Describe each security risk:
(1)Unauthorized access:
- Accessing private accounts, messages or files without a permission from the owner.
- Prevent: We can give a strong password to the account and the devices that we use.
- Example: Hacking someone account.
- Use someone system without a permission from the owner.
- Prevent: We can use private IP addresses so that people cannot access the system, such as provide new strong VPN to protect the identity.
- Example: Reply people comments or messages using someone account.
- Someone that illegally copy people data then remove the data without a permission from the owner of the data.
- Prevent: All the data must have copyright.
- Example: Copy someone works from the website, that called plagiarism and remove it all she/he want.
- Someone that physically damage the systems assets and environments which can cause some devices can be stolen.
- Prevent: Provide a strong password for the systems, and make a back up of the system.
- Example: The computer of the office can be stolen .
- Someone that illegally accessing , making damages to someones data inside and outside the systems.
- Prevent:Install quality anti virus and keep updating.
- Example: Viruses that can cause lost of data.
- Natural disaster that can cause damages to the system.
- Prevent: Use leak and flood sensors.
- Example: Flood can cause damages to the computer system.
References:
MakeUseOf. (2017). Protect Your Electronics
From Water With These 7 Steps. [online] Available at: https://www.makeuseof.com/tag/best-ways-protect-electronics-flooding/ [Accessed
10 Apr. 2018].
Canon.com. (2018). [online] Available at: http://www.canon.com/support/pdf/network-cameras.pdf [Accessed
10 Apr. 2018].
No comments:
Post a Comment