You are on page 1of 1
‘cerns secure Computer Ucar am a Introcacton to Bate Security stolen personal information in illegal activities. Attackers commit identity fraud by impersonating their victims to take out loans, credit cards, or perform illegal activities. This lands their victims in trouble when it is time te pay the bills while the attacker gets ‘away with the money. = Loss of trust ‘Once attackers breach the security af an organization, they can send malicious software as attachments in mails to the stakeholders of the organization to attack their devices. Such attacks look like they were initiated by the organization which results in loss of ‘trust among the stakeholders which eventually impacts the business of the organization "Data loss/theft Apart from financial data, other kinds of data are also prone to thefts. Data like research material, employee information, personal pictures, and personal emails are. all data, ‘which can cause damage to an organization or an individual if released to the public. "Misuse of computer resources Users tend to configure their devices for high performance and a faster Intemet experience and this minimizes the security of the devices. In order to increase performance of their computers, users delete antivirus software and disable firewalls, ‘which make these low security resources an easy target for cybercriminals implementing Security Implementing security practices for devices is one of the most effective ways of minimizing data ‘theft risks. Securing a computing device trom threats involves three steps: = Precaution = Maintenance = Reaction Precaution: Precaution is an action taken in advance to protect the system against threats or dangers. Precautionary measures help in defending against the threats posed by the Internet. Even when ‘they fail to avoid a threat completely they ensure any damage done is kept to a minimum. Some precautionary measures for protecting the computer include: Installing and maintaining an antivirus program = Installing and maintaining a firewall program ™ Using strong passwords to protect user accounts/bank accounts. Strong passwords must contain uppercase, lowercase, symbols, and numbers, for example “GOdb4e!" "Downloading files/applications from only known and trusted sources = Performing virus scans regularly Mee 8 Pages Cert Secure Commuter User Copyright © 2y E-Caunell ‘Sgt Renarvea Raprocuctcn istreny Ponies

You might also like