Preview

Cyber Security

Satisfactory Essays
Open Document
Open Document
368 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Security
Checkpoint: Cyber Security

Checkpoint: Cyber Security I have a multitude of passwords to memorize in an effort to maintain my privacy and security. It is unfortunate that cyber world users must constantly deploy measures to keep their personal information private. Before this class I was certainly aware of the potential dangers that could occur in cyberspace, prevention always has been my goal. I have security protection in place against attacks such as viruses, spam, malware, spyware, and adware and I ensure that the protection is up-to-date as it is essential part of prevention is to remain current. Other security measures an average user may do is to maintain their system is to allow Microsoft Windows to perform automatic updates. These updates can provide additional security measures to the system info structure. Running regular maintenance such as a system defragmentation will keep the system up-to-date and in proper order. The average user should also password protect their personal information. If the wireless network James used had been password protected James would not have had the opportunity to enter the network without first inputting the password.. I would feel violated to know that someone was using my wireless network without my authorization I would be horrified to know that individual was plundering through my private things. Securing a personal computer and a wireless network with a password is extremely important otherwise the system is open and vulnerable toward an attack. Furthermore, James was placing himself at risk by entering an unknown unsecured network. When I review the network settings on my wireless network I am able to view data, websites and activity going through my network. I enjoy this feature because I am able to see what my children are doing when they are online. I teach my boys how to protect themselves while online. In the future I plan to remain aware of any potential treats and I will review any new

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The article was considerably valid as was demonstrated by credible news programs and other articles. The importance of keeping patches and antivirus signatures up to date, to help prevent these types of attacks was discussed in detail. Users selecting strong passwords was also discussed, and revealed as a key component in the ability to compromise these accounts. This article was valuable and affected a lot of people. It is clear that there are prevention methods that can be used, to secure your…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    In order for ZXY Inc. to make sure that their entire organization is secure, some proposals have been put into place to protect the company. The company needs to make sure that the network, their employee’s, company devices, and communications are secure from the outside world. The proposals that have been put into place cover such areas as: access control methods, authentication, user’s accounts and passwords, cryptography, remote access, network attack mitigation, malware and device vulnerabilities, and web and e-mail attack mitigation. These proposals when combined together help form an entire security policy for ZXY Inc. to use in order to protect all company assets.…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Powerful Essays

    Network Security

    • 581 Words
    • 3 Pages

    1. A(n) hub____ is a standard network device for connecting multiple Ethernet devices together by using twisted-pair copper or fiber-optic cables in order to make them function as a single network segment.…

    • 581 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    While there are many threats out there today many of these threats are almost always targeted towards anything to do with business and money because they are always looking to gain free access to money sources or a way to steal things from companies or customers who have done business with them in the past. I am going to choose a local Company which is a very big store chain here in my state and a good many other states around the area, it is called Wal-Mart, they offer everything from car parts, food, pet supplies, normal supplies for daily use, electronics, clothes, just about anything you can imagine they have it and along with an online store as well to ship from other stores or to ship to homes.…

    • 1196 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Cliff, A. (2001, July 3). Intrusion detection systems terminology, part one: A – H. Symantec. Retrieved from http://www.symantec.com/connect/articles/intrusion-detection-systems-terminology-part-one-h…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Good Essays

    Cyber Crime

    • 1094 Words
    • 5 Pages

    for the hacker is for financial gain. Cybercrime is about making a profit and continuing to make…

    • 1094 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Computer Security

    • 810 Words
    • 4 Pages

    The difference between laws and ethics is laws are mandated and ethics are the basis of laws and the “right or wrongs” a person believes in.…

    • 810 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Network Security

    • 678 Words
    • 3 Pages

    This assignment consists of two (2) sections: an infrastructure document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for.…

    • 678 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Computer Security

    • 549 Words
    • 3 Pages

    In discussing crime trends, it is important to understand the economic and political factors at the time that may have influenced the crime rate (example: economic recession; war; economic prosperity; etc). What variety of factors do you think influence the crime rate? Where do you think crime is most prevalent and why? In your postings be certain to discuss the issues of race, class, and gender.…

    • 549 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Cyber Threats

    • 1222 Words
    • 4 Pages

    Every day advances in technology happen. In the last few decades, computer technology has advanced past many technological barriers. Almost every aspect of everyone’s life has some dealing with computers in it. With all this being said, computer cyber threats are on a rise in every economy in the world. Cyber threats in America, have caused the government to try and control American internet access, have cost American’s a lot of money, and have everyone worried about the many infrastructures that are ran by the cyberspace, from being attacked.…

    • 1222 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    cyber security

    • 1147 Words
    • 5 Pages

    The critical infrastructure – such as the electricity grid, financial sector, and transportation networks that sustain our way of life – has suffered repeated cyber intrusions, and cyber-crime has increased dramatically over the last decade. The President has thus made cyber security an Administration priority. When the President released his Cyberspace Policy Review almost two years ago, he declared that the…

    • 1147 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Cyber Crime

    • 395 Words
    • 2 Pages

    Cybercrime, also called computer crime because the use of a computer is used as tool to help people meet their illegal ends. Some cybercrime examples are committing fraud, trafficking in child pornography and intellectual property, stealing other peoples identity, or violating privacy of others.…

    • 395 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Information Security

    • 813 Words
    • 4 Pages

    Information security:is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction it has also be define as the protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users or the provision of service to unauthorized users, including those measures necessary to detect, document, and counter such threats.…

    • 813 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Cyber Defense

    • 459 Words
    • 2 Pages

    I also need to spend time helping my wife with the household chores, which includes cooking, cleaning, and laundry. My wife also works 40-50 hours a week at the Fenton Post Office as a city carrier. So we both need to help one another, with all the necessities, so we can get done faster. We need to spend more quality with the kids. I am hopeful this job will let me work less so we can achieve this.…

    • 459 Words
    • 2 Pages
    Satisfactory Essays