IT Security in Regular Life: Personal Data, Risks, and Strategies
VerifiedAdded on  2023/02/01
|16
|3270
|36
Report
AI Summary
This report provides a comprehensive overview of IT security in regular life, analyzing the risks associated with the use of mobile phones, laptops, and digital watches. It details the steps for conducting security reviews, the scope of information at risk, and the profitability of these devices. The report identifies potential risks such as data breaches and identity theft, offering insights into how these devices can be exploited. Furthermore, it outlines business continuity plans to mitigate these risks, including asset probability, impact, and incident responses. The methodology used in the report involves data collection and analysis. The report emphasizes the importance of data security and provides strategies for increasing the robustness of the entire system, concluding with recommendations for protecting personal and corporate data.

Running head: IT SECURITY IN REGULAR LIFE
IT SECURITY IN REGULAR LIFE
Name of the Student
Name of the University
Author Note
IT SECURITY IN REGULAR LIFE
Name of the Student
Name of the University
Author Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1
IT SECURITY IN REGULAR LIFE
Table of Contents
Introduction......................................................................................................................................2
Steps for conducting reviews...........................................................................................................2
Scope of Information.......................................................................................................................3
Risk Profitability..............................................................................................................................4
Business continuity plan..................................................................................................................6
Methodology..................................................................................................................................12
Conclusion.....................................................................................................................................13
References......................................................................................................................................14
IT SECURITY IN REGULAR LIFE
Table of Contents
Introduction......................................................................................................................................2
Steps for conducting reviews...........................................................................................................2
Scope of Information.......................................................................................................................3
Risk Profitability..............................................................................................................................4
Business continuity plan..................................................................................................................6
Methodology..................................................................................................................................12
Conclusion.....................................................................................................................................13
References......................................................................................................................................14

2
IT SECURITY IN REGULAR LIFE
Introduction
This report discusses about the overview of the personal situation and the risks that will
be present. This report also discusses about the methodology that will be taken into consideration
as per completion of the project. This report will also discuss about the good and bad aspect that
will be present in the commencement of the review completion. This report will also discuss
about the strategies that must be implemented for increasing the robustness of the entire system.
Steps for conducting reviews
Step 1: Collect data regarding the devices that are used in a regular basis and the vulnerabilities
that they possess
Step 2: Analyse the collected data
Step 3: Perform the review report.
The steps that are used in conducting the survey includes setting up of a random sampled
population and this is one of the major reason that better understanding of the entire system. A
set of questionnaire is prepared. After preparing of the set of questions the survey process starts.
The randomly selected sample population is made to answer the set questions. After the sample
population answers the question set, analysing of the answer set will be performed. After
analysing of the answers proper understanding of the viewpoint of the employees can be
detected. After the process completion of the data collection, storing and the analysis stage this
survey can be completed.
IT SECURITY IN REGULAR LIFE
Introduction
This report discusses about the overview of the personal situation and the risks that will
be present. This report also discusses about the methodology that will be taken into consideration
as per completion of the project. This report will also discuss about the good and bad aspect that
will be present in the commencement of the review completion. This report will also discuss
about the strategies that must be implemented for increasing the robustness of the entire system.
Steps for conducting reviews
Step 1: Collect data regarding the devices that are used in a regular basis and the vulnerabilities
that they possess
Step 2: Analyse the collected data
Step 3: Perform the review report.
The steps that are used in conducting the survey includes setting up of a random sampled
population and this is one of the major reason that better understanding of the entire system. A
set of questionnaire is prepared. After preparing of the set of questions the survey process starts.
The randomly selected sample population is made to answer the set questions. After the sample
population answers the question set, analysing of the answer set will be performed. After
analysing of the answers proper understanding of the viewpoint of the employees can be
detected. After the process completion of the data collection, storing and the analysis stage this
survey can be completed.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3
IT SECURITY IN REGULAR LIFE
Scope of Information
a. The relevant information resources that are used in daily life includes the usage of mobiles,
laptops and digital watch. These systems are used by every personnel for commencing their
regular day to day life. This is one of the major aspect that will provide better understanding of
the entire processing system. These systems are generally used for communicating in between
different personnel and transact data. Storage of important data is also one of the major aspect
that is performed by these appliances. Tracking of individuals is also performed with the help of
these appliances.
