Document35CYB2001-3

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

200

Subject

Information Systems

Date

Oct 30, 2023

Type

docx

Pages

3

Uploaded by DukeFog10607

Report
[Last Name] 1 Kerry Colby Daniel Wand CYB 200 9/2/2023 1-3 Activity Security Objective Mapping Topic Category Justification Source Check the Website for the latest updates and patches to your anti-virus program. (monthly) Integrity Checking your A/V to ensure you have the latest definitions is a way to ensure you are not vulnerable to malware created between definition releases. https://www.compute rhowtoguide.com/sec urity/ Change your password every 120 days. Confidentiality Changing your password regularly is a means for protecting access to a service or system. This limits breaches, prevents constant access, and prevents the use of saved password. https://www.sans.org/ blog/time-for- password-expiration- to-die/ Lock your keyboard when you step away from your computer for even a moment. Confidentiality Locking your keyboard when stepping away is a way to ensure no one else is able to use your system to access sensitive data. This would be an insider problem. https://www.groovyp ost.com/howto/keep- windows-10-device- secure-when-away/ Always use strong passwords and keep them secret. Confidentiality Passwords must be confidential to ensure only those who require access toa service or system using the password are those who are granted access. https://www.secureda tarecovery.com/resou rces/the-importance- of-strong-secure- passwords
[Last Name] 2 Never store sensitive personal information such as your bank account information or Social Security numbers on your computer. Confidentiality PPI should always be secured. PPI stored on your computer would be something looked for first if your system is compromised. https://www.it.unlv.e du/cybersecurity/best -practices/sensitive- data#:~:text=Store %20data%20on %20protected %20equipment%2C %20like%20OIT %20File,sensitive %20data%20as %20you%20are %20obligated%20to %20keep When off campus, access Purdue directories only through VPN. Confidentiality VPNs create an encrypted tunnel, protecting the access to private data when using public or less protected connections. https://www.usatoday .com/story/tech/colu mnist/saltzman/2021/ 08/28/vpns-what- they-and-why-do- college-students- need-use- them/5606265001/ Run a complete scan of your system using the anti-virus and anti-spyware software applications. (weekly) Integrity Scanning your system on a regular basis ensures the integrity of your computer. It ensures you have not been infected with malware and if so, allows you to remove the malware. https://www.colocatio namerica.com/blog/a nti-virus-software- how-often-to-run- and-why Never click on links in an email, even if they are from someone you know. Type the address in your browser window instead. Confidentiality The link displayed in the email could easily be edited to direct you to a different URL or IP address. This is a way that systems have been infected with ransomware. https://www.bruceb.c om/2017/11/security- warning-do-not-click- on-links-in-email- messages Never check your Purdue email account Integrity Checking your email through a free or https://security.stacke xchange.com/
[Last Name] 3 on a “free” or “public” Internet kiosk or Internet Café. public internet puts you in danger of being compromised. For example, there could be a keylogger on the system which will capture all of your keystrokes, including credentials. Install and use a reputable anti- spyware program. Integrity If you download a “cheap” program, there is a possibility that a hacker could bebehind it and/or it's easier for a hacker to get your information through a “backdoor.” https://smyservices.c om/news/anti- spyware-for-your- computer/
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help

Browse Popular Homework Q&A

Q: Perform the addition modeled by the base-five blocks. Provide the simplifed answer in base 5. The…
Q: One possible constraint on economic growth is   a) limited supply of arable farm land and fresh…
Q: Which of the following compounds would be miscible in C6H₁4? sodium chloride oil ammonium acetate…
Q: Match the process, positions, and parts of an internal combustion engine using the figure.
Q: Using the table below showing the names of common polyatomic anions, type out each compound's full…
Q: What is A Gº at 25 OC for the following reaction? H₂(g) + Br₂(g) → 2HBr(g); AH = -103.8 kJ; AS-21.3…
Q: Which of the following species cannot act as a Lewis base? © NHẠ ONH²- ON ONH₂ O NH3
Q: Differentiate the function. f(x)  = 3x2 -2cosx
Q: 19) Write the product of the following reaction A CH3 CN 1) NaCN, water 2) H₂SO4 B OH SO4 CN ONa ONa…
Q: A mass of 308 g was hung from the string and three different harmonics were generated in the string.…
Q: What is Jasmine's adjusted gross income?
Q: Which implementation below is the best approach to represent a complete binary tree?     Array…
Q: Out of 143 customers of Domino's Pizza, a total of 65 ordered pizza with onions, 77 ordered it with…
Q: Can a deadlock occur when applying the wait-die or wound-wait technique? Why?
Q: Octob Question 56: Working backwards, deduce the starting material that led to the indicat product…
Q: 6. ASK, PSK and FSK are examples of a. Digital to Analog c. Digtal to Digital conversion b. Analog…
Q: [sinh(x)(x² + 7*)] dx a.
Q: A) What percent of the grid is shaded in yellow? 58 196 B) Assume the Area of the entire grid is 15…
Q: Calculate the solubility at 25 °C of CuBr in pure water and in a 0.0070M CoBr₂ solution. You'll find…
Q: How to solve using partial fractions
Q: Determine whether the sequence xn =√(5+3n+7n2)/(4n2-n+2), converges or diverges. If it converges,…
Q: Copper metal reacts with dilute (10M) nitric acid by the following reaction.…