Settings
Language
Color Theme
What is Device Security?
Device security refers to the measures taken to protect devices, such as computers, smartphones, and internet-connected devices, from cyber threats and unauthorized access.
What is Device Security?
Device security refers to the measures taken to protect devices, such as computers, smartphones, and internet-connected devices, from cyber threats and unauthorized access. This includes protecting devices from malware, hacking, and physical access.
View Options Again
Refers to the protection of intellectual property.
Refers to the protection of virtualized computing (e.g., Virtual Machines).
Refers to the protection of people and premises.
Refers to the protection of devices, such as computers and smartphones.
Securing devices from physical access
Protecting devices from physical access is crucial because it can allow an attacker or criminal to gain access to sensitive data or install malware on the device.
Lock devices when not in use
Protect devices from theft
Use privacy screens
Use password protection or biometric authentication to lock devices when they are not in use. This will prevent unauthorized individuals from accessing the device if it is left unattended.
Keep devices with you at all times when traveling, or secure them in a safe location when not in use. Consider using a lock or cable to physically secure devices to a stationary object.
Privacy screens can help prevent someone from seeing your screen when you are working in public places or when your device is left unattended. They do this by using a polarised sheet to restrict the viewing angle to approx. 30 degrees on either side. This can help to protect your data from being viewed by unauthorized parties.
Is the following statement True or False:
Privacy screens help to prevent someone sitting next to you from viewing your screen.
Privacy screens can help prevent someone from seeing your screen when you are working in public places or when your device is left unattended. They do this by using a polarised sheet to restrict the viewing angle to approx. 30 degrees on either side. This can help to protect your data from being viewed by unauthorized parties.
View Options Again
True
False
Protecting devices from malware
Malware can include viruses, trojans, adware, worms, ransomware, and spyware. Once infected, malware can steal, modify, or prevent access to your data on your devices. To protect our devices from malware, we need to do the following:
Install antivirus software
Keep devices up to date
Spot the phish
Antivirus software can help to detect and remove software performing potentially unwanted actions such as logging keystrokes, injecting malicious advertisements, installing ransomware or using the device as part of a network of other compromised devices, also known as a botnet.
Installing the latest security updates and patches can help to protect devices from known vulnerabilities and prevent malware infections through unexpected avenues (e.g., simply receiving a message or opening a website if a device has vulnerabilities could lead to a compromise).
Be cautious when opening emails, clicking on links, or downloading files from unknown sources. These can often contain malware or lead to malicious websites. Instead, only download files from trusted sources and be mindful of the emails and links you click on.
To protect a device against malware infections, you should.
Installing the latest security updates and patches can help to protect devices from known vulnerabilities and prevent malware infections through unexpected avenues (e.g., simply receiving a message or opening a website if a device has vulnerabilities could lead to a compromise).
View Options Again
Keep devices up to date.
Don't install antivirus software because it'll slow down your device.
Click on links or attachments in any email you receive.
None of the options are correct.
Types of home and work devices
Any device connected to a home or work network, such as routers, IoT devices, or smart home devices, may expose the entirety of a network to cyber threats. To protect these devices, we should:
Protect smart home devices
Protect IoT devices
Protect routers
Secure smart home devices with strong, unique passwords and enable two-factor authentication whenever possible. Be cautious about the information shared with smart home devices, as this information can potentially be accessed by unauthorized parties.
Many IoT devices have security vulnerabilities that can be exploited by hackers. Keep IoT devices up to date with the latest security patches and updates, and consider disabling any unnecessary features or ports to reduce the risk of a cyber attack.
Keep routers and other network-connected devices, such as modems and switches, secure with strong passwords and periodic updates. Consider enabling WPA3 encryption for Wi-Fi networks to protect against unauthorized access.
Is the following statement True or False:
A compromised device can be used to onward attack another device on the same network.
Any device connected to a home or work network, such as routers, IoT devices, or smart home devices, may expose the entirety of a network to cyber threats. These can include smart home devices, IoT devices, routers, and other network-connected devices such as modems and switches.
View Options Again
True
False
Device network security
Avoid using public Wi-Fi networks. Other users on these networks can potentially intercept your traffic and steal sensitive information. If you must, ensure you're using a Virtual Private Network (VPN) at all times.
Is the following statement True or False:
Connecting to public Wi-Fi networks is safe if you just avoid clicking links in suspicious emails.
Attackers who control a public Wi-Fi network can intercept your traffic and potentially steal sensitive information. We should avoid using public Wi-Fi networks wherever possible, but if there's no alternative, we need to ensure a VPN is in use at all times to encrypt all traffic going in and out of the device.
View Options Again
True
False
Wrapping up
Protecting devices from cyber criminals requires a defense-in-depth approach to ensure the devices are physically secure, operate on secure networks, and are able to prevent the execution of malware.
Back
Next
Color Theme And Background Selector
×
Colorful Theme
Select Theme
Blue Theme
Select Theme
Light Theme
Select Theme
Purple Theme
Select Theme
Green Theme
Select Theme
Dark Theme
Select Theme