b. The data that are stored in the mobiles are one of the most important data that enhances the
functional process of each and every person in individual basis. Standard messages are the most
important aspect that will be accessed by the imposters after the mobile phone gets stolen. This is
one of the major aspect that processing of their data breaching gets benefitted. From accessing
the standard messages, understanding the banking details gets easier. In today’s society, each and
every functional process of banking process is provided in the textual format in the message
section. Textual mini statements of banking accounts are provided in a daily basis (Burbules
2018). This will help the imposters to estimate the amount of money that is present in the bank
account of the victim. Another aspect that is taken into consideration and acts most decisive in
the data breaching process is that in most of the mail ids are logged in. This leads to the fact that
gaining access to the mails. This gaining access to the mails will lead to gaining access to bank
details. The main aspect that must be considered is that the passwords of the other application
once access to the mail id is gained (Kellett 2016). The imposter can change the log in password
for the other interlinked applications. This is one of the main reason that it will get easier for the
imposter for stealing identities.
IT SECURITY IN REGULAR LIFE
Scope of Information
a. The relevant information resources that are used in daily life includes the usage of mobiles,
laptops and digital watch. These systems are used by every personnel for commencing their
regular day to day life. This is one of the major aspect that will provide better understanding of
the entire processing system. These systems are generally used for communicating in between
different personnel and transact data. Storage of important data is also one of the major aspect
that is performed by these appliances. Tracking of individuals is also performed with the help of
these appliances.
b. The data that are stored in the mobiles are one of the most important data that enhances the
functional process of each and every person in individual basis. Standard messages are the most
important aspect that will be accessed by the imposters after the mobile phone gets stolen. This is
one of the major aspect that processing of their data breaching gets benefitted. From accessing
the standard messages, understanding the banking details gets easier. In today’s society, each and
every functional process of banking process is provided in the textual format in the message
section. Textual mini statements of banking accounts are provided in a daily basis (Burbules
2018). This will help the imposters to estimate the amount of money that is present in the bank
account of the victim. Another aspect that is taken into consideration and acts most decisive in
the data breaching process is that in most of the mail ids are logged in. This leads to the fact that
gaining access to the mails. This gaining access to the mails will lead to gaining access to bank
details. The main aspect that must be considered is that the passwords of the other application
once access to the mail id is gained (Kellett 2016). The imposter can change the log in password
for the other interlinked applications. This is one of the main reason that it will get easier for the
imposter for stealing identities.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4
IT SECURITY IN REGULAR LIFE
Data that are stored in the laptops includes personal details of the victim. Identity of the
victims can be fetched with the help of the unauthorized access to the data. Corporative task
related data are stored in the database of the laptop. Gaining access to the laptop will affect the
professional life of the victim. The main aspect that will be considered includes unauthorized
accessing of the data that are generated and are made to be kept secured (Nambisan 2017). This
is one of the major reason that the data regarding the corporate sources are hampered and hence
the major aspect that is taken into consideration is that both the victim and the organization he is
working in will get hampered.
Digital watches provide data regarding the destination where the victim was travelling as
well as the starting location of the victim is also stated after analysing of the data that are stored
in the database. Tracking of the call records can also be performed after gaining access to the
digital watches. After gaining access to the digital watch another major aspect that is considered
includes the fact that the proper understanding of the diseases the victim is having will get
known to the imposter.
These are the data that are gained after the getting access to the devices as these systems
will incur better management of the data segmentation process. Hence keeping the devices safe
is one of the major reason.
Risk Profitability
Risk Profitability of the devices are as follows: -
ï‚· Mobiles
Profitability: Profits of using the mobile devices are very high. This is one of the main reason
that the processing of the regular day to day process gets enhanced. Due to the high iomportance
IT SECURITY IN REGULAR LIFE
Data that are stored in the laptops includes personal details of the victim. Identity of the
victims can be fetched with the help of the unauthorized access to the data. Corporative task
related data are stored in the database of the laptop. Gaining access to the laptop will affect the
professional life of the victim. The main aspect that will be considered includes unauthorized
accessing of the data that are generated and are made to be kept secured (Nambisan 2017). This
is one of the major reason that the data regarding the corporate sources are hampered and hence
the major aspect that is taken into consideration is that both the victim and the organization he is
working in will get hampered.
