This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Obesity

Information System Security

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

 

Information System Security

How are you doing in keeping your information secure?

Information in our computers and electronic devices are usually vulnerable to threats as the privacy may be breached. As such, some safety practices can be put in place to make sure that information access across all the devices is secure.

First, being smart with our connections plays a vital role in the security of information as being spied by someone using the same connection in a public place is a possibility. As such, access to data like financial transactions or even personal data should be avoided while we are connected to public WI-FI hotspots. Connecting of flash disks in the computers before scrutiny with the security soft wares should also be avoided, so that safe connection practices are adhered to.

Backing up of data is also a safe step to securing information as soft wares can be reinstalled, but data loss irreversibly as such, finding a proper data backup plan, for example, the iCloud backups, help secure information. In the case of data loss, which may be as a result of viruses, electricity blackouts, or even software upgrades, data can easily be retrieved then. Just as in organizations creating back up for their files, individuals should also embrace this practice. .

Don't use plagiarised sources.Get your custom essay just from $11/page

On our social media platforms and e-mails, securing these accounts with two-factor authentication also helps in securing information. When using a different device for the first time, for example, using a different computer to log into your e-mail accounts, a code is sent to you from the support team to authenticate that indeed you are the one. This is the basis of two-factor authentication in securing our information.

Making of passwords strong and unique such that it is hard to guess is also an excellent way to make sure that information is secure. A unique and robust password is hard to go through, and this should be the first step towards information security. This also makes it hard for identity theft to be a success for intruders.

When suspicious links and attachments are sent, being quick on clicking them should be avoided at cost. This is primarily because some may have been coded to access information on your device. One should then navigate and personally find the websites by themselves instead of being quick on clicking the sent suspicious links or even attachments.

In a nutshell, information security stems back to personal efforts and practices that one puts in place to keep their privacy.

 

 

 

 

 

 

 

 

 

 

 

Reference

  1. , Bourgeois, 2014: Information Systems Security. Retrieved: https://bus206.pressbooks.com/chapter/chapter-6-information-systems-security/

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask