Part 1: Security Threats Provide an example of at least

 

Part 1: Security Threats

  • Provide an example of at least one security threat.  This can be an  actual threat to an organization.  It can be an example of a “what-if”  scenario.  Discuss at least one way that this threat could have been  minimized or prevented. 

Phishing is one example of a security threat to pretty much anyone.  Phishing is where a message, usually an email or text, is sent to you  and it may look like a legitimate company/bank reaching out to you.  These messages usually include a link, and these links can have malware  embedded in them. They may also be asking for personal information.   (Borges, 2021)

To minimize/prevent this threat include changing passwords regularly,  not clicking on suspicious links, and installing firewalls. (Simister,  2021)

Part 2: Mobile devices

  • Compare desktops to laptops, tablets, and smartphones using best  practices related to security. Discuss the best practices that you use  or plan to implement on your mobile device(s).

Desktops tend to be more secure compared to mobile devices (tablets,  smartphones, laptops, etc.) because of their stationary position making  them easier to guard, and also because they tend to be on one source of  the internet (rather it be Wi-Fi or cable). (Editor, 2019)

The practices I use to protect the security of my mobile devices is  to keep software updated, I keep fingerprint/code locks on my phone, and  try to avoid any unsecured networks. 

References:

Borges, E. (April 07, 2021). Ten Common Network Security Threats Explained. Retrieved on 7/11/22 from 10 Popular Common Network Security Threats            Explained (securitytrails.com) (Links to an external site.)

Simister, A.  (August 6, 2021) 10 Ways to Prevent Phishing Attacks. Retrieved on 7/11/22 from 10 Ways to Prevent Phishing Attacks (lepide.com) (Links to an external site.)

Editor, (October 16,  2019) Computers for a small business: Laptop vs. desktop. Retrieved on 7/11/22 from Computers for a small business: Laptop vs.                  desktop (techadvisory.org)

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Unit Exercise 4 On successful completion of this assignment, students

  Unit Exercise 4 On successful completion of this assignment, students should be able to: describe the role of the international financial system in international trade, specifically with respect to exchange rates, and describe the factors that help determine, and the methods of managing, exchange rates.  Exercise Question Has the

Hong Kong Legal System and Legal Method

Description Part A (1,500 words) Read Solicitor (24/07) v Law Society of Hong Kong (2008) 2 HKLRD 576 which can be found in the website of the judiciary of Hong Kong (www.judiciary.gov.hk). It is a landmark case on the DOCTRINE OF BINDING PRECEDENT in Hong Kong. By reference to that

APA format 175 – 265 words Respond and further the

APA format 175 – 265 words Respond and further the discussion to the following response: Professor Michelle Rose Continuing along the same lines of health care disparity, an administrator needs to establish a process to collect data on health care access and utilization by patients’ race, ethnicity, and socioeconomic status,

Entrepreneurial Review: One thing that successful entrepreneurs do is to

Entrepreneurial Review:  One thing that successful entrepreneurs do is to listen to and gain wisdom from other successful entrepreneurs.  There are numerous articles, Ted Talks and podcasts about successful entrepreneurs that entrepreneurship student should be in the habit of reading, watching and listening to so they can learn from their

Monitor your own use of digital communication for a full

 Monitor your own use of digital communication for a full day, from the time you wake up until the time you go to sleep. Look at your use of multiple modalities of communication throughout the day, such as the telephone, text messages, email, chat rooms, blogs, social media messaging, social media

WU Social Determinants of Health Discussion Nursing Assignment Help

According to the Centers for Disease Control and Prevention (2022), “Social determinants of health (SDOH) are the nonmedical factors that influence health outcomes. They are the conditions in which people are born, grow, work, live, and age, and the wider set of forces and systems shaping the conditions of daily

APA format Cite at least one reference 175 – 265

APA format Cite at least one reference 175 – 265 words Respond to the following:   Dr. Susan Jones 4/20/22, 7:51 AM Class, Another important ratio for a business (and an individual) is the Debt‐to‐Income Ratio. This ratio is helpful for showing a company has too much debt compared to

Read the following HBS blog articles: 1) “Cultural Disharmony Undermines

Read the following HBS blog articles: 1) “Cultural Disharmony Undermines Workplace Creativity”.  Cultural Disharmony.pdf    or here http://hbswk.hbs.edu/item/7050.html (Links to an external site.)  l2) “Pulpit Bullies: Why Dominating Leaders Kill Teams” pulpit bullies hbs 2013-1.pdf here https://hbswk.hbs.edu/item/pulpit-bullies-why-dominating-leaders-kill-teams (Links to an external site.) Respond to the following questions: Do you agree with the

To Prepare: Review the concepts of informatics as presented in

To Prepare: Review the concepts of informatics as presented in the Resources. Reflect on the role of a nurse leader as a knowledge worker. Consider how knowledge may be informed by data that is collected/accessed. The Assignment: Explain the concept of a knowledge worker. Define and explain nursing informatics and

Supply Chain Planning & Forecasting

– Supply Chain Planning & Forecasting  Please complete the questions as thoroughly as possible! Complete well-written answers using text material Some questions may require more than one paragraph. Justify answers if applicable. 1. What are the major sources of uncertainty that can affect the value of supply chain decisions? (1

Identify an investment decision that you or someone else has

 Identify an investment decision that you or someone else has made. (This should be for goods or services for which one or more payments were made in order to receive increased benefits from those goods or services at a later time.) How do you think the concept of supply and

Job Analysis Research PowerPoint In conducting a job analysis, there

  Job Analysis Research PowerPoint  In conducting a job analysis, there are two areas: (1) job-based and (2) person-based structure. For this assignment, identify the needed knowledge, skills, and abilities (KSAs); the tasks, duties, and responsibilities (TDRs); and any other specifics for a registered nurse’s position. Refer to the BLS

Assignment Content Competency Explore the physical principles of classical physics.

Competency Explore the physical principles of classical physics. Student Success Criteria View the grading rubric for this deliverable by selecting the “This item is graded with a rubric” link, which is located in the Details & Information pane. Instructions In a two-page paper, identify the classical physics principles contained within

Conduct a general survey outside of school on anyone you

Conduct a general survey outside of school on anyone you wish. Perform this as an inspection only and document the findings in short phrases. Also, identify actual or potential risks. Submit your survey to the drop box below. NUR2180 General Survey Assignment.docx NUR2180 General Survey Form.docx Submit your completed assignment