Digital watches provide data regarding the destination where the victim was travelling as
well as the starting location of the victim is also stated after analysing of the data that are stored
in the database. Tracking of the call records can also be performed after gaining access to the
digital watches. After gaining access to the digital watch another major aspect that is considered
includes the fact that the proper understanding of the diseases the victim is having will get
known to the imposter.
These are the data that are gained after the getting access to the devices as these systems
will incur better management of the data segmentation process. Hence keeping the devices safe
is one of the major reason.
Risk Profitability
Risk Profitability of the devices are as follows: -
ï‚· Mobiles
Profitability: Profits of using the mobile devices are very high. This is one of the main reason
that the processing of the regular day to day process gets enhanced. Due to the high iomportance

5
IT SECURITY IN REGULAR LIFE
of the system the acceptance of the product has been really high. Communication process is the
sector that is benefitted. Despite such high profit of using mobile phones disadvantages are also
present. These disadvantages are mainly concerned with the data breaching process
Risks: Data breaching is one of the major risk that is present in the commencing of the regular
day to day task completion processes. This presence of risk has been affecting the daily usage of
the device. Due to presence of data breaching, in case the mobile gets lost and an imposters
received and hence the major aspect that is present is that the imposter can use the data and
hence the management of the project will get affected (O'Meara 2017). Personalized data
regarding banking sectors will get affected and hence identity stealing can be performed. This
will affect the victim in a major way as this will affect the functioning process of the regular day
to day functioning of the individual who lost their mobiles. Banking details will be at stake. This
is one of the major aspect that will act as a major concern. Despite the risk that is present,
profitability of the mobile phones has been really high hence the acceptability of the product is
high as well.
ï‚· Laptops
Profitability: Profitability of laptops has been really high. The main aspect that is taken into
consideration includes the fact that laptops are generally used for completion of works that are
concerned with corporate proceedings. These are the main reasons that the profitability of the
laptops have been really high (Srivastava et al, 2019). Laptops are also used for storing and
analysing of data that are gained after completion of a process. These set of data that are
collected are mainly required in completion of the entire data system.
IT SECURITY IN REGULAR LIFE
of the system the acceptance of the product has been really high. Communication process is the
sector that is benefitted. Despite such high profit of using mobile phones disadvantages are also
present. These disadvantages are mainly concerned with the data breaching process
Risks: Data breaching is one of the major risk that is present in the commencing of the regular
day to day task completion processes. This presence of risk has been affecting the daily usage of
the device. Due to presence of data breaching, in case the mobile gets lost and an imposters
received and hence the major aspect that is present is that the imposter can use the data and
hence the management of the project will get affected (O'Meara 2017). Personalized data
regarding banking sectors will get affected and hence identity stealing can be performed. This
will affect the victim in a major way as this will affect the functioning process of the regular day
to day functioning of the individual who lost their mobiles. Banking details will be at stake. This
is one of the major aspect that will act as a major concern. Despite the risk that is present,
profitability of the mobile phones has been really high hence the acceptability of the product is
high as well.
ï‚· Laptops
Profitability: Profitability of laptops has been really high. The main aspect that is taken into
consideration includes the fact that laptops are generally used for completion of works that are
concerned with corporate proceedings. These are the main reasons that the profitability of the
laptops have been really high (Srivastava et al, 2019). Laptops are also used for storing and
analysing of data that are gained after completion of a process. These set of data that are
collected are mainly required in completion of the entire data system.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6
IT SECURITY IN REGULAR LIFE
Risks: In case the laptops get lost the main issue that is present is that the data can be fetched in
Illegal manner and this is one of the main aspect that will affect the victims. Data breaching of
the laptop based data will be harming the individual as well as the business organization he or
she is working for. This is a major risk that is present in the usage of laptops. Another issue that
is present in the scenario includes gaining access to the data of the security system and hence the
data that will help the imposters in steal identity of the victim and act on behalf of the victim.
ï‚· Digital Watch
Profitability: profitability of the using a digital watch is high. The main concern that is present
includes proper tracking of the displacement process of the individual using the digital watch.
The main aspect that must be taken into consideration includes the fact that the health related
issues can also be tested and hence better understanding of the entire scenario can be performed.
