Digital Security Guide: Cybersecurity for the Workplace

Verified

Added on  2020/04/15

|6
|1031
|80
Report
AI Summary
This digital security guide provides a comprehensive overview of essential cybersecurity practices for employees. It emphasizes the importance of strong passwords, avoiding untrustworthy websites, and recognizing common online threats such as spam, phishing, spoofing, and pharming. The guide also covers password managers, network security measures like antivirus software and firewalls, and the use of encryption to protect sensitive information. Furthermore, it delves into denial-of-service attacks and provides insights into cloud computing, including best practices for secure implementation and data management. The guide references reputable sources to support its recommendations, making it a valuable resource for promoting a secure digital environment within a workplace setting.
Document Page
qwertyuiopasdfghjklzxcvbnmqwertyui
opasdfghjklzxcvbnmqwertyuiopasdfgh
jklzxcvbnmqwertyuiopasdfghjklzxcvb
nmqwertyuiopasdfghjklzxcvbnmqwer
tyuiopasdfghjklzxcvbnmqwertyuiopas
dfghjklzxcvbnmqwertyuiopasdfghjklzx
cvbnmqwertyuiopasdfghjklzxcvbnmq
wertyuiopasdfghjklzxcvbnmqwertyuio
pasdfghjklzxcvbnmqwertyuiopasdfghj
Digital Tools
Digital Security Guide
23-Nov-17
(Student Details: )
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
DIGITAL TOOLS 2
Digital Security Guide
The world is becoming smaller day by day due to the growing interconnectivity between
different parts of the world. This is all because of internet. However, even though there are lot of
benefits of internet at the present day, it does prove as a major threat at the present age. Thus,
this digital security guide has been created for the employees.
Passwords
It is crucial that the passwords created by the employees are effective and secure. In this
matter, there is a need for the password to be alphanumeric with symbols as such passwords
cannot be hacked. Also, the individuals should refrain from using their date of births as
passwords as these are easily cracked (Nahari & Krutz, 2017).
Credibility of Website
Such websites should be avoided which are not secured and this can be inferred from the
green or red mark in the box where the URL of a website is written. Also, the websites which
have proper trademarks, and are active are credible, and the ones like Wikipedia or the blogs are
not deemed as credible websites as the matter on these sites can be altered by anyone (Nahari &
Krutz, 2017).
Some key terms
Spams are the unsolicited messages which can be easily spotted and can damage the
system on which the same is opened or is responded from. Phishing are the emails sent by
internet criminal which are disguised as email from trustworthy or legitimate source. The
Document Page
DIGITAL TOOLS 3
purpose is to lure the person in revealing confidential information. Spoofing refers to the
criminals who impersonate other organizations or individuals for getting confidential
information. Pharming refers to malicious websites which seem to be legitimate ones. It is
advised to employees to stay away from such and where they doubt the authenticity of any
communication, they should refrain from opening them (Texas Tech University, 2017).
Password managers
Password manager helps in generating and also in retrieving the complex passwords,
particularly the ones in encrypted database. The advantages include the capacity of being easily
incorporated in the softwares, no need of extensive modifications in computers and users being
familiar with use of passwords. However, these are vulnerable, and can be blocked which make
them useless (Nahari & Krutz, 2017).
Example of secure network
Examples of network security include antivirus and antimalware softwares, application
security, firewalls and network segmentation (Cisco, 2017).
Encryption
Encryption refers to the process whereby messages or information are encoded in such a
manner that they can only be accessed by authorized parties. It does not prevent interferences
and instead denies the important content to a possible interceptor. When it comes to encryption,
there is a need for a successful encryption strategy to be used by the employees (O'Leary,
Nelson, Green & Grahn, 2017). The employees are also required to ensure that the encryption
Document Page
DIGITAL TOOLS 4
key is not provided to any third party, as the same can be used to gaining an access to the
encrypted network.
Denial of Service attack
Denial of service attack is a kind of cyber attack in which the perpetrator attempts to
make the network resource or a machine unavailable to the user of such device or resource in
either temporary or indefinite manner of the host. It typically floods the servers, networks or
systems with traffic in order to overwhelm the system of the victim and make it inaccessible. The
employees should keep a lookout for such attacks and any suspicion of the same should be raised
immediately. They should deploy the defence techniques in advance to save from such incidents,
which includes firewalls and IPS based prevention (Nahari & Krutz, 2017).
Cloud computing
Cloud computing refers to the information technology paradigm through which the
omnipresent access to the shared pools of high level services and configurable system resources
is enabled particularly the one which can be provisioned with minimalistic efforts over the
internet. It is the general term which is used to refer to the delivery of hosted services on internet.
In third party clouds, the companies are able to focus on their main business instead of having to
expend their resources on infrastructure and maintenance of computers. The employees can share
the resources for attaining economies of scale and coherence. It allows the employees to access
information across different locations and devices (Davidi, 2013).
Best practices in cloud computing
The best practices in cloud computing includes the following:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
DIGITAL TOOLS 5
Creating a strategy and set of objectives before hand, so that a long term cloud strategy is
articulated which relates to the overall business.
Learning from the mistakes of others
Avoiding upfront costs
Being serious autonomy
Addressing security concerns
Ensuring availability and performance of data (ESJ, 2009).
Document Page
DIGITAL TOOLS 6
References
Cisco. (2017). What Is Network Security? Retrieved from:
https://www.cisco.com/c/en/us/products/security/what-is-network-security.html
Davidi, A. (2013). How is cloud computing enhancing our ability to work anywhere? Retrieved
from: https://www.theguardian.com/media-network/media-network-blog/2013/dec/18/
cloud-enhancing-work-anywhere-flexible
ESJ. (2009). Seven Best Practices for Cloud Computing. Retrieved from:
https://esj.com/Articles/2009/08/18/Cloud-Best-Practices.aspx?Page=2
Nahari, H., & Krutz, R. L. (2011). Web commerce security: design and development. West
Sussex: John Wiley & Sons.
O'Leary, D., Nelson, J., Green, P., & Grahn, A. (2017). 7 Key Elements of a Successful
Encryption Strategy. Retrieved from: http://focus.forsythe.com/articles/364/7-Key-
Elements-of-a-Successful-Encryption-Strategy
Texas Tech University. (2017). Scams – Spam, Phishing, Spoofing and Pharming. Retrieved
from: https://www.ttu.edu/cybersecurity/lubbock/digital-life/digital-identity/scams-spam-
phishing-spoofing-pharming.php
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]