SlideShare a Scribd company logo
1 of 1
The head of the IT security department expressed her concerns
about series of data breaches that occurred in the company and
mentioned that many employees ignored their system security
warnings.
You have been asked to provide a summary of information to
the entire team about data breaches and suggest proactive and
preventative measures for warding off viruses. Your
presentation will be sent out to all company employees, so the
information must be clear, concise, and informative.
To prepare your presentation,
use
your personal computer to perform the following tasks:
Identify whether you have an anti-virus software running on
your machine and from which company.
Identify if a firewall is enabled on your machine and if you
need Windows
®
firewall running in addition, if that anti-virus software is
installed on your machine.
Include
the following in your summary:
Definition of a data breach
Ways to determine if your system was infected with a virus
At least three preventive measures against data breaches, both
physical or digital
Instructions on locating anti-virus and firewall software
Instructions on what to do if a virus has infected your computer
Infographic or visual diagram delivered as a PDF.

More Related Content

Similar to The head of the IT security department expressed her concerns about .docx

Maranan chap2 lab2
Maranan chap2 lab2Maranan chap2 lab2
Maranan chap2 lab2
maranan_zyra
 
Agree or disagree SMBs deal with various types of informatio.docx
Agree or disagree SMBs deal with various types of informatio.docxAgree or disagree SMBs deal with various types of informatio.docx
Agree or disagree SMBs deal with various types of informatio.docx
simonlbentley59018
 
Cataluña antivirus programs paper
Cataluña antivirus programs paperCataluña antivirus programs paper
Cataluña antivirus programs paper
Jennifer Cataluña
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
kent neri
 

Similar to The head of the IT security department expressed her concerns about .docx (20)

A practical guide to IT security-Up to University project
A practical guide to IT security-Up to University projectA practical guide to IT security-Up to University project
A practical guide to IT security-Up to University project
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
 
Maranan chap2 lab2
Maranan chap2 lab2Maranan chap2 lab2
Maranan chap2 lab2
 
NCSC_SBG_Actions.pdf
NCSC_SBG_Actions.pdfNCSC_SBG_Actions.pdf
NCSC_SBG_Actions.pdf
 
Agree or disagree SMBs deal with various types of informatio.docx
Agree or disagree SMBs deal with various types of informatio.docxAgree or disagree SMBs deal with various types of informatio.docx
Agree or disagree SMBs deal with various types of informatio.docx
 
JASM Flyer
JASM FlyerJASM Flyer
JASM Flyer
 
Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security Magazine
 
Information Security Seminar
Information Security SeminarInformation Security Seminar
Information Security Seminar
 
Cataluña antivirus programs paper
Cataluña antivirus programs paperCataluña antivirus programs paper
Cataluña antivirus programs paper
 
Cataluña antivirus program
Cataluña antivirus programCataluña antivirus program
Cataluña antivirus program
 
Hamilton lara 2011
Hamilton lara 2011Hamilton lara 2011
Hamilton lara 2011
 
Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...
Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...
Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...
 
CoreSecurity
CoreSecurityCoreSecurity
CoreSecurity
 
The 10 Commandments of Computer Security
The 10 Commandments of Computer SecurityThe 10 Commandments of Computer Security
The 10 Commandments of Computer Security
 
Mjtanasas
MjtanasasMjtanasas
Mjtanasas
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
 
How Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfHow Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersafety basics
Cybersafety basicsCybersafety basics
Cybersafety basics
 
Mjtanasas1
Mjtanasas1Mjtanasas1
Mjtanasas1
 

More from armitageclaire49

Apply Information System Auditing AssignmentResearch an art.docx
Apply Information System Auditing AssignmentResearch an art.docxApply Information System Auditing AssignmentResearch an art.docx
Apply Information System Auditing AssignmentResearch an art.docx
armitageclaire49
 
Apply Development PlanCreate a 700- to 1,050-word development.docx
Apply Development PlanCreate a 700- to 1,050-word development.docxApply Development PlanCreate a 700- to 1,050-word development.docx
Apply Development PlanCreate a 700- to 1,050-word development.docx
armitageclaire49
 
Applied Numerical Methodswith MATLAB® for Engineers and .docx
Applied Numerical Methodswith MATLAB® for Engineers and .docxApplied Numerical Methodswith MATLAB® for Engineers and .docx
Applied Numerical Methodswith MATLAB® for Engineers and .docx
armitageclaire49
 
