Discuss at least one of the topics. Respond to another student’s post. Do not repeat what someone else has already stated. A professional dialogue, including references, is expected. Use your own words and research. All spelling and grammar must be correct. All posts must contain between five and ten sentences of useful information. “I agree,” and repeating another student’s words does not qualify as “useful”. No AI-generated material is allowed.
Topic:
- Online Gaming Safety: Your friends computer had a virus recently, which was traced back to a malware-infected website. Your friend tells you about visiting the website after following a link while playing the game. What risks are involved when playing online games, and how can you lower those risks?
Post 1 (MB) First, I will tell my friend to research the developer next time to be certain the game and updates are legit. The risks of playing online games are hidden malware in downloads, viruses, and worms (Hayes, 2008). Keeping the game up to date protects gamers from attackers who exploit weaknesses in older versions. With a hardware or software firewall, gamers can protect themselves from the same attackers. In addition to a firewall, gamers (my friend in this scenario) should maintain virus protection software from a credible company. Just these few steps alone can help make online gaming safe.
Hayes, E. (2008). Playing it Safe: Avoiding Online Gaming Risks. Topic: Post 2 (SO) If I were to be assigned a project like this, I would try my hardest to make sure the information helps prepare others. This training program teaches malware prevention with easy and strong habits to learn. I would help employees understand safe browsing and how to connect only to secured networks. Using strong authentication gives safer access and protects important accounts. Its also important to learn that the other ways we access the web, like our mobile devices, need regular updates to the software. These simple habits can make a big difference in keeping everyone safe online.
Security, H. (2023, September 11). *Train employees on malware prevention: Hook Security.* Topic: Using the format provided in the text, design an incident response plan for your home computer. Include actions to be taken if ONE of the following events occur: What other scenarios do you think are important to plan for? Post 3( MF) Home Computer Incident Response Plan: ISP Failure As far home computer, an ISP failure would mean losing internet access for school, communication, and other online tasks. I’m used to online gaming, so I absolutely despise whenever this happens, anyway, I always check to see if my bill is overdue, I check if my other devices like my TV, phone, and tablets. I always check my router first because kid is always playing near it to make sure, he did not unplug on accident, or I just look for lights on the modem are on further access the situation If it is an outage, I would stop any important online activities to avoid losing work or data. I would restart my modem and router to make sure the problem is not on my end and check my ISPs website for updates. Once service is restored, I would test the connection and back up important files. Having a simple response plan helps reduce stress and protect my information. Reference National Institute of Standards and Technology. (2018). Computer security incident handling guide (SP 800-61 Rev. 2). Post 4 (NO) Incident Response Plan (Burst Water Pipe) To prevent data loss, regularly backup important files to a secure cloud service or external hard drive. Keep the computer elevated and off of the floor to reduce water exposure. Use surge protectors and waterproof covers to minimize damage. If the pipe has burst, assess whether water has come into contact or nearby electrical components. Check for visible water intrusion, moisture under device, or electrical shorting. When the pipe bursts, shut off the water valve immediately to stop further flooding. Also, turn off the circuit breaker to prevent electrical hazards. Disconnect the computer from all power sources. Do not power on computer if it has been exposed to water. Carefully dry the exterior and allow it to dry for 24 to 48 hours. If need be, consult with a repair technician before attempting to restart computer. After the home computer is fully inspected and is deemed safe, power it on and restore any corrupted files using backups. Monitor the system for unusual performance issues. Determine the cause of the burst pipe, and repair or replace faulty plumbing. Consider relocating the computer to a safer location away from water sources. Try more preventative measures such as leak detectors or waterproof storage solutions. Other scenarios that would be important to prepare for are: ransomware attack, data leak, phishing, identity theft, hardware failure, and lost or stolen device.
Requirements: 4 paragraphs

Leave a Reply
You must be logged in to post a comment.