0% found this document useful (0 votes)
23 views6 pages

Muhammad Zaki - Is

no

Uploaded by

muhammadzakip36
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views6 pages

Muhammad Zaki - Is

no

Uploaded by

muhammadzakip36
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Assignment: 1

Submitted by: Muahammad Zaki


Roll No:23011598-028
Section:A
Course Code: SE-308
Course Title: Information Security
Submit to: Ms.Tehmeena Ehsan
Department of software Engineering
University of Gujrat
• Discuss the simple measures individuals or companies
can adopt to safeguard their information, such as
utilizing strong passwords, maintaining regular software
updates, educating employees on cybersecurity, and
implementing data backup strategies.
In the digital age that we live in today, this is more true than it has been
at any other time. If you use internet to manage your personal accounts
or if you are a corporation with critical data, there is always a risk of
cyber threats. By then all means its not gonna stop cyber-attacks at a
100% but having some simple measures in place really helps to protect
your data. The following are simple measure every individual and
organization in world practice to improve basic cybersecurity hygiene in
protecting their information.

• For Individuals:
1. Strong Passwords: One of the easiest ways to protect your
online accounts is by generating unique, strong passwords for each
site. Create a random password using a mixture of uppercase,
lowercase, numbers + symbols. Avoid the use of colloquial
language or information such as your name, birthdate. Password
managers can be a boon because they help you in creating and
storing all those complex passwords.
2. Regularly updating your operating systems: all
applications and software is the only way to ensure that you are not
leaving any known vulnerabilities unpatched. Security updates are
released for legacy systems and this is used by hackers as well to
attack the system.
3. Enable Two-Factor Authentication : Your accounts are
further protected with 2FA. It will be considerably more difficult
for unauthorized users to access your account even if they manage
to steal your password because they will require a second factor,
such as a code sent to your phone or email.
4. Identify Phishing Attempts: Use care when there are emails
or messages asking for personal information. phishing attacks with
legitimacy of trusted sources; data exfiltration Remember to verify
who the recipient is in all instances and stay away from clicking
shady links.
5. Secure your home Wi-Fi network : use strong encryption
and change the default password, WPA3 if possible Avoid
connecting to a public Wi-Fi network when doing such important
things as online banking, since these are usually unsafe
connections.
• For Companies:
1. Educating Faculty on Cybersecurity: Often the front line of
defense against cyberattacks is the faculty. Regular cybersecurity
training can help them recognize phishing attacks, understand best
practices for using passwords, and enforce data-handling
processes. Awareness — since human error often causes breaches!
2. Implement data backup processes : Backup critical files to
cloud and local storage on a regular basis. It is the important aspect
that your data should be restored without much delay in case of
any cyber attack, system failure or accidental deletion of important
files. Set up automatic backup systems and then properly test them
3. Regularly Software Updates: Ensure that software, systems,
and security tools stay up to date across the company. Regular
upgrades protect the company from known cybercriminal exploits.
4. Restricted access to sensitive information: Employees are
only allowed to uncover information they need according to their
role in the company. Ensure that only individuals with the
appropriate permissions can access critical systems or data, and
periodically review and update the associated access controls.
5. Using Firewalls with Antivirus Protection: While antivirus
software finds and eliminates harmful files, firewalls serve as a
barrier between your internal network and external threats. To
prevent assaults on your systems, keep both updated.

Both individuals and businesses may greatly strengthen their


security posture and lower the danger of data breaches and cyberattacks
by implementing these simple precautions. Developing the appropriate
routines and behaviors is just as important to cybersecurity as
technology.

• Why is it important for everyone to take responsibility


for information security, must everyone prioritize and
uphold information security standards, and what
potential consequences could arise if people don't follow
proper security practices?
Information security is a responsibility that belongs to everyone to
protect corporate and personal data from hackers. This will shed some
light on why these security requirements need to be, in turn, both a
priority and enforced; what happens if they are not!

1. Avoid Cyber Threats and Data Misappropriation: An


ineffective security policy can create vulnerabilities in the system
for hackers to enter a network, tamper with, erase or corrupt data,
leading to breaches, theft of identity information or financial
losses. A breach can seriously impair a business's reputation,
resulting in a decline in client loyalty and detrimental effects on
future business opportunities.
2. Protect Sensitive and Personal Information: Without
taking the right security precautions, your private information
including financial and personal data could be misused leading to
fraudulent activities or identity theft.
3. Prevent Financial Losses and Extortion: Financial theft,
extortion, lost funds and operational downtime costs can be
considerable to both individuals as well as organizations.
Reputation, Trust, Damage Avoided: Brands should protect their
customers' trust in them by safeguarding their digital assets.
4. Avoid Breaching Rules and Regulations :Such a violation
of data protection rules can incur fines, legal actions from
authorized bodies, hence not having security measures in place
may lead to such problems in addition to exposure of your
customer's confidential information.
5. Avoid Business Interruption and Loss of Productivity:
Cyberattacks can disrupt operations, halt work processes, and
decrease productivity by either damaging your business systems or
preventing access to mission-critical systems.
6. Identity Theft and Stress: Insecurities can lead to being
locked out of essential services, compromised accounts or the theft
of personal details that could be used in identity fraud.

You might also like