computer security solutions

computer security solutions

Q No.1) Assume you recently received an email from someone demanding personal identity information. You submitted the needed information to the original sender because you believed the message was genuine. You later realize you may have been a victim of a phishing scam. What are your next steps? How can you stay safe later on? Explain your answer in 4-8 sentences

 Answer:

 First of all, I will change all the passwords of the accounts which I have provided in this mail. And also deny all the permission if it needs to access data or any system into after that I will complain about government FIA and provide and all info about this scam that’s why if hacker misuses my info I have already complaint on my Scam.
 These are as follows:
 • I will protect my Computer/Mobile by using Security Software. 
 • I will protect my Computer/Mobile by instituting a mandatory update policy on devices that access my Network.
 • I will protect my account by using Multi-Factor Authentication.
 • I will protect my data by backing it up. 







 Q No.2) You intend to start bringing a laptop to university to take notes and do other tasks. If you need to step away from your computer for a brief duration of time. How can you ensure the security of your computer? What precautions can you take to protect the physical security of your laptop? Explain your answer in 4-8 sentences 

Answer:

 First of all, I will protect my laptop with a password and I will never give any permission to anyone to open my laptop by using a password. If my laptop has a fingerprinting facility, I will protect it by fingerprint And my laptop's local drives will protect by bit locker or any other trusted security software. I will hand over my laptop to a trusted person or my trusted friend.





 Q No.3) Data Privacy is one of the main issues in this digital world and everyone is using at least one social media platform to utilize their free time. Make a table and Answer the following questions
 1. List down the names of the social media apps you are using and find out which type of permissions you give to these apps.
 2. Have you given these permissions to these apps with your consent OR these permissions have been automatically granted while installation? 
3. What do you think your data on social media accounts is safe?

 Answer:

Social Apps

Permissions you given

Allow auto Permissions

Data is safe on Social apps  Yes/No

Face book

Storage

No

No

What's app

Camera

Contacts

Microphone

Storage

No

No

Instagram

Storage

No

No

Twitter

Storage

No

No


My Data on Social Media or any app or website is not safe on Internet but the Maintenance of Social Media apps is very strong That’s why we can trust this app and could allow only some permissions that are compulsory to use these apps. 





 Q No.4) Is the overall storage capacity shown on your computer or mobile device the same as the capacity advertised when you bought your laptop or mobile device? If not, what could be causing the discrepancy? Explain your answer in 4-8 sentence

 Answer: 

NO Because in advertisement capacity of cell or laptop shows the full capacity of mobile but it is not fully allowed to use for our personal use. The remaining storage capacity is used for system software like a driver, hardware working, BIOS and System Into, etc. That’s the main reason we could not use full storage for personal use.



Post a Comment

0 Comments