Tuesday, September 10, 2019

Risk and vulnerability Article Example | Topics and Well Written Essays - 250 words

Risk and vulnerability - Article Example At any rate, I try to change my passwords frequently, at least once a month. I try to use a unique password (a combination of numbers and letters, both uppercase and lowercase letters). It makes access difficult but not impossible against a determined hacker. I also keep duplicate files in separate storage just in case data is corrupted or infected with a virus. Buying the branded anti-virus software is also a good step towards protection (Gutwirth, 2009). If the data were compromised, I will try to retrieve my duplicate files stored somewhere else and avoid the same mistakes. 2. Assessing current vulnerabilities – any digital file or data is always subjected to risks no matter what one does to protect it. The best one can do is to mitigate or minimize these risks by doing some simple things like always backing up important data (to another on-line account or storing it in another device), changing my passwords often, being alert to possible intrusions, buying the latest updated data protection software, and always logging out properly whenever I use any of my digital computer accounts. Additionally, I take good care of my hardware devices such as not spilling liquids on them, shutting them down properly after each session, and try not using these devices for long periods to avoid over-heating. It is helpful to be alert to any phising attempts like MITM (or man-in-the-middle impersonators) and be security conscious

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.