.

Saturday, May 4, 2019

Risk and vulnerability Article Example | Topics and Well Written Essays - 250 words

Risk and vulnerability - Article ExampleAt any rate, I try to metamorphose my discussions frequently, at least once a month. I try to use a unique password (a combination of numbers and letters, both uppercase and lowercase letters). It makes access difficult but not infeasible against a determined hacker. I also keep duplicate files in separate storage scantily in case information is corrupted or infected with a virus. Buying the branded anti-virus software product is also a good step towards protection (Gutwirth, 2009). If the data were compromised, I will try to conceive my duplicate files stored somewhere else and avoid the same mistakes.2. Assessing current vulnerabilities any digital file or data is always subjected to risks no matter what one does to protect it. The best one can do is to lessen or minimize these risks by doing some simple things like always backing up pregnant data (to another on-line account or storing it in another device), changing my passwords oft en, being jaunty to possible intrusions, buying the latest updated data protection software, and always logging out properly whenever I use any of my digital computer accounts. Additionally, I take good care of my hardware devices much(prenominal) as not spilling liquids on them, shutting them down properly after each session, and try not using these devices for long periods to avoid over-heating. It is helpful to be alert to any phising attempts like MITM (or man-in-the-middle impersonators) and be warrantor conscious

No comments:

Post a Comment