Applied LearningPsychology is an interesting field of study be.docx
Applied LearningPsychology is an interesting field of study be.docxApplied LearningPsychology is an interesting field of study be.docx
Applied LearningPsychology is an interesting field of study be.docx
armitageclaire49
 
applied sciencesReviewA State-of-the-Art Review of .docx
applied  sciencesReviewA State-of-the-Art Review of .docxapplied  sciencesReviewA State-of-the-Art Review of .docx
applied sciencesReviewA State-of-the-Art Review of .docx
armitageclaire49
 
Applications of Epidemiology – A Case Study The situation at Goo.docx
Applications of Epidemiology – A Case Study The situation at Goo.docxApplications of Epidemiology – A Case Study The situation at Goo.docx
Applications of Epidemiology – A Case Study The situation at Goo.docx
armitageclaire49
 
ApplicationFederal Statutes and the Impact of Legislative Bills.docx
ApplicationFederal Statutes and the Impact of Legislative Bills.docxApplicationFederal Statutes and the Impact of Legislative Bills.docx
ApplicationFederal Statutes and the Impact of Legislative Bills.docx
armitageclaire49
 
ApplicationFederal Statutes and the Impact of Legislative B.docx
ApplicationFederal Statutes and the Impact of Legislative B.docxApplicationFederal Statutes and the Impact of Legislative B.docx
ApplicationFederal Statutes and the Impact of Legislative B.docx
armitageclaire49
 
Application Topics The APPLICATION PROJECT OPTIONS from which yo.docx
Application Topics The APPLICATION PROJECT OPTIONS from which yo.docxApplication Topics The APPLICATION PROJECT OPTIONS from which yo.docx
Application Topics The APPLICATION PROJECT OPTIONS from which yo.docx
armitageclaire49
 
Application Social ClassIn the Discussion, you addressed how .docx
Application Social ClassIn the Discussion, you addressed how .docxApplication Social ClassIn the Discussion, you addressed how .docx
Application Social ClassIn the Discussion, you addressed how .docx
armitageclaire49
 
Application Role and Value of EvaluationThe United Nations, the.docx
Application Role and Value of EvaluationThe United Nations, the.docxApplication Role and Value of EvaluationThe United Nations, the.docx
Application Role and Value of EvaluationThe United Nations, the.docx
armitageclaire49
 
Application of Nursing Theory to Practice What would _(Pla.docx
Application of Nursing Theory to Practice What would _(Pla.docxApplication of Nursing Theory to Practice What would _(Pla.docx
Application of Nursing Theory to Practice What would _(Pla.docx
armitageclaire49
 
Application Paper #4 1.Please pick 1 or 2 of Gardners Intell.docx
Application Paper #4 1.Please pick 1 or 2 of Gardners  Intell.docxApplication Paper #4 1.Please pick 1 or 2 of Gardners  Intell.docx
Application Paper #4 1.Please pick 1 or 2 of Gardners Intell.docx
armitageclaire49
 

More from armitageclaire49 (20)

Apply Information System Auditing AssignmentResearch an art.docx
Apply Information System Auditing AssignmentResearch an art.docxApply Information System Auditing AssignmentResearch an art.docx
Apply Information System Auditing AssignmentResearch an art.docx
 
Apply information from the Aquifer Case Study to answer the followin.docx
Apply information from the Aquifer Case Study to answer the followin.docxApply information from the Aquifer Case Study to answer the followin.docx
Apply information from the Aquifer Case Study to answer the followin.docx
 
Apply Development PlanCreate a 700- to 1,050-word development.docx
Apply Development PlanCreate a 700- to 1,050-word development.docxApply Development PlanCreate a 700- to 1,050-word development.docx
Apply Development PlanCreate a 700- to 1,050-word development.docx
 
Applied TodayMedia—tv, movies booksConcept of PrisonerKe.docx
Applied TodayMedia—tv, movies booksConcept of PrisonerKe.docxApplied TodayMedia—tv, movies booksConcept of PrisonerKe.docx
Applied TodayMedia—tv, movies booksConcept of PrisonerKe.docx
 
Applied Social PsychologyApplied social psychology is a field .docx
Applied Social PsychologyApplied social psychology is a field .docxApplied Social PsychologyApplied social psychology is a field .docx
Applied Social PsychologyApplied social psychology is a field .docx
 
Applied Numerical Methodswith MATLAB® for Engineers and .docx
Applied Numerical Methodswith MATLAB® for Engineers and .docxApplied Numerical Methodswith MATLAB® for Engineers and .docx
Applied Numerical Methodswith MATLAB® for Engineers and .docx
 
Applied LearningPsychology is an interesting field of study be.docx
Applied LearningPsychology is an interesting field of study be.docxApplied LearningPsychology is an interesting field of study be.docx
Applied LearningPsychology is an interesting field of study be.docx
 
