Digital Security Guide: Cybersecurity for the Workplace
VerifiedAdded on 2020/04/15
|6
|1031
|80
Report
AI Summary
This digital security guide provides a comprehensive overview of essential cybersecurity practices for employees. It emphasizes the importance of strong passwords, avoiding untrustworthy websites, and recognizing common online threats such as spam, phishing, spoofing, and pharming. The guide also covers password managers, network security measures like antivirus software and firewalls, and the use of encryption to protect sensitive information. Furthermore, it delves into denial-of-service attacks and provides insights into cloud computing, including best practices for secure implementation and data management. The guide references reputable sources to support its recommendations, making it a valuable resource for promoting a secure digital environment within a workplace setting.

qwertyuiopasdfghjklzxcvbnmqwertyui
opasdfghjklzxcvbnmqwertyuiopasdfgh
jklzxcvbnmqwertyuiopasdfghjklzxcvb
nmqwertyuiopasdfghjklzxcvbnmqwer
tyuiopasdfghjklzxcvbnmqwertyuiopas
dfghjklzxcvbnmqwertyuiopasdfghjklzx
cvbnmqwertyuiopasdfghjklzxcvbnmq
wertyuiopasdfghjklzxcvbnmqwertyuio
pasdfghjklzxcvbnmqwertyuiopasdfghj
Digital Tools
Digital Security Guide
23-Nov-17
(Student Details: )
opasdfghjklzxcvbnmqwertyuiopasdfgh
jklzxcvbnmqwertyuiopasdfghjklzxcvb
nmqwertyuiopasdfghjklzxcvbnmqwer
tyuiopasdfghjklzxcvbnmqwertyuiopas
dfghjklzxcvbnmqwertyuiopasdfghjklzx
cvbnmqwertyuiopasdfghjklzxcvbnmq
wertyuiopasdfghjklzxcvbnmqwertyuio
pasdfghjklzxcvbnmqwertyuiopasdfghj
Digital Tools
Digital Security Guide
23-Nov-17
(Student Details: )
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

DIGITAL TOOLS 2
Digital Security Guide
The world is becoming smaller day by day due to the growing interconnectivity between
different parts of the world. This is all because of internet. However, even though there are lot of
benefits of internet at the present day, it does prove as a major threat at the present age. Thus,
this digital security guide has been created for the employees.
Passwords
It is crucial that the passwords created by the employees are effective and secure. In this
matter, there is a need for the password to be alphanumeric with symbols as such passwords
cannot be hacked. Also, the individuals should refrain from using their date of births as
passwords as these are easily cracked (Nahari & Krutz, 2017).
Credibility of Website
Such websites should be avoided which are not secured and this can be inferred from the
green or red mark in the box where the URL of a website is written. Also, the websites which
have proper trademarks, and are active are credible, and the ones like Wikipedia or the blogs are
not deemed as credible websites as the matter on these sites can be altered by anyone (Nahari &
Krutz, 2017).
Some key terms
Spams are the unsolicited messages which can be easily spotted and can damage the
system on which the same is opened or is responded from. Phishing are the emails sent by
internet criminal which are disguised as email from trustworthy or legitimate source. The
Digital Security Guide
The world is becoming smaller day by day due to the growing interconnectivity between
different parts of the world. This is all because of internet. However, even though there are lot of
benefits of internet at the present day, it does prove as a major threat at the present age. Thus,
this digital security guide has been created for the employees.
Passwords
It is crucial that the passwords created by the employees are effective and secure. In this
matter, there is a need for the password to be alphanumeric with symbols as such passwords
cannot be hacked. Also, the individuals should refrain from using their date of births as
passwords as these are easily cracked (Nahari & Krutz, 2017).
Credibility of Website
Such websites should be avoided which are not secured and this can be inferred from the
green or red mark in the box where the URL of a website is written. Also, the websites which
have proper trademarks, and are active are credible, and the ones like Wikipedia or the blogs are
not deemed as credible websites as the matter on these sites can be altered by anyone (Nahari &
Krutz, 2017).
Some key terms
Spams are the unsolicited messages which can be easily spotted and can damage the
system on which the same is opened or is responded from. Phishing are the emails sent by
internet criminal which are disguised as email from trustworthy or legitimate source. The

DIGITAL TOOLS 3
purpose is to lure the person in revealing confidential information. Spoofing refers to the
criminals who impersonate other organizations or individuals for getting confidential
information. Pharming refers to malicious websites which seem to be legitimate ones. It is
advised to employees to stay away from such and where they doubt the authenticity of any
communication, they should refrain from opening them (Texas Tech University, 2017).
Password managers
Password manager helps in generating and also in retrieving the complex passwords,
particularly the ones in encrypted database. The advantages include the capacity of being easily
incorporated in the softwares, no need of extensive modifications in computers and users being
familiar with use of passwords. However, these are vulnerable, and can be blocked which make
them useless (Nahari & Krutz, 2017).
Example of secure network
Examples of network security include antivirus and antimalware softwares, application
security, firewalls and network segmentation (Cisco, 2017).
Encryption
Encryption refers to the process whereby messages or information are encoded in such a
manner that they can only be accessed by authorized parties. It does not prevent interferences
and instead denies the important content to a possible interceptor. When it comes to encryption,
there is a need for a successful encryption strategy to be used by the employees (O'Leary,
Nelson, Green & Grahn, 2017). The employees are also required to ensure that the encryption
purpose is to lure the person in revealing confidential information. Spoofing refers to the
criminals who impersonate other organizations or individuals for getting confidential
information. Pharming refers to malicious websites which seem to be legitimate ones. It is
advised to employees to stay away from such and where they doubt the authenticity of any
communication, they should refrain from opening them (Texas Tech University, 2017).
Password managers
Password manager helps in generating and also in retrieving the complex passwords,
particularly the ones in encrypted database. The advantages include the capacity of being easily
incorporated in the softwares, no need of extensive modifications in computers and users being
familiar with use of passwords. However, these are vulnerable, and can be blocked which make
them useless (Nahari & Krutz, 2017).
Example of secure network
Examples of network security include antivirus and antimalware softwares, application
security, firewalls and network segmentation (Cisco, 2017).
Encryption
Encryption refers to the process whereby messages or information are encoded in such a
manner that they can only be accessed by authorized parties. It does not prevent interferences
and instead denies the important content to a possible interceptor. When it comes to encryption,
there is a need for a successful encryption strategy to be used by the employees (O'Leary,
Nelson, Green & Grahn, 2017). The employees are also required to ensure that the encryption
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

DIGITAL TOOLS 4
key is not provided to any third party, as the same can be used to gaining an access to the
encrypted network.
Denial of Service attack
Denial of service attack is a kind of cyber attack in which the perpetrator attempts to
make the network resource or a machine unavailable to the user of such device or resource in
either temporary or indefinite manner of the host. It typically floods the servers, networks or
systems with traffic in order to overwhelm the system of the victim and make it inaccessible. The
employees should keep a lookout for such attacks and any suspicion of the same should be raised
immediately. They should deploy the defence techniques in advance to save from such incidents,
which includes firewalls and IPS based prevention (Nahari & Krutz, 2017).
Cloud computing
Cloud computing refers to the information technology paradigm through which the
omnipresent access to the shared pools of high level services and configurable system resources
is enabled particularly the one which can be provisioned with minimalistic efforts over the
internet. It is the general term which is used to refer to the delivery of hosted services on internet.
In third party clouds, the companies are able to focus on their main business instead of having to
expend their resources on infrastructure and maintenance of computers. The employees can share
the resources for attaining economies of scale and coherence. It allows the employees to access
information across different locations and devices (Davidi, 2013).
Best practices in cloud computing
The best practices in cloud computing includes the following:
key is not provided to any third party, as the same can be used to gaining an access to the
encrypted network.
Denial of Service attack
Denial of service attack is a kind of cyber attack in which the perpetrator attempts to
make the network resource or a machine unavailable to the user of such device or resource in
either temporary or indefinite manner of the host. It typically floods the servers, networks or
systems with traffic in order to overwhelm the system of the victim and make it inaccessible. The
employees should keep a lookout for such attacks and any suspicion of the same should be raised
immediately. They should deploy the defence techniques in advance to save from such incidents,
which includes firewalls and IPS based prevention (Nahari & Krutz, 2017).
Cloud computing
Cloud computing refers to the information technology paradigm through which the
omnipresent access to the shared pools of high level services and configurable system resources
is enabled particularly the one which can be provisioned with minimalistic efforts over the
internet. It is the general term which is used to refer to the delivery of hosted services on internet.
In third party clouds, the companies are able to focus on their main business instead of having to
expend their resources on infrastructure and maintenance of computers. The employees can share
the resources for attaining economies of scale and coherence. It allows the employees to access
information across different locations and devices (Davidi, 2013).
Best practices in cloud computing
The best practices in cloud computing includes the following:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

DIGITAL TOOLS 5
Creating a strategy and set of objectives before hand, so that a long term cloud strategy is
articulated which relates to the overall business.
Learning from the mistakes of others
Avoiding upfront costs
Being serious autonomy
Addressing security concerns
Ensuring availability and performance of data (ESJ, 2009).
Creating a strategy and set of objectives before hand, so that a long term cloud strategy is
articulated which relates to the overall business.
Learning from the mistakes of others
Avoiding upfront costs
Being serious autonomy
Addressing security concerns
Ensuring availability and performance of data (ESJ, 2009).

DIGITAL TOOLS 6
References
Cisco. (2017). What Is Network Security? Retrieved from:
https://www.cisco.com/c/en/us/products/security/what-is-network-security.html
Davidi, A. (2013). How is cloud computing enhancing our ability to work anywhere? Retrieved
from: https://www.theguardian.com/media-network/media-network-blog/2013/dec/18/
cloud-enhancing-work-anywhere-flexible
ESJ. (2009). Seven Best Practices for Cloud Computing. Retrieved from:
https://esj.com/Articles/2009/08/18/Cloud-Best-Practices.aspx?Page=2
Nahari, H., & Krutz, R. L. (2011). Web commerce security: design and development. West
Sussex: John Wiley & Sons.
O'Leary, D., Nelson, J., Green, P., & Grahn, A. (2017). 7 Key Elements of a Successful
Encryption Strategy. Retrieved from: http://focus.forsythe.com/articles/364/7-Key-
Elements-of-a-Successful-Encryption-Strategy
Texas Tech University. (2017). Scams – Spam, Phishing, Spoofing and Pharming. Retrieved
from: https://www.ttu.edu/cybersecurity/lubbock/digital-life/digital-identity/scams-spam-
phishing-spoofing-pharming.php
References
Cisco. (2017). What Is Network Security? Retrieved from:
https://www.cisco.com/c/en/us/products/security/what-is-network-security.html
Davidi, A. (2013). How is cloud computing enhancing our ability to work anywhere? Retrieved
from: https://www.theguardian.com/media-network/media-network-blog/2013/dec/18/
cloud-enhancing-work-anywhere-flexible
ESJ. (2009). Seven Best Practices for Cloud Computing. Retrieved from:
https://esj.com/Articles/2009/08/18/Cloud-Best-Practices.aspx?Page=2
Nahari, H., & Krutz, R. L. (2011). Web commerce security: design and development. West
Sussex: John Wiley & Sons.
O'Leary, D., Nelson, J., Green, P., & Grahn, A. (2017). 7 Key Elements of a Successful
Encryption Strategy. Retrieved from: http://focus.forsythe.com/articles/364/7-Key-
Elements-of-a-Successful-Encryption-Strategy
Texas Tech University. (2017). Scams – Spam, Phishing, Spoofing and Pharming. Retrieved
from: https://www.ttu.edu/cybersecurity/lubbock/digital-life/digital-identity/scams-spam-
phishing-spoofing-pharming.php
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





