Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Develope research hypothesis based on the variables and their relationship on safety measures of cybersecurity; 1 . Internet Security Suite - One can use various

Develope research hypothesis based on the variables and their relationship on safety measures of cybersecurity;
1.Internet Security Suite- One can use various anti malware software that are available for purchase either
through online or offline that helps them to protect and secure their information from various malware.
2. Strong Password- One should use strong and new password frequently. Password must be changed
frequently by using combination of letters, numbers and special characters and try to erase history of
browser once work done specially if using public or common computers or laptop.
3. Regular Update Software It is important for OS and internet security to update regular software to avoid
any kind of cybercrime as criminals use known exploits and flaws to gain access of system.
4. Manage Social Media Settings- It is always very important to keep personal and private information
locked down. Cyber criminals keep an eye on social media information so it must be locked and frequently
change like password. Share as much less information on social media so that anyone wont be able to
guess security questions answers.
5. Intensify Home Network- Home network must have strong encrypted password and have virtual private
network. A VPN stands for Virtual Private Network; which allows you to create a secure connection to
another network over the internet.. It allows you to connect to the public networks more securely. Its a
great idea to use VPN in both public and personal network so that it protects everywhere.
6. Secure Personal Computer- This can be done by activating computer firewall, using anti-virus, malware
software and block spyware attacks by regularly installing and updating softwares.
7. Secure Mobile Devices- Mobile devices must be updated and password protected in two-factor
authentication and applications must be downloaded from trusted sources.
8. Install latest Operating System- Current and updated operating system must be used in Windows, Mac,
Linux to prevent potential attacks on older software.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_step_2

Step: 3

blur-text-image_step3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

DB2 11 The Ultimate Database For Cloud Analytics And Mobile

Authors: John Campbell, Chris Crone, Gareth Jones, Surekha Parekh, Jay Yothers

1st Edition

ISBN: 1583474013, 978-1583474013

More Books

Students also viewed these Databases questions