ITS 230 Ė MD5

P. 38 T/F and matching

T/F

1.      F

2.      F

3.      T

4.      T

5.      T

6.      T

7.      F

8.      F

9.      F

10.   T

11.   T

12.   T

Matching

 

1.      I.

2.      C.

3.      D.

4.      E.

5.      F.

 

6.      G.

7.      B.

8.      H.

9.      J.

10.   A.

 

P. 39 Problem solving

2. After youíve been scammed you should check your credit and make sure nothing is being added on to your credit history that isnít legitimate. If you gave away credit card info, then they should be renewed and reported to your banking institution. It all depends on what information was given away and if they canít obtain more using that information.

8. Ask someone who would be familiar with creating or administrating creating the policy. If you cannot find who that is then just ask anyone who has authority and may be punishing anyone who violated the policy. Or bring it up in a meeting that it isnít clear if that is a possibility.

4. Open your antivirus software and run any updates.

3. More than likely malware or adware was added and possibly a virus. Antivirus/antimalware software should be run to discover the file and have it be quarantined or removed.

9. update the phone number or most of these two-step verifications just ask you to enter a phone number to use. If you still canít then sometimes thereís an email option as a back up or possibly a security question that you would have set up earlier.

 

P. 42-43 Internet research

5. †White Hat Security and Proofpoint are the two security as a service provider that I looked at. Proofpoint focuses on email protection which is definitely something that a business would more likely be worried about than any individual since most people have had practice . It says it gives 100% virus protection and 99.99% of spam being blocked. This would definitely be more useful for a business since you donít really know how well employees will be when using their email. Preventing computers from being damaged or infected would be something a business would need to consider preserving assets. The other is White Hat Security which provides protection for digital assets such as a website or an app. This is something most individuals donít even own so clearly this is more for a business since a good percentage of businesses will have some sort of digital asset be it a facebook account, website, application, and many others.