Professional Documents
Culture Documents
Confidentiality
Integrity
Availability.
Risks
With the increase of the use of the Internet in life of people and increased concern of
hackers with great number of methods to hack, risks are getting increased for
security. There are some examples that show that system can be affected by cyber-
security incidents and have several threats for it. There can be many of the reasons
such as improper security control or there can be manmade errors of naturally
occurring disasters or it can because of some other reasons and these threats
include:
With the increased complexities and increased number of breaches in daily life and
increased technical life of individuals as well as organizations, it is getting important to know
the weaknesses of security system of an organization so security can be more restricted. All
of the cybersecurity risks associated with an organization must be identified clearly to
provide better protection to business and to increase performance of cybersecurity so an
organization can get protection from number of risks and future threats that can highly affect
productivity and image of an organization in the competitive market (Jaishankar &
Karuppannan, 2011).
a) Use account with limited privileges on systems and avoid accessing with administrator privileges
for day-to-day usage.
b) Keep Operating System, Application software and Anti-Virus software updated by applying the
latest service packs and patches.
d) Do not leave system unattended. Log out of or lock your computer when stepping away, even for
a moment
g) Remove unnecessary programs or services from computer: Uninstall any software and services
you do not need
h) Restrict remote access. If file sharing is not required in your day-to-day work, disable file and print
sharing.
j) Remove data securely: Remove files or data you no longer need to prevent unauthorized access to
them. Merely deleting sensitive material is not sufficient, as it does not actually remove the data
from your system
k) If your networking devices are not using IPv6, disable IPv6 from computer.
m) Use system’s screen locking functionality to protect against physical access, such as a screen
saver that won’t deactivate without a password, or just log out of everything so anyone that wants
access has to log in again.
n) The systems should be placed in a room which is dust free and has a good ventilation to avoid
overheating of CPU.
o) Do not plug the computer directly to the wall outlet as power surges may damage computer.
Instead use a genuine surge protector to plug a computer.
r) Scan all the files after you download whether from websites or links received from e-mails