Applied Assignment III – write 5 primary goals and their metrics f.docx
Applied Assignment III – write 5 primary goals and their metrics f.docxApplied Assignment III – write 5 primary goals and their metrics f.docx
Applied Assignment III – write 5 primary goals and their metrics f.docx
 
Applied Assignment I – describe the primary business processes, key .docx
Applied Assignment I – describe the primary business processes, key .docxApplied Assignment I – describe the primary business processes, key .docx
Applied Assignment I – describe the primary business processes, key .docx
 
Applied Final ProjectThe Cultural OtherResearch the hist.docx
Applied Final ProjectThe Cultural OtherResearch the hist.docxApplied Final ProjectThe Cultural OtherResearch the hist.docx
Applied Final ProjectThe Cultural OtherResearch the hist.docx
 
applied sciencesReviewA State-of-the-Art Review of .docx
applied  sciencesReviewA State-of-the-Art Review of .docxapplied  sciencesReviewA State-of-the-Art Review of .docx
applied sciencesReviewA State-of-the-Art Review of .docx
 
Applications of Epidemiology – A Case Study The situation at Goo.docx
Applications of Epidemiology – A Case Study The situation at Goo.docxApplications of Epidemiology – A Case Study The situation at Goo.docx
Applications of Epidemiology – A Case Study The situation at Goo.docx
 
ApplicationFederal Statutes and the Impact of Legislative Bills.docx
ApplicationFederal Statutes and the Impact of Legislative Bills.docxApplicationFederal Statutes and the Impact of Legislative Bills.docx
ApplicationFederal Statutes and the Impact of Legislative Bills.docx
 
ApplicationFederal Statutes and the Impact of Legislative B.docx
ApplicationFederal Statutes and the Impact of Legislative B.docxApplicationFederal Statutes and the Impact of Legislative B.docx
ApplicationFederal Statutes and the Impact of Legislative B.docx
 
Application Topics The APPLICATION PROJECT OPTIONS from which yo.docx
Application Topics The APPLICATION PROJECT OPTIONS from which yo.docxApplication Topics The APPLICATION PROJECT OPTIONS from which yo.docx
Application Topics The APPLICATION PROJECT OPTIONS from which yo.docx
 
ApplicationDeveloping Your Professional Philosophy of Teaching .docx
ApplicationDeveloping Your Professional Philosophy of Teaching .docxApplicationDeveloping Your Professional Philosophy of Teaching .docx
ApplicationDeveloping Your Professional Philosophy of Teaching .docx
 
Application Social ClassIn the Discussion, you addressed how .docx
Application Social ClassIn the Discussion, you addressed how .docxApplication Social ClassIn the Discussion, you addressed how .docx
Application Social ClassIn the Discussion, you addressed how .docx
 
Application Role and Value of EvaluationThe United Nations, the.docx
Application Role and Value of EvaluationThe United Nations, the.docxApplication Role and Value of EvaluationThe United Nations, the.docx
Application Role and Value of EvaluationThe United Nations, the.docx
 
Application of Nursing Theory to Practice What would _(Pla.docx
Application of Nursing Theory to Practice What would _(Pla.docxApplication of Nursing Theory to Practice What would _(Pla.docx
Application of Nursing Theory to Practice What would _(Pla.docx
 
Application Paper #4 1.Please pick 1 or 2 of Gardners Intell.docx
Application Paper #4 1.Please pick 1 or 2 of Gardners  Intell.docxApplication Paper #4 1.Please pick 1 or 2 of Gardners  Intell.docx
Application Paper #4 1.Please pick 1 or 2 of Gardners Intell.docx
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Recently uploaded (20)

TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

The head of the IT security department expressed her concerns about .docx

  • 1. The head of the IT security department expressed her concerns about series of data breaches that occurred in the company and mentioned that many employees ignored their system security warnings. You have been asked to provide a summary of information to the entire team about data breaches and suggest proactive and preventative measures for warding off viruses. Your presentation will be sent out to all company employees, so the information must be clear, concise, and informative. To prepare your presentation, use your personal computer to perform the following tasks: Identify whether you have an anti-virus software running on your machine and from which company. Identify if a firewall is enabled on your machine and if you need Windows ® firewall running in addition, if that anti-virus software is installed on your machine. Include the following in your summary: Definition of a data breach Ways to determine if your system was infected with a virus At least three preventive measures against data breaches, both physical or digital Instructions on locating anti-virus and firewall software Instructions on what to do if a virus has infected your computer Infographic or visual diagram delivered as a PDF.