Communiquez avec les autres et partagez vos connaissances professionnelles

Inscrivez-vous ou connectez-vous pour rejoindre votre communauté professionnelle.

Suivre

How can the risk of unauthorized computer system access be reduced?

 

a)By installing anti-spam software .

b)By using firewall.

c)By setting up a WAN.

d)By encrypting all data stored in the system.

 

user-image
Question ajoutée par Ghada Eweda , Medical sales hospital representative , Pfizer pharmaceutical Plc.
Date de publication: 2016/03/19
Ghada Eweda
par Ghada Eweda , Medical sales hospital representative , Pfizer pharmaceutical Plc.

Most users are interested in taking steps to prevent others from accessing their computer. Whether it be to protect yourself from malware or to ensure that your private information is safe, having a secure computer can definitely provide peace of mind. The following sections detail many ways you can secure you computer against others. To proceed, you may read through each section or choose one that interests you from the below list.

1.  Passwords

2.  Get a hardware or software firewall

3.  Operating system and software patches and updates

4.  Malware protection

5.  Run system scans to check for vulnerabilities

6.  Know how to handle e-mail Alternative browser

 

Hassan Tahiri
par Hassan Tahiri , المسؤول عن الصيانة , MICMAINTE

you have very good answer to your own question.

Bassam Ali Mohammed Al-mamari
par Bassam Ali Mohammed Al-mamari , مساعد الرصد والتقييم , برودحي سيستمز

I totally agree with your answer, Ms. Ghada Eweda

I may add two points which are :

not to open any unknown files you may receive from strangle people online..

don't plugin unsafe pen drive into your USB port of your computer.

mohammed musthafa p
par mohammed musthafa p , Personal Driver/House Driver , House Driver

d)By encrypting all data stored in the system

Abdelmonaam Kallali
par Abdelmonaam Kallali , Data application developer , DragonWave

my two cents: avoid sharing folders, especially if you are in a work environment (domain); if you need authorized people to have access use ftp.

More Questions Like This