Identify the various computer-based actions you can take to protect your information assets.

Identify the various computer-based actions you can take to protect your information assets.


Answer:
- Check to see the websites that anyone who may have used your computer has visited.
- Never post personal information about yourself or your family in chat rooms or on social networking sites. Use the privacy features provided by social networking sites to limit public access to your profile.
- Never open unrequested attachments to e-mail files, even those from people you know and trust.
- Never open attachments or web links in e-mails from people you do not know.
- Never accept files transferred to you during Internet chat or instant messaging sessions.
- Never download any files or software over the Internet from sites that you do not know.
- Never download files or software that you have not requested.
- Test your system.
- Run free malware scans on your computer.
- Have an anti-malware product on your computer and have it set for automatic updates.
- Have a firewall on your computer.
- Have an antispyware product on your computer.
- Have a monitoring software on your computer.
- Have a content filtering software on your computer.
- Have an anti-spam software on your computer.
- Have proactive intrusion detection and prevention software on your computer.
- Manage patches.
- Use a browser other than Internet Explorer.
- Use a laptop security system.
- Use two-factor authentication
- Use encryption.
- Use laptop-tracing tools or device reset/remote kill tools.
- Look for new and unusual files.
- Use strong passwords.
- Adjust the privacy settings on your computer.
- Erase your Google search history.
- Make backups, backups, backups!
- For wireless security:
>> Hide your service set identifier (SSID)
>> Use encryption
>> Filter out media access control (MAC) addresses.
>> Limit Internet protocol (IP) addresses.
>> Sniff out intruders
>> Change the default administrator password on your wireless router to something not easily guessed.
>> Use virtual private networking (VPN) technology to connect to your organization's network.
>> Use Remote Desktop to connect to a computer that is running at your home.
>> Configure your firewall to be "on with no exceptions."
>> Visit only websites that use secure socket layer (SSL) to conduct any financial or personal transactions.
>> Use wireless security programs.

Comments

Popular posts from this blog

Discuss the seven characteristics of useful information.

Why have accounting software packages been designed with separate transaction modules?

A laboratory assistant prepared solution of 0.8 M, 0.6 M, 0.4 M, and 0.2 M sucrose, but forgot to label them. After realizing the error, the assistant randomly labeled the flasks containing these four unknown solutions as flask A, flask B, flask C, and flask D.