CYB_200 1-3 Activity Security Objective Mapping

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

200

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

3

Uploaded by DrTree1894

Report
Topic Category Justification Source Ensure all computers you use or control have an up to date, supported antivirus software installed. Integrity This prevents viruses from getting on your system and changing or corrupting data. https://www.ncsc.gov.uk/guidance/what-is-an-antivirus- product#:~:text=Once%20it's%20on%20your %20computer,protect%20your%20data%20and%20devices. Install and use a reputable anti-spyware program. Integrity Viruses can corrupt or change data in a system. https://www.ncsc.gov.uk/guidance/what-is-an-antivirus- product#:~:text=Once%20it's%20on%20your %20computer,protect%20your%20data%20and%20devices. Run a complete scan of your system using the anti-virus and anti- spyware software applications (weekly). Integrity Running anti virus scans can identify if data has been accessed or corrupted. https://www.ncsc.gov.uk/guidance/what-is-an-antivirus- product#:~:text=Once%20it's%20on%20your %20computer,protect%20your%20data%20and%20devices. Check the Website for the latest updates and patches to your anti- virus program (monthly). Integrity Viruses are how attackers damage the integrity of stored data. https://www.ncsc.gov.uk/guidance/what-is-an-antivirus- product#:~:text=Once%20it's%20on%20your %20computer,protect%20your%20data%20and%20devices. Change your password every 120 days. Confidentiality This prevents unauthorized users from using old passwords to access systems multiple times over a period of time https://www.proactive-info.com/blog/change-your- password#:~:text=If%20you%20lose%20or%20change,your %20data%20will%20be%20secure. Always use strong passwords and keep them secret. Confidentiality Prevents unauthorized access because stronger passwords are more https://www.proactive-info.com/blog/change-your- password#:~:text=If%20you%20lose%20or%20change,your %20data%20will%20be%20secure.
difficult for automated attacks to guess. If possible, close and lock your office door when leaving your computer. Availability This prevents access to the physical infrastructure that holds your data while still allowing easy availability. for authorized users. This is similar to why you shouldn't leave your computer set to auto login. If it's easier for you to access it's allow easier for someone else to access. https://www.psafe.com/en/blog/why-you-should-avoid-using- auto-login-for-your-accounts/ Never store sensitive personal information such as your bank account information or Social Security numbers on your computer. Confidentiality Storing sensitive information on a computer leaves it vulnerable to access by attackers. https://www.ftc.gov/business-guidance/resources/protecting- personal-information-guide-business Do not open files sent to you in Instant Messaging (IM) or peer-to-peer (P2P) programs. Integrity Opening links is the main way that viruses are distributed, and viruses can affect the integrity of your stored data. https://www.foolproofme.org/articles/395-the-dangers-of- randomly-clicking-links Do not set your computer to Integrity Makes it easy for an unauthorized user https://www.psafe.com/en/blog/why-you-should-avoid-using- auto-login-for-your-accounts/
automatically log in. to access data to corrupt, change or steal information.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help