1) Assess your risk. How sensitive is your most sensitive data. What do you currently do to protect it? Is this enough? What would happen if the data were compromised?
2) Identify several of your current vulnerabilities (either in design or in habit). How can these vulnerabilities be mitigated? his discussion board is only this week.
Q.1) Assess your risk. How sensitive is your most sensitive data. What do you currently do to protect it? Is this enough? What would happen if the data were compromised?
answer:-My data is generally divided into three parts i.e(personal, professional & publicly open data). Personal and Professional data are categorized into sesitive data and the level of sensitivity depends on the data itself. Th most sensitivy data can be as important as life. For highly sensitive professional data I usually avoid to put in in any device connected with network or has internet access as their is never enough protection and make hardcopy of these types of data where it can be secure in a locker, but for the personal data I totally avoid to make any kind of copies(hardcopies and softcopies). While talking on the network security we can protect our machine by following the following points:-
You might has experienced that if you are in a super market or a mall after your visit your social media pages are likely to show to you ads or mails based on your visit on the super market. It is one of the example of data loss almost everyone has experinced in our life, and the problems can very from smaller issues like the above example to bigger and more dangerous issues like blckmaling(thats why your data if as important as your life).
Q. 2) Identify several of your current vulnerabilities (either in design or in habit). How can these vulnerabilities be mitigated? his discussion board is only this week.
answer:-Vulnerabilities are is knowing wekness in your assets that can help hackers to enter into your system. One of common example is you forget to take the id access from your late employees or forget to disable their access login to the company account. Vulnerabilities can be mitigated by checking the following steps:-
Get Answers For Free
Most questions answered within 1 hours.