Data will be collected and the processing of the same cans be performed (Kizza 2015). This will
help the user in keeping a track of their basic diseases like cholesterol and blood pressure that
they are having. Tracking of location can also be treated as a major aspect of data handling
process.
Risk: The major risk that is present in the usage of the digital watches is that tracking of the user
of the watch gets real easy and hence the user can be harmed. With collected personalized data
the main aspect that is present is that the user of the digital watch will get affected in a negative
manner and hence privacy of the digital watch will be at stake in case the digital watch gets lost.
Business continuity plan
Asset Probability Impact Incident
Tolerance
Incident
Reponses
Business
Continuity
Disaster
recovery
IT SECURITY IN REGULAR LIFE
Risks: In case the laptops get lost the main issue that is present is that the data can be fetched in
Illegal manner and this is one of the main aspect that will affect the victims. Data breaching of
the laptop based data will be harming the individual as well as the business organization he or
she is working for. This is a major risk that is present in the usage of laptops. Another issue that
is present in the scenario includes gaining access to the data of the security system and hence the
data that will help the imposters in steal identity of the victim and act on behalf of the victim.
ï‚· Digital Watch
Profitability: profitability of the using a digital watch is high. The main concern that is present
includes proper tracking of the displacement process of the individual using the digital watch.
The main aspect that must be taken into consideration includes the fact that the health related
issues can also be tested and hence better understanding of the entire scenario can be performed.
Data will be collected and the processing of the same cans be performed (Kizza 2015). This will
help the user in keeping a track of their basic diseases like cholesterol and blood pressure that
they are having. Tracking of location can also be treated as a major aspect of data handling
process.
Risk: The major risk that is present in the usage of the digital watches is that tracking of the user
of the watch gets real easy and hence the user can be harmed. With collected personalized data
the main aspect that is present is that the user of the digital watch will get affected in a negative
manner and hence privacy of the digital watch will be at stake in case the digital watch gets lost.
Business continuity plan
Asset Probability Impact Incident
Tolerance
Incident
Reponses
Business
Continuity
Disaster
recovery
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
IT SECURITY IN REGULAR LIFE
Plan
Mobile High High The incident
tolerance
methods that
must be
implemented
includes
setting of
password in
the system
which will
prevent the
imposters
from gaining
data from the
mobiles.
The
incident
tolerance
that is to be
performed
includes
informing
the police
department
regarding
the loosing
or stealing
of the
mobile. The
bank
accounts
must be
blocked in
urgent
basis. Mail
passwords
Downloadin
g the
backup files
that are
present in
the google
drive will
be acting
helpful in
performing
business
continuity.
The data
that are
lost must
be
regained
from the
google
drive and
after the
same the
data can
be restored
in another
device and
the entire
task can
be
resumed
IT SECURITY IN REGULAR LIFE
Plan
Mobile High High The incident
tolerance
methods that
must be
implemented
includes
setting of
password in
the system
which will
prevent the
imposters
from gaining
data from the
mobiles.
The
incident
tolerance
that is to be
performed
includes
informing
the police
department
regarding
the loosing
or stealing
of the
mobile. The
bank
accounts
must be
blocked in
urgent
basis. Mail
passwords
Downloadin
g the
backup files
that are
present in
the google
drive will
be acting
helpful in
performing
business
continuity.
The data
that are
lost must
be
regained
from the
drive and
after the
same the
data can
be restored
in another
device and
the entire
task can
be
resumed

8
IT SECURITY IN REGULAR LIFE
must be
changed in
urgent
basis. This
will help in
recovering
from the
loss or
decrease the
extent of
loss after
losing the
mobile
Laptop Low High Data that will
be stored in
the memory
of the laptop
must be
protected
with high
standard
biometric
After the
laptop is
stolen the
most
important
aspect that
must be
taken into
consideratio
Retaining
data from
the official
portal will
help the
victim to
resume his
or her task.
This is one
Retaining
of the data
from the
google
drive can
be useful
(Hossain,
Fotouhi
and Hasan
IT SECURITY IN REGULAR LIFE
must be
changed in
urgent
basis. This
will help in
recovering
from the
loss or
decrease the
extent of
loss after
losing the
mobile
Laptop Low High Data that will
be stored in
the memory
of the laptop
must be
protected
with high
standard
biometric
After the
laptop is
stolen the
most
important
aspect that
must be
taken into
consideratio
Retaining
data from
the official
portal will
help the
victim to
resume his
or her task.
This is one
Retaining
of the data
from the
drive can
be useful
(Hossain,
Fotouhi
and Hasan
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9
IT SECURITY IN REGULAR LIFE
security
integration.
Usage of
retina scan
for getting
into the
database of
the laptop
can be used
(Yang et al,
2015). Usage
of password
can also be
performed as
usage of
password will
ensure that
the functional
process will
get more
robust and
even after
stealing the
n as the
laptop
brand must
be informed
regarding
the laptop
getting
stolen. After
informing
the laptop
manufacturi
ng brand IP
address
tracing can
be
performed
(Karthick
and Binu
2017). This
will help in
tracking of
the laptop
location and
of the major
way that
will help the
business to
get resume
and
continue
their regular
tasks.
2015).
Gaining
data from
the hard
disk will
ensure the
fact that
the data
can be
fetched
back and
hence data
can be
gained ad
hence task
can be
resumed
IT SECURITY IN REGULAR LIFE
security
integration.
Usage of
retina scan
for getting
into the
database of
the laptop
can be used
(Yang et al,
2015). Usage
of password
can also be
performed as
usage of
password will
ensure that
the functional
process will
get more
robust and
even after
stealing the
n as the
laptop
brand must
be informed
regarding
the laptop
getting
stolen. After
informing
the laptop
manufacturi
ng brand IP
address
tracing can
be
performed
(Karthick
and Binu
2017). This
will help in
tracking of
the laptop
location and
of the major
way that
will help the
business to
get resume
and
continue
their regular
tasks.
2015).
Gaining
data from
the hard
disk will
ensure the
fact that
the data
can be
fetched
back and
hence data
can be
gained ad
hence task
can be
resumed
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10
IT SECURITY IN REGULAR LIFE
laptop they
will not gain
access to the
data that are
stored In the
database.
hence
getting back
the laptop
will get
easier and
in that case
the memory
system of
the laptop
will be
blocked and
hence the
data that is
stored will
stay safe.
Digital
Watches
High Low Tracking of
data must be
blocked and
hence the
main aspect
that is taken
into
Informing
the police
regarding
the loosing
of the watch
must be
performed
Syncing the
data with
mail will
help in
gaining
access to
the data
Syncing
data with
personal
mail will
act
beneficial.
IT SECURITY IN REGULAR LIFE
laptop they
will not gain
access to the
data that are
stored In the
database.
hence
getting back
the laptop
will get
easier and
in that case
the memory
system of
the laptop
will be
blocked and
hence the
data that is
stored will
stay safe.
Digital
Watches
High Low Tracking of
data must be
blocked and
hence the
main aspect
that is taken
into
Informing
the police
regarding
the loosing
of the watch
must be
performed
Syncing the
data with
mail will
help in
gaining
access to
the data
Syncing
data with
personal
mail will
act
beneficial.

11
IT SECURITY IN REGULAR LIFE
consideration
includes
prohibiting
the data
getting stored
in the google
database.
(Gupta,
Yamaguchi
and
Agrawal
2018). The
brand of the
watch must
also be
informed.
This is one
of the main
reason that
the IP
address can
be tracked
and the
watch can
be regained.
from the
newly
bought
digital
watch.
3. The evidences are mainly gathered from the internet sources and survey conduction is also
made. This leads to the fact that better understanding of the system can be performed. The data
that are gathered from the survey conduction cats as the main evidence (Alrawais et al, 2017).
Risk Assessment test was performed as the testing process. The basic changes that are needed to
IT SECURITY IN REGULAR LIFE
consideration
includes
prohibiting
the data
getting stored
in the google
database.
(Gupta,
Yamaguchi
and
Agrawal
2018). The
brand of the
watch must
also be
informed.
This is one
of the main
reason that
the IP
address can
be tracked
and the
watch can
be regained.
from the
newly
bought
digital
watch.
3. The evidences are mainly gathered from the internet sources and survey conduction is also
made. This leads to the fact that better understanding of the system can be performed. The data
that are gathered from the survey conduction cats as the main evidence (Alrawais et al, 2017).
Risk Assessment test was performed as the testing process. The basic changes that are needed to
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 16
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.