Explain the importance of security warnings

Assignment Help Computer Engineering
Reference no: EM132255441

Question: The head of the IT security department expressed her concerns about series of data breaches that occurred in the company and mentioned that many employees ignored their system security warnings.

You have been asked to provide a summary of information to the entire team about data breaches and suggest proactive and preventative measures for warding off viruses. Your presentation will be sent out to all company employees, so the information must be clear, concise, and informative.

To prepare your presentation, use your personal computer to perform the following tasks:

• Identify whether you have an anti-virus software running on your machine and from which company.

• Identify if a firewall is enabled on your machine and consider why you might need one.

Include the following:

• Define data breach

• Ways to determine if your system was infected with a virus

• List two actions that should be taken if a virus has infected your computer

• Instructions on locating anti-virus and firewall software on systems

• Describe at least three preventive measures against data breaches, both physical or digital

• Explain the importance of security warnings and the impact of ignoring them

• Describe (what, how impact) two well-known data breaches and what actions (minimum of two) were taken to resolve them.

Create A 7 to 12-slide PowerPoint presentation

• Use a minimum of three references formatted in APA in either presentation format above

Note. Be sure to include supportive graphics and appropriate backgrounds and styles. All references need to adhere to APA guidelines and images should not be copyrighted unless cited properly.

Reference no: EM132255441

Questions Cloud

Unique about drugstores as general merchandise retailer : What is unique about drugstores as a general merchandise retailer? What competitive pressures could limit growth in sales and profits?
Write a simple program which takes two arguments : Write a simple program which takes two arguments as in put an compute a sum of those two numbers and print it. The response must be typed.
What are four conditions required for a competitive market : Suppose that the (inverse) demand curve for Cranberries is given by P = 40 - 6Q and TC = $4Q + $3Q2
Collegiate promotions distributes products : Collegiate Promotions distributes products that are marketed to students and alumni of major universities.
Explain the importance of security warnings : Describe at least three preventive measures against data breaches, both physical or digital. Explain the importance of security warnings and the impact.
Amazon benchmark against and what are the benchmark metrics : Who does Amazon benchmark against and what are the benchmark metrics?
Develop a maximum whole-of-contract budget : Complete a detailed evaluation report of all tender responses - Identify the risks associated with each tender response - Develop a maximum whole-of-contract
Determine what you might do to secure the network : CIS225 Draw a network. Demonstrate your current knowledge of networking as compared to the knowledge at the beginning of Networking I.
Rate of return on equally risky assets : A zero coupon bond has a face value of $210 and matures in 2 years. The rate of return on equally risky assets is 5% what will its price be today?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd