Introduction
One of the most valuable assets of my computer is its data. The data stores in my computer itself vary among of my personal details and my organization's circumstances and economic status which were collected by me in the last few years. Without personal data, various documents and many paid software of my computer useless. Risk management audit data has accessed a computer or network which vulnerabilities and discovered to take measures to manage the risk.
Risk Management Steps
Many times we do not address, and it has not felt it necessary to maintain its threat of our computer. It is very importance to understand how to protect the risk. My personal information is as valuable such as …show more content…
Misconfigured
2. Software Virus
3. Cyber Attack
4. Cyber Enslaved Stolen
5. Lost
6. Misplaced Inoperative
7. Fire Damage
Risk Mitigation
Finally, when the identification, appraisal and assessment, should determine what we need to do this. To accept what they are, and what I will take to solve the problem.
I always used WPA2, which is encrypted to protect my wireless access point (AP).
I have configured to prevent unauthorized applications, programs and services to accept incoming connections, and my knowledge to protect my system from attack personal firewall. I have enabled the "stealth mode", which guide my computer does not respond or confirm trying to access my computer. Stealth mode will ignore or can ping scan computer application.
When I am traveling, I'm tired of my computer bag with me, and I make sure I have it with me at all times. I also have my portable installation function called "Find My PC," so I can track my laptop or PC by global positioning system (GPS) tracking. If stolen, I have a remote computer locking system and remote wipe options which can remove all data from my hard disk drive, even if no user