This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Friendship

Cyber Security Best Practices

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Cyber Security Best Practices

Table of Contents

  1. Introduction ………………………………………………………………………………3
  2. Case Study 1 ………………………………………………………………………………3
    • Firewall………………………………………………………………………………..3
    • Browser Privacy and Security Settings………………………………………………..4
    • Software……………………………………………………………………………….4
    • Password Policy……………………………………………………………………….5
    • Online Banking Site Security………………………………………………………….6
    • Operating System Patches and Application Updates………………………………….6
    • Possible Issues…………………………………………………………………………6
  3. Case Study 2……………………………………………………………………………….7
    • Social Network Guidance and Rules………………………………………………….7
    • Facebook and Twitter Settings and Guidance…………………………………………8
    • Detecting, Preventing and Reporting Cyber Security Threats………………………..8
    • Possible Issues………………………………………………………………………..9
  4. Conclusion………………………………………………………………………………..9
  5. Reference…………………………………………………………………………………10

Don't use plagiarised sources.Get your custom essay just from $11/page

 

  1. Introduction

Computers play a significant role in human lives today. Since we key in and show personally identifiable and so much knowledge, it is crucial to implement and preserve computer protection. It is because reliable computer protection means that people’s data is keenly managed and safely stored. Therefore, to set up my newly purchased computer to prevent unauthorized access or risk to vulnerability, I would consider measures that would avoid these cyber threats to my system. To improve the security of my computer, there are some critical steps that should be considered to enhance the safety of the computer system. Even though no individual action can eradicate all the danger, these in-depth defensive strategies, when used together, they should improve the protection of the computer and mitigate risks (Stallings, 2012).

  1. Case Study 1
    • Firewall

A firewall is a tool that is either software or hardware developed to test and regulate the data flow between the machine and the internet. The electronic firewall is included in most of today’s current operating frameworks. Thus, it is essential to safeguard it to improve the protection of the computer. Therefore, since many home routers have an embedded firewall as well, I would refer to the router’s guide on how to configure security settings and to enable the firewall because they usually come in a default setting (Wang, 2014).

Moreover, since firewalls will guard my personal computer against malicious or unwanted network traffic, I would consider configuring both the hardware and software versions of them because both of them have distinguishing merits and demerits. In the hardware firewall, I will place it between the internet and my PC. It is essential since it can support more than one PC. Its advantage is that it provides a more defense line against the desktop PCs. Its downfall is that it requires expert personnel to configure it. For the software firewalls, they come together with the OS, thus provided an added defense. Their merit is the ability to manage different device programs of unique network behavior since they are located in the same system being protected. This capability may inhibit the capacity of the firewalls to identify harmful practices and avoid them (McCann, 2013). In my PC, I would turn on an internet connection firewall by opening Control Panel, then selecting System and Security, then navigate to Windows Firewall. In the Window Firewall window, I would move on the left side and click on Turn Windows Firewall on or off, then click OK.

  • Browser privacy and security settings

A web browser is an application designed to locate, retrieve, and provide content on the internet. Hence, it helps in surfing the World Wide Web. Today, web browsers offer plug-ins that broaden device functionality so that multimedia information can be implemented. Because they are frequently utilized, they must be secured. In my case, I will consider the Google Chrome Browser for my PC. To ensure surfing with Google Chrome, I would navigate to the advanced settings menu and activate the phishing and malware protection under the ‘Privacy section.’ Then I would turn off instant search for optimal security. Don’t Sync to disconnect my email under the persona stuff section. I would configure the content setting then lastly, I would set forms and passwords settings to prevent it from saving passwords and forms (Meketa, 2015).

  • Software

Software is a program that prompts the computer on what to do. There is software that has a different purpose. Some include the Anti-virus, which prevents the machine from being attacked by malicious programs. Others are the system software which contains instructions the computer has to follow. Installing and running antivirus software is a crucial step in securing the PC. It is because several kinds of antivirus programs can find malware in the PC by looking for trends (Claar, 2012). I would ensure that the Antivirus that I will install in the PC would be up-to-date and would have the capability to evolve. That is, it should be able to frequently update itself to counter various virus programs trying to harm the PC. I would also make sure that the OS and the system software are from a trusted vendor and updated to support efficient functionality. For the Antivirus, I would consider the Windows Antivirus since it is user-friendly and can counter a wide range of viruses. Also, I would install Windows OS since it is user-friendly and offers optimal functionality.

  • Password Policy

Security for the data in the PC can be enhanced by passwords, which will play a key role in securing the device and also the files in the computer to prevent any unauthorized access. While performing online services such as online banking, it is paramount that the password should e secured at all costs. For instance, a strong password should be utilized for security purposes. A secured password is the one that has variables that are hard for another or a machine to guess. To set up a secured password, I would ensure my password is more than eight characters. The characters should contain both upper and lowercases. They should be a mixture of both numeric and letters, and lastly, they should include some special characters. To ensure that the password is secured over time, I would change it frequently or even when I have the slightest notion that my PC is vulnerable (Awad, 2016).

 

 

 

 

  • Online Banking Site Security

With many profits, online banking has, it also generates hacking and fraud abilities. To ensure the safety of online banking, I will provide only to use an internet network that is secured by encryption to prevent an unauthorized hack. Also, I would bank on the websites with ‘https’ in the address since they are encrypted hence safeguard my information when it is online. I would disable the automatic login feature before logging into my account to prevent my browser from keeping my bank details. I would also utilize the two-factor authentication method to my account to prevent easy access to the site. Ultimately, I would create a strong password for my website that it would be impossible for unauthorized personnel to know (Aljawarneh, 2016).

  • Operating System Patches and Application Updates

Software updates and patches are significant in my PC as they enhance security and digital safety. The updates tend to provide benefits which include reparation of found software troubleshooting and code error repair or elimination. Therefore it is good to ensure that I have installed the updated OS version on my PC. The program updates usually contain software patches that prevent hackers’ ability to exploit the system. Thus, with the rise of new technologies, I should ensure that programs are updated to counter the malicious act of hackers.

  • Possible Issues

With the advancement in technology, it is better than a computer system that utilizes all of these parameters. Failure to this, the computer system would be prone to viruses. Without these measures, the malicious program will be able to find a way into the PC system and replicates itself, causing harm to the computer. Spywares are another computer risk. The program will monitor the system’s activities and capture personal information, which might lead to information sabotage. The system will also be prone to hackers who will exploit any weakness found the system to gain unauthorized access to the information. If these measures are not adhered to, there would be a rise in phishing activities to acquire personal data to cripple the person’s system.

  1. Case Study 2

Social media has enabled the creation of different kinds of relationships. Be it business or friendship relationships, it has allowed the interaction of people all around the globe. This act of interconnecting is referred to as social networking. Just like any system, the social platforms are also governed by rules and regulation which protect their users from exploitation or even harmful acts from other personnel.

  • Social Network Guidance and Rules

Some of the rules and guidelines that must be adhered to by the family member who wants to safeguard his privacy while using social networks is to use code name or the nickname as username in the platform. It would be better if he does not use real names or offensive names while setting up a social account to reduce the chances of him being socially harassed online. Also, he should keep his profiles account private to stay safe and limit the number of people to view his profile. He should maintain his details to himself to prevent users with harmful intentions to exploit his information. He should always think about what he should post. He should be careful to exchange proactive images or information even with people he knows because the data can be copied and published for the public to view. He should always ensure that his software is often updated. This will prevent hackers’ ability to exploit their computer system through social networking. He should always try to understand new people’s motives. Social media is comprised of all kinds of people, both good and bad people. When he meets new friends, he should try and read between the lines and understand the person’s intention. He should be helpful to people online. He should treat people the same way he would like to be treated. He also should think about his response before responding. The answer will matter to the other person. Therefore, if the reaction can cause harm to the other person, then it might lead to his account suspension (Mergel, 2013).

