Security Risks
Hello class and Professor,
As we have learned from this class, there are numerous security risks that we need to address in order to safeguard critical information and consequently avoid falling victim to cyber-attacks. We often focus solely on the software side and tend to overlook securing the hardware.
Typically, the primary focus is on enabling antivirus programs, firewalls, Windows Defender, intrusion prevention/detection systems, and other software that aids in securing the operating system to prevent the infiltration of viruses into our computers. However, there is another essential component that often goes unnoticed, which is the BIOS/UEFI. In this configuration, we can disable ports that might serve as vectors for possible attacks. Therefore, it is crucial to deactivate ports that are unnecessary.
Depending on the organization’s needs, these adjustments can be more stringent than others, even extending to include the use of webcams, audio/microphone, and DVD/CD capabilities. Additionally, we can enhance security by setting up password protection for accessing the BIOS settings. Consequently, it is of utmost importance to select an efficient anti-virus/malware solution, enable BitLocker for full hard drive encryption, apply the philosophy of least privilege, disable unnecessary services, enforce strong password policies, and provide employee training.
Throughout my tenure in IT, I’ve observed that most risks originate from users who lack proper training in security practices, which in certain cases may result in unintentional insider threats. Staying current with software updates, patches, and adhering to established security policies are crucial tasks that IT managers and end users must diligently undertake to achieve optimal hardening goals.
We have reached the end of this course and I hope everyone has learned, not only the importance of securing computers but also how to apply these techniques in the real world. Good luck on your future endeavors!
Badahman, S. (2023, January 10). How to secure your workstations. HIPAAtrek. https://hipaatrek.com/how-to-secure-workstations/#…
Daniel, B. (2023, February 28). System hardening: An easy-to-understand overview. Trusted Computing Innovator. https://www.trentonsystems.com/blog/system-hardeni…
DaMundie and CERT Insider Threat Center, D. (2013, August 7). Unintentional insider threats: The non-malicious within. SEI Blog. https://insights.sei.cmu.edu/blog/unintentional-in…
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
