question archive The head of the IT security department expressed her concerns about a series of data breaches that occurred in the company and mentioned that many employees ignored their system security warnings

The head of the IT security department expressed her concerns about a series of data breaches that occurred in the company and mentioned that many employees ignored their system security warnings

Subject:BusinessPrice: Bought3

The head of the IT security department expressed her concerns about a series of data breaches that occurred in the company and mentioned that many employees ignored their system security warnings. You have been asked to provide a summary of information to the entire team about data breaches and suggest proactive and preventive measures for warding off viruses. Your presentation will be sent out to all company employees, so the information must be clear, concise, and informative.

To prepare your presentation, use your personal computer to perform the following tasks:

  • Identify whether you have an anti-virus software running on your machine and from which company.
  • Identify if a firewall is enabled on your machine and if you need Windows® firewall running in addition, if that anti-virus software is installed on your machine.

Include the following in your powerpoint

  • The definition of a data breach
  • Ways to determine if your system was infected with a virus
  • At least three preventive measures against data breaches, both physical or digital
  • Instructions on locating antivirus and firewall software
  • Instructions on what to do if a virus has infected your computer5/10/2021 Originality Report SafeAssign Originality Report IT/200: Digital Skills For The 21st Century • Wk 5 - Data Breaches [due Mon] View Originality Report - Old Design Jesus Romero Total Score: 44 High risk % Submission UUID: a9dfefd5-1e1b-ddca-9be6-4978c21da597 Total Number of Reports Highest Match Average Match Submitted on Average Word Count 1 44 % 44 % 05/10/21 837 06:49 PM PDT Highest: IT200-5.pptx IT200-5.pptx Additional content 44 Word Count: 837 IT200-5.pptx % 38 % Institutional database (10) 11 Student paper 4 Student paper 13 Student paper 9 User paper 8 User paper 6 User paper 10 User paper 3 User paper 7 Student paper 1 User paper 4% Internet (2) 12 isr09 5 ecejyredagij 2% Global database (1) 2 Student paper Top sources (3) 11 Student paper 4 Student paper 13 Student paper Excluded sources (0) Data Breaches Jesus Romero IT/200 Professor Eric godat 1 De?nition of Data Breach 2 A data Breach is the unintentional or intentional exposure of con?dential, sensitive or private information to an unauthorized entity or person. In a data Breach ?les are shared and viewed without permission. Anyone can be at risk or put others at risk of a data Breach from high level enterprises and government s to individuals if they are not protected. Other terms used to describe data Breach include data leak, data spill, leakage of information and unintentional information disclosure. 3 3 Ways to determine if your system was infected with a virus The major methods of detecting viruses in a system include; 4 scanning, integrity checking, heuristic detection and interception. The major methods of detecting viruses in a system include scanning, integrity checking, heuristic detection and interception. However, interception and scanning are https://vle.phoenix.edu/webapps/mdb-sa-BB300502SF160441/originalityReport/ultra?attemptId=fb2cb62b-19e6-49ef-9823-154de139b0b2&course_id… 1/4 5/10/2021 Originality Report the most common as they are inbuilt features of anti-virus packages. 4 Scanning involves the search of all ?les in the system or computer memory including the boot sector using code snippets that identify if a ?le is a virus. Integrity checking involves recording integrity information of important ?les on a systems disk. instructions are then given on what to do if a virus has infected your computer If a ?le is corrupted by a virus it won’t match the recorded integrity information. 5 Heur- istic detection is a generic method of detecting a virus. It involves a set of rules to di?erentiate viruses from non-viruses that are built in antivirus software. Interception involves the use of interception software to detect suspicious behavior of a virus and warns the user before the system is harmed. 4 6 Preventive measures against data breaches, both physical or digital Ensure your computer has a running antivirus software which is up to date. It is also important to install software or hardware ?rewall especially on your internet browsers. Before starting your computer ensure there isn't any external device or hardware such as a USB connected to your computer especially if the hardware is from a suspicious source. You should avoid opening emails that come from strangers either mark them as spam or delete them immediately. Before opening an email with an attachment, ensure that a sender is a person you recognize or if you were expecting that email; if not, delete the email. An antivirus will automatically detect viruses from unsuspecting ?les, software and emails and quarantines or removes them from your systems memory and storage. Firewalls enables your browser to detect suspicious web pages and will warn you of any threats while browsing. If the hardware is infected by a virus it will automatically load into your hard drive. 5 7 Instructions on locating antivirus and ?rewall software Click on Start on your computer, and on the search bar, then type control panel on the search results click on the app showing Control panel. panel window click on security and maintenance. On the security and maintenance screen, open security by scrolling downwards; 9 8 On the control, you can see a list of installed ?rewall and antivirus programs running in the background of your system. 10 Instructions on what to do if a virus has infected your computer Download and install genuine and reliable antivirus software such as Kaspersky internet security. Disconnect your computer from the internet to prevent further damages 11 Reboot your computer into Safe Mode. 12 Delete any temporary ?les using disk cleanup. 11 Run a virus scan using your preferred antivirus or internet se- curity software. After the scan is complete select Delete or quarantine to get rid of the suspicious ?les. Now the virus is remove and your computer is safe you can reboot your computer and you don't have to put it on safe Mode. Change your password if you suspect someone had compromised it 11 You should also update your software, browser and operating system.. To shift your computer to safe Mode, shut down your computer and turn it on again. When the screen opens, press F8 on your keyboard. An advanced boot options menu will pop up. 13 Click on safe Mode with networking and remain disconnected from the internet. done by typing temporary ?les and choosing to free up disk space that deletes unnecessary ?les. 13 12 Delete any temporary ?les using disk cleanup. This is Find and select temporary internet ?les in the ?les to delete disk cleanup list and click ok on the con?rm delete ?les selection. After the scan is complete select Delete or quarantine to get rid of the suspicious ?les. To be 100% sure that your computer is safe, rescan it to check if there are further threats. 11 If additional viruses are detected Delete or quarantine the ?les If you are using Kaspersky internet security, open the software and select run scan. After the scan is complete select Delete or quarantine to get rid of the suspicious ?les. To be 100% sure that your computer is safe, rescan it to check if there are further threats. 11 If additional viruses are detected Delete or quarantine the ?les 7 Source Matches (20) 1 95% User paper 2 Student paper Student paper De?nition of Data Breach A data Breach is the unintentional or intentional exposure of con?dential, sensit- Original source 73% Student paper ive or private information to an unauthorized entity or person. · De?nition of a data breach Original source “A data breach is the intentional or unintentional exposure of con?dential information to https://vle.phoenix.edu/webapps/mdb-sa-BB300502SF160441/originalityReport/ultra?attemptId=fb2cb62b-19e6-49ef-9823-154de139b0b2&course_id… 2/4 5/10/2021 3 Originality Report 100% User paper 7 Student paper Student paper Ways to determine if your system was infected with a virus Instructions on locating antivirus and ?rewall software 4 100% Student paper Original source Original source ways to determine if your system was in- Instructions on locating antivirus and fected with a virus ?rewall software 85% Student paper 8 71% User paper Student paper Student paper scanning, integrity checking, heuristic de- On the control, panel window click on se- tection and interception. The major curity and maintenance. On the security methods of detecting viruses in a system include scanning, integrity checking, and maintenance screen, open security by scrolling downwards; heuristic detection and interception. Original source Original source In the Control Panel window, go to "Se- scanning, integrity checking, interception, curity and Maintenance" Security and and heuristic detection scanning, integrity checking, interception, and heuristic Maintenance screen, open "Security" detection 9 4 71% Student paper 72% User paper Student paper you can see a list of installed ?rewall and Student paper antivirus programs running in the background of your system. Scanning involves the search of all ?les in the system or computer memory including the boot sector using code snippets Original source that identify if a ?le is a virus. • Press down arrow next to “Security” to see a list of installed antivirus and ?re- Original source wall programs you have running in the background The method of scanning will search all ?les in the memory, in the boot sector, and on the disk for code snippets that uniquely identify a ?le as a virus 10 5 75% ecejyredagij Student paper 100% User paper Student paper Instructions on what to do if a virus has infected your computer Heuristic detection is a generic method Original source of detecting a virus. Instructions on what to do if a virus has infected your computer Original source This is a generic method of virus detection 11 6 100% User paper Student paper 100% Student paper Student paper Reboot your computer into Safe Mode. Original source Preventive measures against data breaches, both physical or digital Reboot your computer into safe mode Original source Preventive measures against data breaches, both physical or digital https://vle.phoenix.edu/webapps/mdb-sa-BB300502SF160441/originalityReport/ultra?attemptId=fb2cb62b-19e6-49ef-9823-154de139b0b2&course_id… 3/4 5/10/2021 12 Originality Report 77% isr09 13 Student paper Student paper Delete any temporary ?les using disk Find and select temporary internet ?les cleanup. in the ?les to delete disk cleanup list and click ok on the con?rm delete ?les selection. Original source 66% Student paper Steps to delete temporary ?les in Disk Cleanup Original source Type “Temporary Files” Choose “Free up 11 disk space by deleting unnecessary ?les” Find and select “Temporary Internet Files” in the ‘Files to delete’ Disk Cleanup 69% Student paper list and click OK Student paper Run a virus scan using your preferred antivirus or internet security software. 11 11 Original source Student paper • Now it is time to run a virus scan using If additional viruses are detected Delete your chosen anti-virus or internet security software or quarantine the ?les If you are using Kaspersky internet security, open the software and select run scan. Original source 84% Student paper 73% Student paper If threats are found, quarantine or delete the ?les If you are using Kaspersky Internet Security, select and run ‘Scan’ Student paper You should also update your software, browser and operating system.. Original source 11 Update your software, browser, and operating system 66% Student paper Student paper If additional viruses are detected Delete or quarantine the ?les 13 71% Student paper Original source If threats are found, quarantine or delete the ?les Student paper Click on safe Mode with networking and remain disconnected from the internet. Original source Click ‘Safe Mode with Networking’ Remain disconnected from the internet 12 77% isr09 Student paper Delete any temporary ?les using disk cleanup. Original source Steps to delete temporary ?les in Disk Cleanup https://vle.phoenix.edu/webapps/mdb-sa-BB300502SF160441/originalityReport/ultra?attemptId=fb2cb62b-19e6-49ef-9823-154de139b0b2&course_id… 4/4

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE

Related Questions