Access over 20 million homework & study documents

Firewall

Content type
User Generated
Subject
Computer Science
School
University of Maryland Global Campus
Type
Homework
Rating
Showing Page:
1/9
Running head: CYBERSECURITY AND SOCIAL NETWORK USAGE 1
Cybersecurity and social network usage
Student name
Class/section
Professor
Due date.

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/9
CYBERSECURITY AND SOCIAL NETWORK USAGE 2
Case study 1: Securing your home computer
Steps used to ensure this new computer system remains as secure as possible.
Computer security is the process of preventing and detecting unauthorized use of your
computer. Unfortunately, maintaining the security of your computer can be a challenging task.
Hackers often seem to be one step ahead of computer users, even those who are following the
best security practices. However, securing your computer is essential to protecting your privacy,
reducing the risk of identity theft, and preventing hackers from taking over your computer.
The process of detecting and preventing unauthorized computer usage is known as
computer security. It becomes challenging to ensure computers stay secure from hackers. To
ensure computer security, several steps should be taken to improve computer system security.
The following steps will be taken to ensure the computing system stays secure:
Implementation of firewall
Firewall plays a crucial role in network security since it acts as the frontline defense
mechanism against online threats and attack
Installation of antivirus and anti-malware tools
These programs are used to block, detect, and get rid of viruses, malware, ransomware,
phishing among other threats from the computer system.
Keeping the operating system and other application updated
In a vendor learns that an application or software has a vulnerability, they make patches
to fix those issues. Updates and patches address security issues in applications and operating
systems
Setting browser security and privacy
Computer attackers through compromised web browsers have increased due to insecure
browsers. The setting will minimize computer attack since some of the vulnerabilities are closed
up.
Firewall settings implementation.
Firewall plays a crucial role in network security since it acts as the frontline defense
mechanism against online threats and attacks. The brand-new computer bought for the school
and home activities is prone to online attacks since it has access to the internet. Firewall
implementation is required to protect the computer against online attacks Cheng et al, 2007, pp.
284-293). The following steps will be used in the firewall setting and configuration.
Step 1: Securing the firewall
When an attacker gains firewall administration access, network security can be
compromised completely. Hence, securing the firewall becomes a critical part of this process. To
secure the firewall, I will carry out the following configurations activities:

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/9

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 9 pages?
Access Now
Unformatted Attachment Preview
Running head: CYBERSECURITY AND SOCIAL NETWORK USAGE Cybersecurity and social network usage Student name Class/section Professor Due date. 1 CYBERSECURITY AND SOCIAL NETWORK USAGE 2 Case study 1: Securing your home computer Steps used to ensure this new computer system remains as secure as possible. Computer security is the process of preventing and detecting unauthorized use of your computer. Unfortunately, maintaining the security of your computer can be a challenging task. Hackers often seem to be one step ahead of computer users, even those who are following the best security practices. However, securing your computer is essential to protecting your privacy, reducing the risk of identity theft, and preventing hackers from taking over your computer. The process of detecting and preventing unauthorized computer usage is known as computer security. It becomes challenging to ensure computers stay secure from hackers. To ensure computer security, several steps should be taken to improve computer system security. The following steps will be taken to ensure the computing system stays secure: • Implementation of firewall Firewall plays a crucial role in network security since it acts as the frontline defense mechanism against online threats and attack • Installation of antivirus and anti-malware tools These programs are used to block, detect, and get rid of viruses, malware, ransomware, phishing among other threats from the computer system. • Keeping the operatin ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
I was stuck on this subject and a friend recommended Studypool. I'm so glad I checked it out!

Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Similar Documents