Describe if a firewall is enabled on your machine

Assignment Help Computer Network Security
Reference no: EM131445121

Assignment: Data Breaches

The head of the IT security department expressed her concerns about series of data breaches that occurred in the company and mentioned that many employees ignored their system security warnings.

You have been asked to provide a summary of information to the entire team about data breaches and suggest proactive and preventative measures for warding off viruses. Your presentation will be sent out to all company employees, so the information must be clear, concise, and informative.

To prepare your presentation, use your personal computer to perform the following tasks:

• Identify whether you have an anti-virus software running on your machine and from which company.

• Identify if a firewall is enabled on your machine and if you need Windows® firewall running in addition, if that anti-virus software is installed on your machine.

Include the following in your summary:

• Definition of a data breach
• Ways to determine if your system was infected with a virus
• At least three preventive measures against data breaches, both physical or digital
• Instructions on locating anti-virus and firewall software
• Instructions on what to do if a virus has infected your computer

Choose one of the following options for your summary:

• A 2- to 3-minute podcast using the software of your choice, such as Sound Recorder or Audacity to create your audio file and save as a MP3 or WAV.

• A 2- to 3-minute video delivered as an MP4 or MOV file.

• Infographic or visual diagram delivered as a PDF. You may use any Microsoft Office product or free sites such as Piktochart, Easel.ly, or Canva to create an infographic.

• Another deliverable approved by your faculty member.

Reference no: EM131445121

Questions Cloud

Reactions and the final net ionic reaction : If you were to place sodium in a solution of iron(II) chloride, would a spontaneous reaction occur? If the reaction is spontaneous, write both ½ reactions and the final net ionic reaction.
How do the studies about crossmodal phenomena : Now imagine that this person suddenly receives the ability to see. Would the person, without using the sense of touch, be able to identify those same shapes visually? How do the studies about crossmodal phenomena inform us about the answer to this ..
Application of relevant income tax rules : Answer the question with reference to the relevant legislative provisions operating in Australia concerning the application of relevant income tax rules and formulas -
How many moles of vapor are present : 1. A 125mL Erlenmeyer flask has a measured volume of 148 mL. A 0.477 g sample of an unknown vapor occupies the flask at 94.8°C and a pressure of 736 mmHg. Assume ideal gas behavior: a. How many moles of vapor are present?
Describe if a firewall is enabled on your machine : Identify if a firewall is enabled on your machine and if you need Windows firewall running in addition, if that anti-virus software is installed on your machine.
Does trial proceed with a jury trial or a bench trial : CJ252:Bill slips a can of tuna in his pocket and forgets to pay. Is this shoplifting? Please explain how mens rea, actus reus, and corpus delecti are involved in this assessment.Stanley and Bill were interrogated at the police station. Both conced..
What is the pressure in the flask : 1) A piece of dry ice (CO2) has a mass of 23.50 g. It is dropped into an evacuated 2.00-L flask. What is the pressure in the flask at -7°C?
Show histogram of lookup delay for successfully resolved ips : CPS 470/570- Show the histogram of lookup delays for all successfully resolved IPs. Histograms are plotted by partitioning a dataset into fixed bins and counting the fraction of data in each bin.
Describe a negotiation for significant purchase : Plan, execute, and describe a negotiation that you are planning on conducting for either a significant purchase (e.g., house, car, major appliance) a significant decision (e.g., a project at work, budgeting process) or a contract negotiation.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Advising about a software purchase

Your local art museum recently purchased a quad-core computer with 16 GB of RAM. The curator read an article about an art collection inventory system software package that could go on the new computer.

  Is john''s price setting approach ethical. is it legal.

How would you have set and advertised the Craft pen's price? Would you have used a cost-plus approach or some other method? Explain

  Define the cybercrime paper

The papers should be comprised of a INTRODUCTION, REVIEW OF LITERATURE, DISCUSSION, CONCLUSIONS, and REFERENCES.

  Effective biometric systems

Discuss why are many of the reliable, effective biometric systems perceived as intrusive by users and what are stateful inspection firewalls and how do the tables track the state and context of each exchanged packet?

  Differences between symmetric and asymmetric encryption

Describe the differences between symmetric and asymmetric encryption. Select the encryption method you believe is typically more reliable of the two and explain why. Determine if there are any situations where the typically less reliable method co..

  How many comparisons between hash values are needed

How many comparisons between hash values are needed in the worst case - compute in the worst case?

  Problem regarding the machine probability

The probability that two machines is related by , A to work is 0.7 and the probability that B works if A is working is 0.8 , and 0.35 if A fails work find that machine probability B does not work.

  What is 128-bit encryption

Most Web browsers now use "128-bit encryption" to exchange data with secure Web sites. But what does this mean. What is "128-bit encryption". In terms of software available to the general public, is "128-bit encryption" the strongest.

  Identify different computer crimes that you are aware of

Computer crime has become a serious matter; for your Discussion Board post, consider the following: Identify 3 different computer crimes that you are aware of

  Determine how rootkits can be used

Determine how rootkits can be used as an alternative for data hiding and explicate why they can be used for this purpose. Describe the processes and tools used by an investigator in determining whether signs of steganography are present in a given ..

  Sarbanes oxley act and gramm leach bliley act

Provide an overview that will be delivered to senior management of regulatory requirements the agency needs to be aware of, including: FISMA, Sarbanes-Oxley Act and Gramm-Leach-Bliley Act

  Define security infrastructure and protocols

The SSL protocol uses (X.509) certificates to create a secure session between a server and a client in a web session. Discuss the browser-based trust model assumed in SSL, and compare it with the trust model used in Kerberos.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd