Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

3. Visit the following Internet resources and describe what you find, e.g., who

ID: 3728762 • Letter: 3

Question

3. Visit the following Internet resources and describe what you find, e.g., who sponsors the site, what information does it provide, what is its relevance to computer system security, who might benefit from it, and what are your opinions about it.

https://epic.org/

http://www.ieee-security.org/index.html

http://www.spywareguide.com

https://www.privacyrights.org/

http://securityresponse.symantec.com

https://csrs.nist.gov/

7. Suppose that your e-mails might be interrupted by unauthorized parties. Describe five
different ways you might deal with such risk. (Be specific, using the e-mail example.)

10. (a) List 3 different administrative controls that could be applied to detect or prevent virus
attacks.
(b) List 3 different technical controls that could be applied to detect or prevent virus
attacks.
(c) List 3 different physical controls that could be applied to detect or prevent virus
attacks.

Explanation / Answer

7. Suppose that your e-mails might be interrupted by unauthorized parties. Describe five different ways you might deal with such risk. (Be specific, using the e-mail example.).

Answer)

Personal emails and Business emails are all sensitive. While personal emails contain personal information about the person, business emails contain information about the company the person is working in and other information which is sensitive. So, if emails are interrupted or compromised by unauthorized parties, then it's a problem. To recover from that and to take control and to prevent such things happening in the future we have some steps to consider:

1) We have to do a complete security checkup of the system. The system may be compromised which in turn lets the email compromised.

2) We have to do a complete security check on the email settings, options, and update the settings and recovery details for a better security.

3) Setting up 2 step verification and including recovery options on the email.

4) Creating and changing the password in the email.

5) Update the browser or the email client.

6) Delete and update the trusted devices which do not ask for much verification while letting access to the email.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote