Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Run MBSA on your computer. Create a Microsoft Word document sharing the results of the scan on your computer and submit it to the Discussion

Run MBSA on your computer. Create a Microsoft Word document sharing the results of the scan on your computer and submit it to the Discussion Area.

Respond to the following after you have completed the MBSA analysis:

What are the biggest threats to a personal computer (PC)? Justify your answer. Have any of these threats been detected on your machine?

Why is virus protection so important on a PC? How does spyware compare to viruses as a threat to your personal information? Explain your reasoning.

What steps can be taken to make your PC more secure? Outline at least two steps. What areas of security do these steps address?

Run the test again with any corrections to the system to resolve the identified problems and explain the steps you took to improve security on your system.

If you are using a Mac instead of a PC, you will need to identify a vulnerability scanner that works with your version of Mac OS. One example of this type of tool repository can be found at: http://sectools.org/tag/vuln-scanners

Determine the security updates that apply to your computer. Compile a list of security updates for your computer and provide a summary of the vulnerabilities they prevent from being exploited. Provide a summary of the course of action you have taken to secure your computer. If your computer is up-to-date in terms of Mac recommended patches, choose three of the optional enhancements that would apply to your operating system (OS) version and summarize why they would be beneficial.

Respond to the following as part of the discussion as well:

What are the biggest threats to a PC and Mac? Are they significantly different? Explain your answer using examples.

Why is virus protection important on a Mac? How does spyware compare to viruses as a threat to your personal information? Explain your reasoning.

What steps can be taken to make your computer more secure? Outline at least two steps. What areas of security do these steps address?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Data And Databases

Authors: Jeff Mapua

1st Edition

1978502257, 978-1978502253

More Books

Students also viewed these Databases questions

Question

How many three-digit numbers are divisible by 7?

Answered: 1 week ago

Question

What is Indian Polity and Governance ?

Answered: 1 week ago

Question

What are Measures in OLAP Cubes?

Answered: 1 week ago

Question

How do OLAP Databases provide for Drilling Down into data?

Answered: 1 week ago

Question

How are OLAP Cubes different from Production Relational Databases?

Answered: 1 week ago