Preview

Nt1310 Unit 3

Good Essays
Open Document
Open Document
541 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 3
1. Do you understand how to secure your computer since you reviewed the material? Explain your answer.
Yes, after reviewing the material I understand how to secure my computer. First, I should keep my operating system and all software up to date, have a firewall and antivirus software, use strong passwords, use protection devices such as surge protectors, back up data, and follow guidelines to limit unauthorized access and use to my computer. The most important part of computer security is me, the operator.
2. Do you understand why you need to secure your computer? Explain your answer.

3. What is a firewall and how would a firewall help secure your computer?
A firewall is a network security hardware and/or software program that is used to control the flow of traffic into and out of a network or computer. When a computer has firewall protection the flow of data is monitored and filtered. Also, firewalls are barriers to unauthorized access; for example, when a person or program requests access to a network it must first get authorization and verification from the firewall and user. Furthermore, firewalls help protect networks from hackers, viruses, and other malicious digital security risks. Finally, a firewall ensures that our computers are not sending dangerous data to outside networks.
4.
…show more content…
What is a digital security risk?
According to the PowerPoint presentation “A digital security risk is any event or action that could cause a loss of or damage to a computer or mobile device, software, data, information, or processing capability.” Therefore, some examples of digital security risks include unauthorized access and use, malicious internet and network attacks, hardware theft, system failures, software theft, and information theft. Additionally, sources of digital security risk are hackers, crackers, script kiddies, corporate spies, unethical employees, cyber extortionists, and cyber

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 4

    • 775 Words
    • 4 Pages

    Part III PHYSICS HSE II Time:2Hours Max:60 Scores 1. Three identical charges each +q are placed at the corners of an equilateral triangle of side d cm. Calculate the force on a +ive charge +2q at the centroid of the triangle. 2 2.If the earth is supposed to be a metallic sphere,its capacity will be nearly (a) 700pf (b) 700 microfarad (c) 700f (d) 6.4 X10^6 f 1score 3. write the relation between dielectric constant and electric susceptibility. 1score 4. A box encloses an electric dipole consisting of charge 5micro C and -5micro C and of length 10cm. What is the total electric flux through the box? 2scores 5. Find the ratio of the p.d that must be applied across the (1)parallel (2) series combination of two identical capacitors so that the energy stored in the two cases becomes the same. 2 scores 6.(a)…

    • 775 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 3

    • 1593 Words
    • 7 Pages

    Which of the following devices would be the first SCSI hard disk on a Linux system?…

    • 1593 Words
    • 7 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1

    • 4209 Words
    • 17 Pages

    2) Which view needs to be queried to find out how many database objects a user has created?…

    • 4209 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    16. I chose understanding security and safe computing from the bulleted list of options to choose from in the help and support window. I learned that there are 4 ways you can protect your pc from security threats.…

    • 251 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    From this book I take back lot of things related to computers, networks, the government, information security and its importance, and how to handle things under pressure and stress. There are many characters who teach us how to look at situations which actually shows us a way to solve the problem.…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    independent

    • 759 Words
    • 4 Pages

    4 Thesis Statement: Today I’d like to explain three steps that experts recommend for online security…

    • 759 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The measures could be to use firewalls; a firewall is either a software application or a hardware device. It acts as a shield between your computer/s and the rest of the Internet. The purpose of this is to control and keep safe of all the incoming and outgoing network traffic by carefully checking the data packets and…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Safety issues have always been one of the major aspects of effective operation of human beings and systems invented and implemented by individuals all over the world in different periods of human history. The rise of the personal computer in the market is another potential threat; nowadays this threat comes from the internet through computers and other devices. As stated in the study by Garfinkel, Spafford, and Schwartz (2011), “in today’s world of international networks and electronic commerce, every computer system is a potential target” (p. 3). Computers and servers store information that can be damaged or retrieved by hackers that are not interested in keeping the operating system safe and sound. As such, the UNIX operating system can be considered one of the safest for your network activities with a minimum threat to your operating system and the computer in general.…

    • 1689 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Cyber Crime in America

    • 2352 Words
    • 7 Pages

    Cyber-crime is becoming a massive problem for citizens and businesses. Every day there is a hacker that gets into a computer system and causes trouble. It’s all due to businesses and individuals being careless with their computer security. People need to start realizing this is a serious issue and can affect anybody. There are numerous steps that need to be taken in order to protect individuals and businesses security. Hackers are getting smarter and want to find new ways to infiltrate your computer system. They want to find ways to get to your files and your credit card information. Hackers find new ways to get into our computers every day and know the ins and outs of computers. These hackers have the ability to shut down a national company that specializes in computer security. There are so many terrible things that these hackers can do to your computer. We need to take the proper steps to protect ourselves and to ensure that the hackers do not harm us or our computers.…

    • 2352 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Protect Your Computer

    • 1198 Words
    • 5 Pages

    Hello my name isn Anifowose. Well, you will surely be reading mostly from this blog on how to prevent your pc from attacks and how to protect your data and valuable information from malicious attacks.…

    • 1198 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Computer Threats

    • 944 Words
    • 4 Pages

    My speech will be related to an important echo that face technology with is computer threats. I will cover some of important threats that face most of us; I will tell you how to protect your computer from threats, how to deal with hackers, crackers and what to do if your computer was attacked.…

    • 944 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Linux Security

    • 7689 Words
    • 31 Pages

    Contents 1. Introduction 1 1.1 Problem Statement 1 1.2 What Is Security? 1 1.3 OS Protection and Security 2 1.4 Assets and their Vulnerabilities 2 1.5 Protection 3 1.6 Intruders 3 1.7 Malicious Software 3 1.8 Trusted Systems 4 1.9 Protection and Security Design Principles 4 1.10 The Unix/Linux Security Model 5 1.10.1 Properties of the Unix Superuser 5 1.10.2 The Unix Security Model — Groups 6 1.10.3 Protection For Unix Files and Directories 6 1.10.4…

    • 7689 Words
    • 31 Pages
    Powerful Essays
  • Good Essays

    With the ever rising use of the internet, as well as online banking in businesses, this brings the concern that hackers and viruses may have the ability to access your private information. Recent developments in internet security have been shown to decrease and destroy nearly all internet viruses. Microsoft associates have proven that there are many ways around our man made barriers called ‘firewalls'. The question is whether or not your private information can be safe while under this protection.…

    • 1055 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Today the world is moving more quickly than ever before. One thing crucial to the advancement of our modern society is technology. While there are many great things about these new developments, there are still dangers. Setting up a personal home computer or allowing a teen to start a profile on Facebook, are two scenarios where it is critical to engage in proper security and privacy practices. These provisions will allow one’s self and one’s family to safely experience all that today’s technology has to offer.…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Using Mis

    • 1684 Words
    • 7 Pages

    • You need to learn how to use to accomplish your goals. • You have responsibilities for protecting security of system and data. • You have responsibilities for backing up data. • You will help in recover systems and data.…

    • 1684 Words
    • 7 Pages
    Satisfactory Essays