  • Facebook and Twitter Settings and Guidance

For efficient texting on Facebook, the first step is to set up Facebook Texts. The family member should navigate to his Facebook account page and select settings that are located at the top right of the site. Proceed to click Mobile. He should then add his mobile number to the account then click Activate Text Message. Once done, he will receive a Facebook message and update his Facebook account by replying to the text. After that, if he shares a phone number with his friend, he can send documents to the account and vice versa.

In the Twitter platform, to text friends, his account must have a mobile number. To add a mobile number, he navigates to the Profile icon at the navigation bar and click setting and privacy. Then click on the Mobile tab. Choose the country/Region, enter the phone number, and then click continue. A verification code will be sent to the figure via a text message and enter the verification code in the box to activate the phone number. Now navigate to the Privacy and safety setting than to the Discoverability, then uncheck the box for Let others find you by your phone, then click save changes. Hence, you can start texting friends directly on Twitter.

  • Detecting, Preventing and Reporting Cyber Security Threats

Most teenagers today have access to social media. Even though it has many benefits, it can also be exploited and be used for illegal actions. Some of them include cyberbullying. If a person is being cyberbullied, he tends to suffer from mental health, isolation, and even education degradation. To prevent this act, parents can educate their children earlier about cyberbullying, also can monitor their children’s online reputation, and lastly, teach their children means for data privacy (Siomos, 2013). To prevent identity theft, first to place a fraud alert for your card to avoid thieves to open accounts using your name. Also, monitor the account online to detect any suspicious activities, if detected, then freeze the credit and notify the authorities. Lastly, keep the social security number as safe as possible.  Since child predators are mostly found on social platforms, it is better to advise children on the dangers of the media. Remind them about the significance of not providing their details at all costs. As a parent, one can also place software to monitor the activities on their children’s social platform, and in case of any suspicion, the parent can notify the police.

  • Possible Issues.

In case these steps are not followed by the family member, then the platform would leave his account vulnerable, and other people with harmful intentions might start exploiting him. This might, in return, affect him psychologically. Also, if he leaves his details unprotected, then they might steal and identity replicated and another person to replicate him (Nepal, 2014).

  1. Conclusion

I believe that it would be vital to educate children at a young age on the importance of computer risk and ways to combat it because with the development in technology more emerging benefits and issues are arising daily, therefore it would be signed if the society can understand and evaluate measures necessary to counter these threats.

 

 

 

 

 

  1. Reference

Aljawarneh, S. A. (Ed.). (2016). Online banking security measures and data protection. IGI Global.

Awad, M., Al-Qudah, Z., Idwan, S., & Jallad, A. H. (2016, December). Password security: Password behavior analysis at a small university. In 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA) (pp. 1-4). IEEE.

Claar, C. L., & Johnson, J. (2012). Analyzing home PC security adoption behavior. Journal of Computer Information Systems52(4), 20-29.

Floros, G. D., Siomos, K. E., Fisoun, V., Dafouli, E., & Geroukalis, D. (2013). Adolescent online cyberbullying in Greece: The impact of parental online security practices, bonding, and online impulsiveness. Journal of School Health83(6), 445-453.

Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences80(5), 973-993.

McCann, T. M., & Marsico, P. J. (2013). U.S. Patent No. 8,613,073. Washington, DC: U.S. Patent and Trademark Office.

Mergel, I. (2013). Social media adoption and resulting tactics in the US federal government. Government Information Quarterly30(2), 123-130.

Stallings, W., Brown, L., Bauer, M. D., & Bhattacharjee, A. K. (2012). Computer security: principles and practice (pp. 978-0). Upper Saddle River, NJ, USA: Pearson Education.

Wang, C. H., Raskin, S., & Rozenboim, L. (2014). U.S. Patent No. 8,813,218. Washington, DC: U.S. Patent and Trademark Office.

Xu, J., Meketa, D., Melven, I. G., Wobensmith, M. T., & Villegas, J. (2015). U.S. Patent No. 9,137,319. Washington, DC: U.S. Patent and Trademark Office.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask