Discuss the measures you can take to safeguard home computers and devices.

What will be an ideal response?


Student responses will vary, but should be drawn from the following information from the text.

Sophisticated cybercriminals take advantage of the fact that most home users employ poor security measures. In fact, one study found that home users are victims of 86 percent of all attacks. Instead of resorting to large-scale attacks affecting thousands of users simultaneously, these criminals develop fraud, data theft, and other wealth-generating schemes affecting individual users. In these cases, the users are forced to be reactive in repairing the damage done. The following measures, however, can help home users become proactive by preventing Internet and network attacks.
• Use routers and firewalls. These devices can help detect suspicious activities by continuously monitoring activity and blocking unauthorized entry into the computer. Antivirus software can help thwart attacks that slip by the firewall.
• Disable macro security settings. Macros are useful to record, save, and then execute a set of keystrokes and instructions repeatedly, and they commonly are found in word processing and spreadsheet files. Macros, however, can be disastrous when hidden in a file and then run without permission. In many office productivity applications, you can change the macro security settings so that macros are executed only with your permission.
• Address software warnings. Be wary of tapping or clicking buttons or security bars that seek permission to download or run a program. If you are suspicious of the authenticity, exit the program or leave the website.
• Keep software updated. Major software companies release software patches to repair known vulnerabilities. Many times, home users could have prevented their attacks if they had updated their software with the available patches.
• Stay informed. News media and technology websites report current security breaches and threats. Seek out these articles and take preventive measures.

Computer Science & Information Technology

You might also like to view...

If an expression contains logical operators, comparison operators, and arithmetic operators, ____.

A. the comparison operators are evaluated last B. the arithmetic operators are evaluated last C. the logical operators are evaluated last D. the operators are evaluated in order

Computer Science & Information Technology

What is the difference between cmp and diff?

What will be an ideal response?

Computer Science & Information Technology

What is Class selector?

What will be an ideal response?

Computer Science & Information Technology

Critical Thinking QuestionsCase 8-2You know the technical definition of a media query as offered by the W3C: "A media query consists of a media type and zero or more expressions that check for the conditions of particular media features." But you do not know much more than this so you decide to ask your roommate for a brief tutorial. Which of the following is NOT a use for media queries, according to your roommate?

A. specifying that the position of a div is different when a media type has different media features B. building a static Web site C. specifying different values for a style when it is used in more than one layout D. creating styles that apply only to one layout

Computer Science & Information Technology