What is your current security posture with regard to your personal devices, computer network, etc?

Put together a personal cybersecurity plan. This plan should include (but is not limited to) the following areas: 1. What is your current security posture with regard to your personal devices, computer network, etc? Why would you want to improve any of these and what are you trying to protect? 2. Preparation and Mapping – Map out your current computer network, any connected devices, any networking appliances (routers, etc.). You can choose to redact any information (such as IP addresses, system names, or details you don’t wish to provide). You can map this visually or describe what is within your network in a written format. Either way — the goal is to make yourself a list of everything you are trying to protect and bring under your umbrella of security. Remember, the first part of this lesson was architecture and understanding what we need to protect. 3. Home Router and/or Appliances — Review the settings for your home router and any other network appliances you mapped. If you’re unfamiliar or need some help understanding these, turn to the instructor, your classmates, or youtube tutorials! Is your router configured securely? Did you learn about any new features? Does your router currently use the default password that came with the manual? When is the last time it has been updated? 4. Password Hygiene and Management — Do you use any password security apps? Do you re-use the same password across multiple accounts? Have you had credentials taken before? (Check https://haveibeenpwned.com/) Review your current password habits, discuss them, and consider whether they are leaving you vulnerable or insecure. 5. Do you have any virus protection, application firewalls, or other defenses against malicious software in place? 6. Do you open suspicious links in emails? Do you inspect the sender in an email to make sure the address matches a valid sender? What other security practices might you consider adding or implementing? What good practices have you learned about during the class so far? 7. Based on your research in each of these areas, what changes could you implement in the short or long term to improve your cyber security? 8. What if you discover a cyber incident such as a virus or accidentally give up credentials in a phishing email? What is your response plan? 9. Any other ideas, analysis, or research you think are applicable to improve your computer security. You won’t be penalized for taking necessary liberties, but you should discuss all these issues in detail with regard to your own network, one you use, or one that is available to you.

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more