “roughly six-in-ten U.S. adults say they do not think it is possible to go through daily life without having data collected about them by companies or the government.” Andrew Hawn, my former colleague and now founder of MetaForesight, is a technology, media and content expert. Andrew has been collaborating with my analytic startup, Metametrix, and we recently spoke about privacy and its far-reaching implications. “We’re seeing a social...

  • Are you prepared for an Emergency- A Disaster? Ready.gov and The American Red Cross suggests that...

    Are you prepared for an Emergency- A Disaster? Ready.gov and The American Red Cross suggests that everyone should be: “Red Cross Ready” What does that mean? It’s important to prepare for possible disasters and other emergencies. Natural and human caused disasters can strike suddenly, at anytime and anywhere. There are three actions everyone can take that can help make a difference • Be informed • Make a plan • Get a kit Be Red Cross Ready Checklist • I know...

  • Our style of attachment affects everything from our partner selection to how well our relationships progress...

    Our style of attachment affects everything from our partner selection to how well our relationships progress to, sadly, how they end. That is why recognizing our attachment pattern can help us understand our strengths and vulnerabilities in a relationship. An attachment pattern is established in early childhood attachments and continues to function as a working model for relationships in adulthood. This model of attachment influences how each of us reacts to our needs and how we go about getting them...

  • Hello, Need my paper proof read, I have problems with my paper structure. I need help...

    Hello, Need my paper proof read, I have problems with my paper structure. I need help with my flow as I feel as if my analysis is not iter mixing with the my paper. For example currently I have citation, citation, example, then my analysis. I need help restructure my paper for better flow. I have copied and pasted my paper for review below: Smart home devices have been a growing trend in the Canadian market with approximately 18% of...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • I have an Assignment of Marketing Research on Climate Change. Where i have to take an...

    I have an Assignment of Marketing Research on Climate Change. Where i have to take an interview of an industry professional, which is done. I have all answer what he said, now i just need to analysis all answer into sub category which are as follow: - 1. Level of Concern of Professionals 2. Impacts on Industry 3. Awareness of Millennials' Knowledge 4. Attitudes Among Millennials If you think any other category could be included please add it. i have...

  • There was no question about Carl’s genius. Seven years ago he decided to enter the competitive...

    There was no question about Carl’s genius. Seven years ago he decided to enter the competitive nightmare that the personal computer business had become. Although on the surface that appeared to be a rather non-genius-like move, the genius came in the unique designs and features that he developed for his computer. He also figured a way to promise delivery in only two days for the local and regional market. Other computer makers also had rapid production and delivery, but they...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT