Answered step by step
Verified Expert Solution
Question
00
1 Approved Answer
YOUR TASK (worth 10% of the overall mark for this course offering): Conduct an IT audit of your own personal computer system to determine how
YOUR TASK (worth 10% of the overall mark for this course offering): Conduct an IT audit of your own personal computer system to determine how secure this system is against "hack attacks" from some third party. Your audit report should specify the computer system's current configuration in terms of: - [a] If the computer is up to date with the most recent operating system's service packs and software patches. [b] If the antivirus software installed on the computer has been updated with the latest virus signatures and if this anti-virus software has been scheduled to run regular scans to detect known viruses and any software applications which appear to be making unauthorized changes to the system. [c] If there is a password protocol in effect for every user account whereby all users of the computer are obliged to change their passwords at regular intervals and that these passwords should contain a variety of alpha-numeric characters. NOTE: Your audit report should describe the computer system as it is and - if appropriate - make recommendations for enforcing protocols to reduce the likelihood of the computer system being compromised. YOUR TASK (worth 10% of the overall mark for this course offering): Conduct an IT audit of your own personal computer system to determine how secure this system is against "hack attacks" from some third party. Your audit report should specify the computer system's current configuration in terms of: - [a] If the computer is up to date with the most recent operating system's service packs and software patches. [b] If the antivirus software installed on the computer has been updated with the latest virus signatures and if this anti-virus software has been scheduled to run regular scans to detect known viruses and any software applications which appear to be making unauthorized changes to the system. [c] If there is a password protocol in effect for every user account whereby all users of the computer are obliged to change their passwords at regular intervals and that these passwords should contain a variety of alpha-numeric characters. NOTE: Your audit report should describe the computer system as it is and - if appropriate - make recommendations for enforcing protocols to reduce the likelihood of the computer system being compromised
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access with AI-Powered Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started