1,178
7
Essay, 2 pages (400 words)

Computer security

College: Computer Security Vulnerabilities in risk management are simply conditions that may result in an attack by impending threats. Maram et. al further suggests that vulnerabilities are attributes that are easily exploited by the threats (51-53). During the vulnerability appraisal on my personal computer, I discovered the following vulnerabilities. First, I discovered that I was a bit careless with storage of my personal computer which is portable since I often leave it on top of the table when out of the house and whenever I carry it around or when travelling I normally left my computer bag unattended. Secondly, I discovered that my wireless internet access was not secured. Thirdly, I found out that there were several problems with the installation settings of my external mouse and the web cam. Fourthly, my operating system was not properly configured with all of the software I had in my computer. And lastly I discovered that my antivirus was not up to date.
When mitigating a risk, it does not necessarily mean to fully eliminate the threat but an effort towards minimizing the impending risks. It is therefore a step taken by a person who fully becomes aware of the existing risks and decides to find ways of preventing or minimizing chances of such risks occurring. I can mitigate my risks on my personal computer by first ensuring that I leave my personal computer somewhere hidden whenever I am out of the house and also ensuring that I fully attend to my personal computer bag whenever I carry my computer around or when am travelling. Secondly, ensuring that I use WPA2 encryption on my internet access point and also configuring my computer with a firewall to ensure that I am not hacked. Third, I would also perform a proper installation for my hardware devices; mouse and the webcam. Fourth, I would ensure that my operating system is properly configured with all the software in my computer. And lastly I would ensure that I install an antivirus software that would keep my computer safe from viruses from external hard disks and flash disks and the one that automatically performs regular updates to remain strong.
Work Cited
Maram, Kiran, Venkata, Sharif, Mohammad, K., B. & Badri, H., S. A Study of Risk
Management of an Information System by Assessing Threat, Vulnerability and Countermeasure. International Journal of Advanced Research in Computer Science and Software Engineering, 2. 12(2012): 51-53.

Thank's for Your Vote!
Computer security. Page 1
Computer security. Page 2
Computer security. Page 3

This work, titled "Computer security" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2021) 'Computer security'. 17 November.

Reference

AssignBuster. (2021, November 17). Computer security. Retrieved from https://assignbuster.com/computer-security-essay-samples-2/

References

AssignBuster. 2021. "Computer security." November 17, 2021. https://assignbuster.com/computer-security-essay-samples-2/.

1. AssignBuster. "Computer security." November 17, 2021. https://assignbuster.com/computer-security-essay-samples-2/.


Bibliography


AssignBuster. "Computer security." November 17, 2021. https://assignbuster.com/computer-security-essay-samples-2/.

Work Cited

"Computer security." AssignBuster, 17 Nov. 2021, assignbuster.com/computer-security-essay-samples-2/.

Get in Touch

Please, let us know if you have any ideas on improving Computer security, or our service. We will be happy to hear what you think: [email protected]