Running head: QUESTIONS1QuestionsNameInstitutionQUESTIONS2QuestionsCase project1-4 what are your layersLayeringLimitingDiversityObscuritySimplicityManage userComputer 1accesshomeprivilegesComputer 2 Patches andworkSecure VPNscurrentupdatesComputer 3 SschoolStrongClean up thepasswordsinactiveaccountsThe multiple layers-hardware and software can prevent the threats from causing anydamage to the computer networks. Also, the layers prevent the threats from spreading if they canmanage to pass through the defenses of one's computers. Among the most malicious programsinclude viruses like Trojan horse and malware as well as the zero-day and the zero hour arracks.The attacks if left unattended they can create threats to unsecured wireless networks as well asthe unsecured networks.In order to improve the security of the home and the work computers, it will be advisableto maintain a list of authorized soft wares that can prevent access to the software that is notQUESTIONS3authorized. In the same regard, it is important to select the critical data from rest of the networkto make sure that other networks appropriately authenticate themselves before they can beaccessed. Another thing will be to make sure that vulnerability security is enhanced, and thatthe network traffic is closely monitored to detect any unusual cases and detect the scenarios ofpossible treats before they can harm the computers. All on the computer at ...
To Order an Original Plagiarism Free Paper on the Same Topic Click Here
Other samples, services and questions:
When you use PaperHelp, you save one valuable — TIME
You can spend it for more important things than paper writing.