Compare desktops to laptops, tablets, and smartphones using best practices related to security.

Posted: July 16th, 2022

Place your order now for a similar assignment and have exceptional work written by our team of experts, At affordable rates

For This or a Similar Paper Click To Order Now

Part 1: Security Threats
Provide an example of at least one security  threat.  This can be an actual threat to an organization.  It can be an  example of a “what-if” scenario.  Discuss at least one way that this  threat could have been minimized or prevented. 
One major security threat that the world is dealing with on a  daily basis is phishing. Phishing is where scammers send emails that  appear to be legitimate but the link actually takes you to a malicious  website. Using the fake website, the scammers trick you into giving  sensitive information (TestOut LabSim, n.d.). Based  on the Federal Bureau of Investigation internet crime report for 2021,  page 22, Phishing claimed the most victims, reporting 323,972 victims,  than any other crime type (Internet Crime  Complaint Center(IC3) | Annual Reports, n.d.). Protecting yourself from  phishing comes down to educating yourself and analyzing your emails.  Make sure that the emails are legitimate by reading carefully and  verifying the web address. “Hold your mouse over the link and it will  show you the website it’s linked to” (TestOut LabSim, n.d.). Before  putting in any sensitive information make sure the website is  legitimate. If you have any doubts contact the company to verify.  
Part 2: Mobile devices
Compare desktops to laptops, tablets, and  smartphones using best practices related to security. Discuss the best  practices that you use or plan to implement on your mobile device(s).
Computers and cell phones have come a long way in just a few  short years. You can now perform the same task on your smartphones as  you can on your computer. It’s no longer just calling people but the  ability to send and receive emails, surf the web, use apps and work from  anywhere has only grown. With the increase of abilities comes the  increase of vulnerabilities. It has been embedded into us to keep  antivirus software or firewalls on our computers. Though most don’t  think the same way with our mobile devices. A lot of people never update  their phones or apps until they are forced to. They don’t think about  them the same way they do with computers (Platsis, 2019).  What makes that worse is that people keep more sensitive information on  their phones for convenience. From storing credit card information to  saving all of their passwords right there on your phone, the personal  information vulnerable to attackers are huge. With mobile devices being  just that, mobile, we are taking these devices filled with this  information everywhere with us. Exposing and increasing possibilities of  attacks, especially when we have settings set to connect to any  available WIFI connections. Add to the fact, unlike most computers, our  smartphones are almost always on, sending and receiving data constantly  (Platsis, 2019). Our desire to increase convenience and speed have  decreased our thoughts on security and privacy. Even “many companies  have not implemented basic best practices for mobile security” (Platsis,  2019). This leaves a gap for attackers to use, bypassing their other  security measures (Platsis, 2019). Some security methods that mobile  devices offer that most desktops do not are multifactor authentication  measures, having face or fingerprint recognition as well as a password.  With these measures and being proactive, we can decrease the  vulnerabilities mobile devices present. Examples of being proactive  include using strong passwords (including upper and lower case letters,  numbers and words not found in the dictionary), rotating those  passwords, distrusting the web and viewing every email with suspicion  (TestOut LabSim, n.d.).
Internet Crime Complaint Center(IC3) | Annual Reports. (n.d.). Www.ic3.Gov. (Links to an external site.)
Platsis, G. (2019, April 19). Mobile Security Versus Desktop and Laptop Security: Is There Even a Difference Anymore? Security Intelligence; Security Intelligence. (Links to an external site.)
TestOut LabSim. (n.d.). Retrieved July 10, 2022, from (Links to an external site.)

For This or a Similar Paper Click To Order Now

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price: