Assignment 10

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Think Question #2

Assuming you have played online games or downloaded gaming apps and followed the advice listed above. How will you
change your gaming behavior now that you are aware of specific security threats?
I'll be more cautious when browsing online gaming forums, as this is one area where hackers try to trick me into
revealing my account information by pretending as genuine users. It's important to remember that no gaming company
will approach me and ask for my credentials. So, even if someone claims to be a representative of the gaming company, I
will never reveal my username or password to anyone.

Think Question #4
Why would someone execute a DoS or DDoS attack?
A Denial-of-Service (DoS) attack is meant to shut down a machine or network, making it inaccessible to its intended
users. However, DDoS attacks can be used as a way of extortion and blackmailing. For example, website owners can be
asked to pay a ransom for attackers to stop a DDoS attack. DoS attacks accomplish this by flooding the target with traffic
or sending it information that triggers a crash. The sole purpose of a DDoS attack is to overload the website resources.

What is a DDoS Attack? (2019, August 9). Sucuri.net. Retrieved from


https://sucuri.net/guides/what-is-a-ddos-attack/#:~:text=The%20sole%20purpose%20of%20a,to%20stop%20a%20DDoS
%20attack.

Think Question #6
Present five (5) precautions do take to prevent viruses and other malware from infecting a computer?

1. Install Anti-Virus/Malware Software.


2. Keep Your Anti-Virus Software Up to Date.
3. Run Regularly Scheduled Scans with Your Anti-Virus Software.
4. Keep Your Operating System Current.
5. Secure Your Network. 

Brooks, Ryan. (2020, June 12). How to Prevent Malware Attacks: 10 Security Tips. Retrieved from
https://blog.netwrix.com/2020/06/12/malware-prevention/

Think Question #8
Do retailers use a signature verification system for credit card purchases? Explain.
In April 2018, the four major U.S. credit card issuers — Visa, Mastercard, American Express, and Discover —
decided that they’ll no longer require signatures as a verification method for purchases. Retailers may still require
signatures to verify cardholder identities, however, but only if they choose to do so. This will help streamline the checkout
process without compromising card security — signatures aren’t a very good security measure, and cashiers never check
them anyway.
Harkness, Brendan. (2020, August 21). Chip Credit Cards: EMV, Chip-and-PIN, and Chip-and-Signature. Retrieved from
https://www.creditcardinsider.com/learn/chip-and-signature-chip-and-pin-emv-cards/
Think Question #10
What mobile security safeguards have you undertaken to protect your smartphone or mobile devices?
I always keep my phone locked. One potential threat is getting my device is stolen, which could give the thief
complete access to my personal information.
I always keep my devices Up-To-Date. These updates can protect my devices from newly discovered threats.
To protect my mobile phone data, I always make sure that my data is encrypted.
I install Anti-Virus Software, such as Avast Free Antivirus for my Laptop and AVG AntiVirus for my Android
phone. These programs can protect against viruses and hacking attempts.

You might also like