FILE ATTACHED

1 answer below »
FILE ATTACHED


***WEBSITE NEEDED TO COMPLETE THIS ASSIGNMENT https://s2me.io/ This Final is a 4 page essay. In order to write your final exam essay, you will first need to conduct a personal security risk assessment at https://s2me.io/ (Links to an external site.) Let me first give you some background information on the personal risk assessment. SecurityStudio provides the S2me personal risk assessment as a tool to help individuals learn more about their at home cybersecurity risk posture. They don't charge for the tool and they don't sell or reuse your data. The company's mission statement is "Mission before money". You may choose to create an email address and identity just for this assessment and I won't have access to your assessment or any information about your assessment. I also don't work for SecurityStudio nor do I receive any compensation from them in any way. I do know the the Founder and the current President of the company and they excellent reputations for honesty in the industry. Once you have completed the risk assessment, write a 4-6 page essay where you do the following: Summarize your results from the risk assessment. Describe your strengths and areas for improvement based on the risk assessment. Describe the biggest challenges (at least three) you have in securing your Data and Information Systems. What are the potential solutions for your identified challenges. Make sure you include the following for each challenge: Problem definition Examples Potential Solutions References How would a large organization benefit from a risk assessment like the one you just took, but focused on the organization's risks? Are the challenges faced by you as an individual similar or different from those faced by a large organization? How? You may use your book and credible resources as long as you cite them in your references at the end of your Essay.
Answered 4 days AfterMay 24, 2022

Answer To: FILE ATTACHED

Dr Raghunandan G answered on May 29 2022
87 Votes
1.
HOUSEHOLD COMPUTER SAFETY
· With a strong password, you can safeguard your personal information.
· Strong passwords should be taken into consideration while creating a new one.
· Frequently changing your passwords is a good idea.
·
Don't let anyone else have access to your credentials.
· Don't use passwords that are easy to guess.
· Always save passwords and hint information safely. Use an encrypted file on your computer to store passwords, or another solution that is as secure as possible.
CHOOSING AND PROTECTING YOUR ACCOUNT LOGIN.
· Make a New Password Change
· Stay away from allowing your computer to save passwords in its memory
· Keep Your Passwords in a Safe Place
· Authentication Requires Two Factors
· Be Aware of Phishing Attempts and Take Precautions
SECURING MOBILE DEVICES
· Don't let anyone use your phone unless you have it locked.
· Set up Robust Password Protection.
· Updating the OS on your device is important.
· Connect to a protected wireless network.
· Downloads should be avoided at all costs.
2.
In addition to being a regulatory requirement in some industries and countries, risk management has many advantages, including a reduction in future uncertainty, opportunities for learning and improvement, increased awareness, a tool for making good decisions, accurate projections of performance outcomes, and an improvement in culture.
STRENGTH
One of the fundamental aims of any risk-based strategy is to quantify risk. To do so, large volumes of elevated information relating polluted sites should be accumulated. As a result, risk-based techniques need significant site characterization. Such exercises help users better comprehend the nature of the exposure and recognize the need for quick action to mitigate the risk. When extensive site characterisation attempts are completed, many risk-based methods result in less rigorous cleaning targets. Risk-based approaches are academically acceptable and are based on scientific explanations of pollutant fate, transit, & exposure of human and ecological receptors. New scientific knowledge may be included into the best procedures when it becomes accessible.
WEAKNESS
Several of the flaws in these strategies may be traced down to the fact that risk-based processes are more inclined to leave contaminants behind than conserving natural resources or technology-based approaches. The...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here