Cyber Security Measures and Future Exploration Assignment

Verified

Added on  2019/09/22

|4
|525
|332
Homework Assignment
AI Summary
This assignment delves into cyber security, outlining personal measures and future exploration areas. The student identifies biometric locks as a key personal security measure, highlighting their role in preventing unauthorized access to devices. The assignment then explores three key areas for future development: implementing access controls to secure sensitive data within applications, creating detailed logs to track and mitigate cyber threats, and utilizing firewalls to protect private networks from malicious users. The student emphasizes the importance of these measures in safeguarding against data breaches, misuse, and various internet threats, and includes a reference to best practices in cyber security.
Document Page
FUTURE EXPLORATION
Student
27 October 2016
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Contents
PERSONAL CYBER SECURITY MEASURE............................................................................................2
THREE KEY AREAS FOR FUTURE EXPLORATION.............................................................................2
REFERENCES...............................................................................................................................................3
1 | P a g e
Document Page
PERSONAL CYBER SECURITY MEASURE
In the world of technology, where innovation is key, there also comes the other side called, risks.
The cyber world is full of risks and hence comes the need to protect oneself against all the threats
and malicious activities. Be it network devices, the network itself, the servers or the local devices,
every device is surrounded by threat and vulnerabilities. Thus to protect my system from misuse or
prevent the information theft, I use user based protection against such activities. I use biometric
locks on my device to safeguard it. In biometrics there are multiple methods, out of which I use
finger print scanning to lock my system. Under this method only my finger print can unlock my
system, hence no one can misuse it even if it stolen. Although there are many other ways but I find
this method as one of the best practices that I can adopt.
THREE KEY AREAS FOR FUTURE EXPLORATION
1. Use of Access Controls
Implementation of access control on my device can be another security area. For example securing
the personal data like social media passwords, account information, sensitive bank information
stored in the device, other information like images, chats etc. This can be done when try to
implement access control on individual applications via application locking tools or procedures.
These ensure that the application and the data within them is secure and not misused intentionally
or unintentionally.
2. Detailed Log creation
Logging can be another area for exploration which can help in guarding against the cyber threats. We
can maintain the cyber security if we implement logs and record the internet activity. This can be
done by adding tools to the device which maintains the logs. So now wherever an attack takes
places or any intrusion, such addresses can be traced and blocked. Thus we will be able to track
2 | P a g e
Document Page
any security holes in application and hence can be secured against any such internet threats. Also
we cab patch up such holes and maintain a security protocol.
3. Use of firewalls
We can use firewalls to guard our private network against malicious users. The malicious IP address
we find via logging can be blocked in future via firewalls. Or we can even block other website
URLs, pop ups, ads etc. which can be used for social engineering or phishing. Firewalls
implementation cab be done by installing anti-virus software or other specialized firewall tools. Also
they can filter every message packet, hence making it sure that only secure and safe messages
reach the message.
REFERENCES
Zanderigo, M., 2016. 10 Best Practices for Cyber Security in 2016. [Online]
Available at: http://www.observeit.com/blog/10-best-practices-cyber-security-2016
[Accessed 26 October 2016].
3 | P a g e
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon