Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Help develope hypothesis and research model on SAFETY MEASURES OF CYBERSECURITY Basic precautions must be taken by everyone who use internet and online transactions and

Help develope hypothesis and research model on
SAFETY MEASURES OF CYBERSECURITY
Basic precautions must be taken by everyone who use internet and online transactions and work:
1. Internet Security Suite- One can use various anti malware software that are available for purchase either
through online or offline that helps them to protect and secure their information from various malware.
2. Strong Password- One should use strong and new password frequently. Password must be changed
frequently by using combination of letters, numbers and special characters and try to erase history of
browser once work done specially if using public or common computers or laptop.
3. Regular Update Software It is important for OS and internet security to update regular software to avoid
any kind of cybercrime as criminals use known exploits and flaws to gain access of system.
4. Manage Social Media Settings- It is always very important to keep personal and private information
locked down. Cyber criminals keep an eye on social media information so it must be locked and frequently
change like password. Share as much less information on social media so that anyone wont be able to
guess security questions answers.
5. Intensify Home Network- Home network must have strong encrypted password and have virtual private
network. A VPN stands for Virtual Private Network; which allows you to create a secure connection to
another network over the internet.. It allows you to connect to the public networks more securely. Its a
great idea to use VPN in both public and personal network so that it protects everywhere.
6. Secure Personal Computer- This can be done by activating computer firewall, using anti-virus, malware
software and block spyware attacks by regularly installing and updating softwares.
7. Secure Mobile Devices- Mobile devices must be updated and password protected in two-factor
authentication and applications must be downloaded from trusted sources.
8. Install latest Operating System- Current and updated operating system must be used in Windows, Mac,
Linux to prevent potential attacks on older software.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

DNA Databases

Authors: Stefan Kiesbye

1st Edition

0737758910, 978-0737758917

More Books

Students also viewed these Databases questions

Question

List the different categories of international employees. page 642

Answered: 1 week ago

Question

Explain the legal environments impact on labor relations. page 590

Answered: 1 week ago