Question
Run MBSA on your computer. Create a Microsoft Word document sharing the results of the scan on your computer and submit it to the Discussion
Run MBSA on your computer. Create a Microsoft Word document sharing the results of the scan on your computer and submit it to the Discussion Area.
Respond to the following after you have completed the MBSA analysis:
What are the biggest threats to a personal computer (PC)? Justify your answer. Have any of these threats been detected on your machine?
Why is virus protection so important on a PC? How does spyware compare to viruses as a threat to your personal information? Explain your reasoning.
What steps can be taken to make your PC more secure? Outline at least two steps. What areas of security do these steps address?
Run the test again with any corrections to the system to resolve the identified problems and explain the steps you took to improve security on your system.
If you are using a Mac instead of a PC, you will need to identify a vulnerability scanner that works with your version of Mac OS. One example of this type of tool repository can be found at: http://sectools.org/tag/vuln-scanners
Determine the security updates that apply to your computer. Compile a list of security updates for your computer and provide a summary of the vulnerabilities they prevent from being exploited. Provide a summary of the course of action you have taken to secure your computer. If your computer is up-to-date in terms of Mac recommended patches, choose three of the optional enhancements that would apply to your operating system (OS) version and summarize why they would be beneficial.
Respond to the following as part of the discussion as well:
What are the biggest threats to a PC and Mac? Are they significantly different? Explain your answer using examples.
Why is virus protection important on a Mac? How does spyware compare to viruses as a threat to your personal information? Explain your reasoning.
What steps can be taken to make your computer more secure? Outline at least two steps. What areas of security do these steps address?
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started