COMPUTER THREATS SECURITY
COMPUTER SECURITY POLICIES EXAMPLES
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
True
|
|
False
|
|
Either A or B
|
|
None of the above
|
Detailed explanation-1: -When you’re finished using the public computer, the final thing you should do is a hard reboot. This will not only clear the pagefile, if you’ve enabled that option, but it will also clear out everything you did from the physical memory (RAM).
Detailed explanation-2: -Don’t enter sensitive information into a public computer. Avoid typing your credit card number or any other financial or otherwise sensitive information into any public computer. You don’t have control over a public computer and malicious software could record every key press.
Detailed explanation-3: -How Safe Are Public Computers? Public computers are not as safe as personal devices because you don’t know if the latest security protocols, like antivirus protections, have been installed. You also don’t know who has used the computer before you and if any users have compromised the device security.
Detailed explanation-4: -Don’t leave the computer unattended with sensitive information on the screen. If you have to leave the public computer, log out of all programs and close all windows that might display sensitive information. Erase your tracks. Internet Explorer 9 offers InPrivate browsing that leaves no trace of specific web activity.