Safe Guarding Your Devices (a) Think about how you keep your computer, tablet, or smartphone safe against unwanted intruders.
Safe Guarding Your Devices
(a) Think about how you keep your computer, tablet, or smartphone safe against unwanted intruders.
(b) In a previous chapter, two principal methods were discussed —antivirus software and password protection.
(c) Two more technical methods introduced in this chapter are biometric authentication and encryption.
(d) Pretend you own a small business where all your business records are stored in electronic devices that could include a computer, a tablet, and a smart phone.
(e) Identify how you would protect the contents of your electronic devices used for your business.
(f) Discuss what software and/or hardware you would purchase and install on your devices to protect them.
(g) Also identify at least one application of how you would use either biometric authentication and/or encryption for your employees to use to gain access to your business’s data.
(h) Every person in the class must present their own unique use of these tools so there should be no duplicates from anyone in the class when they present their Discussion entry.
Trending now
This is a popular solution!
Step by step
Solved in 2 steps