Answer all the 3 questions in APA format with 3 references

User Generated

fnawnl9491

Writing

Description

Unformatted Attachment Preview

Question 1: Discuss at least two (2) topics from Information Systems Security that you found the most beneficial. How will you use this information in your professional career? You do not have to document your sources for this question, unless you use quoted material. This is an opinion question. Please use APA throughout. Answer: Answer all the 2 questions. Use APA format with more than 500 words and at least 3 references Question 2 : Response by: Raghavendra Two topics from this course I have learned: Cyber security course truly helped me to perceive how significant the Security for an individual or association and how powerless my data to the aggressors. I learnt conceivable potential dangers to the security and how to counteract them. Verifying the data is a difficult factor for an association. Preparing should be given to every worker in an association and every representative ought to tail them. Objectives that each individual should pursue are secrecy, uprightness and accessibility. Social Engineering Attacks: Social designing is the significant thing since workers or clients are controlled by aggressors as email or telephone calls and take delicate data. As we expanded the web utilization, Web 2.0 used to communicate, Crete or offer to other individuals. We should know about the assaults or dangers from utilizing Web 2.0. Preventive estimates, for example, white-posting just fundamental HTML labels ought to be conveyed. This decreases the likelihood of XSS assaults. Malware: To shield from malware or infection's firewalls and antivirus projects help, however even with these security measures set up, computers are as yet defenseless its our duty to protect our workstations. Malware isn't just a threat to the computers it impacts, yet to the whole frameworks. They are various antivirus programming's available in the market. Pick one and keep awake with the most recent updates. For framework level security, plan firewall to confine outside access, keep solid passwords that isn't effectively speculated, screen the framework for unordinary work every now and again, change the default settings of an apparatus. With the confirmation procedure for responsibility, private data can be secured. Answer : Please add your comments whether you accepting the response or against the response depending upon the question in more than 300 words. Below are additional suggestions on how to respond to your classmates’ discussions: · Ask a probing question, substantiated with additional background information, evidence or research. · Share an insight from having read your colleagues’ postings, synthesizing the information to provide new perspectives. · Offer and support an alternative perspective using readings from the classroom or from your own research. · Validate an idea with your own experience and additional research. · Make a suggestion based on additional evidence drawn from readings or after synthesizing multiple postings. · Expand on your colleagues’ postings by providing additional insights or contrasting perspectives based on readings and evidence. Question 3. Response: by Ram Role of people in security & the Deep dive on understanding Malware were my two favorite topics from this course. Role of people in security: It was super fascinating to see how people play a critical role in ensuring the security of an organization. If they are not aware of common methods that attackers use to hack like: Social engineering - where an attacker calls in as a personal friend or a company executive and tries to extract sensitive information from you to gain access to critical systems Phishing: employees usually get an email that resembles a trusted web application such as their company's product or a bank website which appears legitimate but in fact is a clone from hackers who try to then steal the credentials you enter in these phishing websites and pretend to be you on these applications to cause damage Should Surfing: people don't normally pay attention to this technique but it's the most simples and easiest way a hacker could gain access to your information. Tailgating: where an attacker just follows you to get access to your company's physical premises. This could pose great danger to the confidential information your company might be having on its conference rooms, lockers. Being aware of these methods would help me watch out when this happens in my professional career and I think I will be able to identify these attacks sooner going forward with the help of what I learned from this course. Malware: It was interesting to learn different types of malware like trojan horses, worms, rootkit, spyware, adware and ransomware. The most useful part of this Malware chapter was the pre cautions that one can take to prevent these malware from causing damages to your personal or company data. Simple things like keeping your OS up to date, installing the patches for your anti-virus software, not downloading unauthorized programs from the internet, following secure browsing practices are all techniques that I could take and apply in my day to day role now and going forward. Answer : Please add your comments whether you accepting the response or against the response depending upon the question in more than 300 words. Below are additional suggestions on how to respond to your classmates’ discussions: · Ask a probing question, substantiated with additional background information, evidence or research. · Share an insight from having read your colleagues’ postings, synthesizing the information to provide new perspectives. · Offer and support an alternative perspective using readings from the classroom or from your own research. · Validate an idea with your own experience and additional research. · Make a suggestion based on additional evidence drawn from readings or after synthesizing multiple postings. · Expand on your colleagues’ postings by providing additional insights or contrasting perspectives based on readings and evidence.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running Head: COMPUTER SECURITY

Computer Security
Student’s Name
Institutional Affiliation
Date
Instructor’s Name

1

COMPUTER SECURITY

2

Question 1
Malware
Malware refers to a collection of malicious software variables, including viruses and
spyware. Malware is comprised of codes designed by intruders to interfere with the system’s
data, thus granting them unauthorized access to critical information. Today, attackers deliver a
link or a file prompting users to install an antivirus. Although each type of malware consists of
unique features, it requires the assistance of the user to initiate its malicious activities.
Understanding this information about malware has helped me gain knowledge of the
vulnerabilities that attackers can use to access a company's data. Given this, as a cybersecurity
professional, I will be able to design effective measures of preventing and resolving malwarerelated problems.
Further, the process of protecting systems from foreign users entails the employment of
protective tools and user vigilance. The use of effective tools entails the installation of effective
software capable of updating automatically. As a result, this method of securing the systems’
data is easier to use because it requires the minimum involvement of the user or professional.
However, ensuring the safe use of the systems requires the security professional to be aware of
the ways that intruders can use. For instance, while using the information systems, it is possible
to receive a message like "Install this softwa...


Anonymous
Great study resource, helped me a lot.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags