Nt1310 Unit 3 Research Paper

Improved Essays
Securing your Macintosh(Mac) OS computer
Apple producing their computers with a lot of security features already in them. Mac OS X is one of the most secure operating systems in the market. Still a lot of people make mistakes while using their computers on their daily bases. These mistakes can notably weaken the security of their operation system. To be sure that you computer secure we will consider how to secure your user account, your web browsing, and we will maximize the privacy.
Let’s start with securing your user account. This is very important, because the computer is as secure as the user. Securing the user gives no chance to unwanted access to you computer. First thing is setting up the password. So only you will be able to access you user account and all your files, applications, and browsing history.
…show more content…
It is important to rotate you password. That way even if someone had to know your password it will not work once you have changed it. It is recommended to change you system account password once in between six months to one year. To set up the password on your OS X, open Apple menu and select “System Preferences.” Then go to Users & Groups >Your User Account >Password. Next, select “Change/Set Password” button. In the next dialog box you will be able to set up you password. Make sure you remember you password. You will need it to log in to your user account and to make any other changes to your system. Now next very important step is to secure your hard drive. Password we set before controls only your login and access to your account. And all of the files on the computer are written to the hard drive. Password doesn’t save you from someone who can get physical access to the hard drive of your computer by connecting your mac to another machine or removing the hard drive and placing it to another computer. Apple solved this problem by creating FileVault. This feature encrypts entire hard drive with its files. And the only way to unencrypt the files is the access to user password or to the recovery key. It is easy process to set up FileVault to encrypt your Mac. All you need is to get to System Preferences>Security & Privacy>FileVault. And click “Turn On FileVault…” button. Make sure to write down and keep somewhere safe the passcode that will be presented. Now, when you are secure on user base, let’s secure your web browsing Web browsing is one of the biggest uses of computing today. It is very important to be safe online. Internet could be very dangerous, you are not secure it is easy for the hackers to trick you and your system, and get access to any of you personal information. First thing to be safe online is disabling Java. It is very rare when Mac users get viruses or Trojans, but then they do they are often originated from Java running in the web browser. To prevent Java applets from executing on pages when browsing the web in Safari, simply head over to Safari > Preferences > Security, and uncheck the box labeled “Enable Java.” Java is a programming language that many websites use. And the Java Applets are small programs that Java executes in the browser. That way websites could install harmful pieces of software onto your computer. Then Java

Related Documents

  • Improved Essays

    The lock should require multi-factor authentication, such as a card swipe and an access PIN, or a biometric id check and a PIN. Preferably, the PIN entry keypad would randomize the position of the digits for each PIN entry attempt. The system should be connected to the network, be centrally configured and record all access attempts in a log. c) Video Surveillance System: In order to keep records of who is physically accessing critical areas and devices, video monitoring cameras should be installed with good views of those areas. At a minimum, cameras should have a view of the inside of the wiring closet / server room, the entry point to the wiring closet / server room, and the main entrance to the company…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    1. Name two creatures that have been discovered since you were born. Titi Monkey and Dumbo Octopus have been discovered since I was born. 2. How tall would a redwood be compared to you right now?…

    • 317 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    There are numerous reasons why there is a need for every home cook to own stainless steel bowls. The bowl made from stainless steel has a very durable built and it can even be your partner for a lifetime. These bowls can also keep all your cold items in its cool state as it insulates the items. If you have noticed in parties and social events, there are bowls made from stainless steel used for keeping items such as water, lemonade, soda and others, in order to keep it cool. Placing the bowl on the freezer for only very few minutes will allow it to keep those items placed on it for longer period.…

    • 513 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    False Sense Of Security

    • 892 Words
    • 4 Pages

    How could Administrative, Technical, and Physical Controls introduce a false sense of security? Security controls are technical, physical or administrative defenses to evade, neutralize or diminish harm or inaccessibility because of risks operating on their corresponding weakness, i.e., security risk. Organizations add security controls, which is no surprise; however, it is easier than most think to bypass these controls. The business “goes through the motions of deploying a security tool or following an oversight procedure, but the benefit to the security posture might be negligible”…

    • 892 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    HACKM Case Study

    • 2185 Words
    • 9 Pages

    Technicians will use Across Forest Migration to export the GPO and import it into the new Windows 8 production environment. After GPO migration, users will authenticate to the HACKM domain and therefore will not be required to use a Microsoft account with the new Windows 8 systems. Data Backup & Restore Data protection is crucial for HACKM continuity after the migration. Technicians will: 1. Identify the critical data that needs to be archived 2.…

    • 2185 Words
    • 9 Pages
    Superior Essays
  • Improved Essays

    Sunnylake Hospital was a public center for helping people to cure their illness. Paul Layman, the CEO of the Sunnylake Hospital had joined the organization five years back with a vision of applying advanced technology to the communal center to form it into a hospital which is wanted after by the people. Paul applied electronic medical records (EMR) which substituted the customary method of prescribing and examining patient’s records through papers by changing them into digital data. One day an email pointing the mistake of the security systems of the organization was found in the inbox of Paul Layman mail by some nameless person. Paul had full belief in his IT division and its director of IT, Jacob Dale.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Privacy Policy

    • 108 Words
    • 1 Pages

    Privacy Policy: We understand your privacy is very important and we have taken necessary measures to ensure the protection of your data and information. This privacy policy explains how we access, store and use the information that we have collected from you. The information that we have collected from you will be only used to keep the track record of your gaming activity to provide you better services.…

    • 108 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Codeswat Security Policy

    • 615 Words
    • 3 Pages

    • Critical data and system configurations should be backed up on a regular basis, the data should be stored in a safe…

    • 615 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Our most personal informations and even our secrets are preserved in a digital format on various hard drives and storages across the globe. These devices, if not properly secured, are accessible to practically anyone. In order to protect our information, we create passwords that allow us-and us alone-to view our most private data, similar to the way in which one would have a key to a safety deposit box with valuables stored carefully within. However, much like any lock and key in existence, the security provided by such a password is not guaranteed.…

    • 452 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    - If it is not charged, do not charge it; for mobile phones, if the device is ON, power it down to prevent remote wiping on data being overwritten. - Ensure that you do not leave the device in an open area or other unsecured space. Document where the device is, who has access, and when it is…

    • 560 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Over the years, America and other nations all over the world have gone through many changes. One of those changes involves the evolution of technology. Technology has become so advanced that there is literally a more advanced way to handling daily operations. From automatic cash registers to intelligence gathering, technology has inevitably played an essential role in the way the countries all over the world have advanced. Unfortunately with that success, there are more opportunities for hackers to override those systems in order to steal information from unsuspecting users who have entrusted their most private information into the computer system.…

    • 1143 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    As from the previous case study, each friend decided to purchase a laptop for themselves. In which they will be using Wi-Fi network from home, school and when they are working from restaurants that have free Wi-Fi hot spots. Each network might seem a reliable and secure way to navigate the internet, but at times there can be a risk from a malicious website where a person’s identity can be stolen. The intruder can access someone’s device from many things such as downloading a file from the wrong website, or even being connected into a Wi-Fi hot spot, thinking that it is from the restaurant. Now I will explain the following concepts that can help secure and maintain a computer.…

    • 1361 Words
    • 6 Pages
    Superior Essays
  • Decent Essays

    Data Breach Case Study

    • 706 Words
    • 3 Pages

    Computer and software security includes strong passwords with ninety day expiration, firewalls, anti-virus and malware software, encryption and monitoring updates and patches. Physical security measures include, safes, locked cabinets, shredders and surveillance. As crucial as it is to implement physical and computer security, it is just as critical to train employees on the procedures and the proper use of the provided tools. Ongoing security education and instruction will help to prevent careless mistakes that can lead to vulnerability and breach. Creating and maintaining an incident response plan as well informing employees of its existence is significant.…

    • 706 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    Desert Safari Essay

    • 1834 Words
    • 8 Pages

    Here are 3 good PC security habits you should develop and then practice regularly: 1. Lock your PC always when not in use. This is one habit that almost all users are aware of, but only a few practice. You should ensure that your desktop or laptop computer is not left unlocked and attended, even if you are using it a semi-private place, such as the office.…

    • 1834 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    You vs. Social Engineering Technology has come a long way since its birth. Nowadays, we have the internet, cell phones, social media, YouTube, Netflix, and many more technological innovations. However, even with all these technological innovations, keep in mind that your security is more vulnerable than ever. Security is a major issue and plays a massive role in our everyday lives. A few examples are locking your car, using your email and accessing your banks ATM.…

    • 1504 Words
    • 7 Pages
    Improved Essays