Back
Uncategorized

Securing A Personal Computer

You should be pretty familiar with some of the ways we can prepare a computer against attack. Consider the things you’ve learned about the ways attackers might attempt to compromise a computer.
Requirements:
Create a brief policy document for an organization such as a hospital. This policy document should:

  • Select and categorize the ways an attack on a workstation can occur
  • specify at least three required steps that a worker should take to secure a personal computer.
  • provide at least three other suggestions for worker behaviors that will ensure computer security.
  • be 1 page in length, double-spaced,
  • be free of spelling, grammar, and punctuation errors.

Please Meet Criteria
Policy identifies ways an attack on a workstation (PC) can occur
Written policy specifies at least three required steps that a worker should take to secure a personal computer, with heading identifying this section
Provides at least three other suggestions for worker behaviors that will ensure computer security, with heading identifying this section.
Free of spelling, grammar, and punctuation errors.  (If not in policy form -5 points)

David Lee
David Lee

We use cookies to give you the best experience. Cookie Policy