Activity 5 (Midterms)
Renee Sarah L. Pumida
Activity 5 (Midterms)
1. What is Information Security?
2. What are the Cybersecurity
Threats?
3. How to keep your data and computer secure? Indicate your reference ebook.
Information Security
Information Security is used to
protect information or data from threats. It is made to prevent the operating
system from viruses by implementing network security system, the Firewall. It
controls the virus that can be detected which can affect the information of a
system or affect the whole system. The computer system can be well-protected if
the Information Security is turned on, aside from protecting the system the
confidentiality of the information is also applied to monitor every network
around the system.
Cybersecurity Threats
In a system, a Cybersecurity
Threats are mostly the threats that intentionally want to hack or access the
data of others, by hacking and destroying the security to have the control of
the system. These are the Cybersecurity Threats you may deal with in handling a
system or network:
1. Trojans - a virus that intended
to mislead users by pretending to be software detecting virus, but it is really
a trap leads to affecting the system.
2. Identity Theft - It is a threat
that hacker is impersonating someone's identity to gain something from them
such as access of credit cards or passwords of private belongings.
3. Virus - It is the common threats
every user experienced, by clicking or accessing unfamiliar sites or link virus
can affect the system by spreading from every part of it.
4. Hacking - It is an illegal
threat that mostly hackers do wherein they will try to destroy or simply
guessing the access of someone's system without telling the owner for them to
get in to have the control all over the system.
5. Cyberterrorism - This threat can
affect not the system but also the people's lives by attacking the system of a
country to have the all access for them to use as their advantage.
How to keep your data and computer
secure?
You can keep your data and computer
secure by accessing a Security System wherein it will protect and prevent the
system from viruses and threats. Software as a virus scanner and cleaner can be
used before or after accessing new information or data. Also, to secure your
data and computer before clicking or visiting unusual sites make sure it is
virus-free and a network that can be trusted with its quality and security. “Think
before you click”, first is think what sites or link you will be accessing and observe
thoroughly with it by searching for its reliability before clicking and opening
it.
P.S.
There is no response from the library, all the information are gathered from internet. The reference is indicated below.
Reference:
Comments
Post a Comment