Communication Proposal and Presentation Sabrina Hunter ENG/135 August 24, 2015 DR. Franklin Communication Proposal and Presentation Firewall System A firewall is a software that stands between your computer and the internet. Having a properly functioning firewall can stop potential threats affecting your computer, but it can also alert you when a problem is occurring as well. Having a firewall can save you and your business from having to spend extra money to get rid of a virus on your computer or becoming a victim by having your computer being a hack. By having a firewall, it stands between your computer and the internet it serves to block unauthorized request passing through your system. The firewall also serves as a packet filter.
Viruses and Worms Operating system security is at the core of a safe, secure operating system. Our computers are vulnerable to corrupt files, compromised data, and system crashes. There are many attack methods used to uncover your personal information. Two of the methods are viruses and worms. A virus is an executable code usually sent in an e-mail attachment or hidden in audio clip, video clip, or game.
Missouri branch is using Norton Anti-Virus corporate edition, Arc Serve Backup Software. Anti-virus will protect and remove viruses, Trojan horses and worms but to block hackers from getting access to the data, a firewall must be implemented. New Jersey Office/Plant. This branch is also not using a firewall. No firewall can be a disaster for Huffman Trucking because it allows hackers to get in and have access to organization’s valuable information.
Clear the Automatically Manage Paging File Size for All Drives check box. Under Drive Volume Label, click the drive that contains the paging file you want to change. Click Custom Size, enter a new size in megabytes in the Initial Size (MB) or Maximum Size (MB) box, click Set, and then click OK. Windows ready boost can be used to enhance your computers disk caching capabilities as flash drives can be up to ten times faster than accessing regular harddrives. This enables windows vista machines to access cached data on the flash drives rather than the local harddrives. This type of caching is applied to all disk content, not just the page file but the computer's overall performance is boosted.
The Internet: a Clear and Present Danger summary Only a couple of clicks of a mouse can ruin your life. The Internet a seemingly harmless software is full of scams, and graphic video and photos. With a few clicks of the mouse you can give all important information away. Cathleen A. Cleaver wrote this essay entitled The Internet: a clear and Present Danger. In this essay she writes about Children and the internet, pornography and the internet, internet transactions, technology must serve man.
Networked Systems Security Task 1 – THREATS AND IMPACT OF NETWORK THREATS There are many types of threats that can damage your computer either temporarily or permanently. Some threats posed may not threaten your computer right away however have the potential to do so. Some threats that present themselves can include physical threats such as the theft of equipment whether that is the monitor, computer etc. Other threats can be harder to find such as viruses, worms or any kind of malware. Understanding these threats allows the organisation to prevent, protect and correct any damage done to his/her computer to an extent.
Things You'll Need • Antistatic wrist-strap • Screwdriver • Antistatic PC bags • Compressed air • Replacement motherboard • Antistatic mat • Windows installation CD • Windows CD-KEY • Recovery Disks • External Storage Media Instructions 1. o 1 Back up your system to an external storage media so that you can easily and quickly get your system up and going with the new system board. Also create a set of recovery DVDs or CDs in case there are any issues with the external storage device. o 2 Place your windows install CD/ DVD into your optical drive. It will be needed later. Shut down your computer and remove all external plugs, wires and cables.
Quiz Submissions - Exam Studying 1 / 1 point Being ________ means being familiar enough with computers that you understand their capabilities and limitations. 1) computer savvy 2) technology literate 3) computer literate 4) computer competent Question 2 Unwanted e-mail is called ________. 1 / 1 point 1) spam 2) spyware 3) adware 4) software Question 3 1) avoiding hackers and viruses 2) protecting your privacy 3) being able to build a computer 4) using the Internet wisely Question 4 1) Computer forensics 2) Database mining 3) RFID 4) Information technology Question 5 1) data mining 2) data searching 3) data warehousing 4) data retrieval Question 6 0 / 1 point ________ is a wearable device that hangs around your neck consisting of
This password is stored in _______. BIOS CMOS RAM* DDR RAM the CPU 8. (TCO 3) The term form factor in regards to a motherboard refers to the ______ layout of the components on the board physical logical proposed inverted 9. (TCO 9) When you first purchase a notebook, make sure you have a ____ CD containing the installed OS so you can recover from a failed hard drive development management diagnostic recovery 10. (TCO 9) ____ let you specify which devices are to be loaded on startup for a particular user or set of circumstances Hardware profiles* Folder redirections Briefcase profiles Startup profiles 11.
Which one is the most dangerous to you and society? Some issues with technology are finding reliable sites on the web because anyone can make a website. Also Hacking and identity theft through the internet are the most dangerous in my society. (2 pts) What is your impression of reading books on a device like the Kindle? If given the chance would you download your class textbooks to a Kindle rather than purchasing them in the bookstore?