Description
Describe what you will do to address these.
Explanation & Answer
View attached explanation and answer. Let me know if you have any questions.
1
Security Audit Of Your Personal Use Of Computer Systems
Student Name
Institutional Affilation
Course
Date
2
Security Audit of Your Personal Use of Computer Systems
A security audit of a computer system and technology should be conducted to identify
points of vulnerability and weakness. It involves the following steps:
1. Examine the system for any external access using a firewall, and antivirus software is
used to prevent unauthorized access to the system (Laudon & Laudon, 2015).
2. Assess the internal network for holes or wea...