Computer sciences and Information technology

Computer sciences and Information technology

Cybersecurity Best Practices

Project description
Project scenarios:

1. You just received a brand new computer for your home environment. It comes with the latest Operating System. You also have an Internet Service Provider where you can easily use the existing network to connect to the Internet and to perform some online banking. Describe the steps you plan to go through to ensure this system remains as secure as possible. Be sure to discuss the details of firewall settings you plan to implement within your operating system, browser privacy settings, and recommended software (e.g., Anti-virus and others) you will install. Also, describe your password strength policy you plan to adopt, and what you envision to do to ensure your online banking site is encrypted and using the proper certificates. Discussion of operating system patches and application updates should also be included. As you discuss these steps, be sure to justify your decisions bringing in possible issues if these steps are not followed. You can discuss this for a specific type of computer (e.g. MAC or PC) to make the scenario more appropriate for your environment.

2. Your son, who just turned 13, wants to join Facebook and post his picture and contact information on the site. Assuming, you are willing to allow him to have a Facebook account, describe what types of guidelines you would discuss with him to ensure his privacy and security are protected. Be sure to justify your decisions by describing possible issues if your guidelines are not followed.

Prepare and submit a paper addressing each of the above scenarios. Be sure to clearly separate the scenarios into separate sections of the paper. Only one paper is needed to address both scenarios. Your paper must fulfilling the following requirements.

Structural requirements
• Your document must be no more than 10 pages in length. 12-point Times New Roman font, and double spaced line formatting must be used.
• Your document must contain your name on the first page along with the class/section, professor and due date.
• Your document must contain page numbers at the bottom of each page.
• Your document must be neat, well-written with minimal grammatical and spelling errors.
• All references used for your report should be included in APA style format.
1. Course outcome(s) addressed
• Describe and implement security measures to protect your privacy and minimize risk.
• Recognize the trends and issues of social networking and security practices in order to make informed decisions on personal computing use.
• Analyze the impact of social computing on individuals and society.

PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET AN AMAZING DISCOUNT 🙂

 

© 2020 customphdthesis.com. All Rights Reserved. | Disclaimer: for assistance purposes only. These custom papers should be used with proper reference.