Understanding security controls for your pc

Understanding security controls for your pc
Practical Assignment:
Understand security controls for your pc.

Purpose:
• To gain awareness of security controls currently available to personal computer users
• To identify the security controls that are currently installed on your personal computer
• To identify the security controls that are currently enabled on your personal computer
• To improve the security of your computer

Our discussion on the topic of security attacks hopefully makes you want to rush home and do this assignment as quickly as you can.

The assignment is to inventory the security controls that are currently installed on your personal computer and analyze the state of security of your pc. You may have some controls in place, but not up-to-date. You may have some controls installed on your computer, but not currently enabled. There may be some controls that are recommended for secure operations of your pc, but you don’t have them. After you determine your current state of the security of your pc, you will write a recommended course of action to harden the pc; i.e., to add or modify the controls, as well as your usage behaviors, to make the computer more secure.

The grade for this assignment will not be based on your computer’s current state of security (or insecurity). Rather, you will be graded on your analysis of the current state of your security controls and your recommendations for the improvement of the security of your system.

Among the security controls that should be analyzed are:
1. Operating system (OS)
2. Passwords and password strength
3. Encryption
4. Anti-Virus (AV)
5. Anti-Spyware
6. Adware
7. Firewall
8. Wireless security
Address the security controls in the list above and describe how the security of your system can be improved; for example, if your AV signature file is out of date, the appropriate improvement is to update it and run a complete system scan. If you have a weak password on your system, the recommendation is to change it to a strong one.

READ ALSO :   Political science

The list is not exhaustive. Therefore, include items that are not on the list above in your recommendations. Think about technical controls and non-technical practices that we discussed in class and that are mentioned in the articles and reference documents that are posted in the Readings section of D2L.

You should use one or more of the scanners listed below to help you find your current state of security and make recommendations to improve it.
SuperScan http://www.mcafee.com/us/downloads/free-tools/superscan.aspx

Shields Up https://www.grc.com/x/ne.dll?bh0bkyd2

MS Baseline Security Analyzer http://www.microsoft.com/downloads/details.aspx?FamilyID=F32921AF-9DBE-4DCE-889E-ECF997EB18E9&displaylang=en

MS Baseline Security Analyzer Windows 7 version 2.1.1 http://www.microsoft.com/downloads/details.aspx?FamilyID=b1e76bbe-71df-41e8-8b52-c871d012ba78&displaylang=en