Description
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
Attached.
Running Head: CYBERSECURITY
1
Best Practices to Counter Cybercrime
Name
Institution
Class
Professor
Due Date
CYBERSECURITY
2
Case Study One
As we move to the digital world, cyber security is a real threat. People have lost a lot of property
as a result of this. For that reason, we have to work very hard to ensure that our devices and
systems are secured. When you buy a new computer, it is good to employ the best practices and
countermeasures to ensure that it is safe from cybercriminals. Some of the most effective
methods have been discussed below.
It is very important to ensure that it has a decent firewall. A firewall will help us keep away the
unauthorized users from accessing my files and OS. Most personal computers uses windows.
These days they do possess a built in firewall titled “Windows Firewall.” This does a great job
against cybercrime. However, some feel that it is not the best and disables it and install another
one. However, I will not disable this one. What I will be doing is to keep updating it on a regular
basis.
It is also good to install a decent antivirus. An antivirus will consume and bar any form of virus
from infecting the computer. In most cases, hackers uses viruses to take control of another
person’s computer. If an antivirus is in place, then they will not be able to inject their malware. I
am planning to use the inbuilt Windows Defender for Windows 10. This antivirus will be
updated regularly.
I will always ensure that this computer is up to date. The operating system regularly get updated.
While being updated, what happens is that patches can be introduced. The main function of a
CYBERSECURITY
3
patch is to fix a weak link or improve the entire operating system. In every update, new patches
are introduced. Failing to update means that you will not install such patches thus creating a
vulnerability.
I will be keeping my passwords safe and hard to guess. To achieve this, I will ensure that any of
my passwords will have a minimum of 15 characters, at least an uppercase, at least a lowercase,
at least a digit and at least a symbol. I will be the only one who knows these passwords. If I want
to allow another person to have an access, I will be opening the com...