Discussion reply!!! about 75 words


Part 1: Security Threats

  • Provide an example of at least one security  threat.  This can be an actual threat to an organization.  It can be an  example of a “what-if” scenario.  Discuss at least one way that this  threat could have been minimized or prevented. 

One major security threat that the world is dealing with on a  daily basis is phishing. Phishing is where scammers send emails that  appear to be legitimate but the link actually takes you to a malicious  website. Using the fake website, the scammers trick you into giving  sensitive information (TestOut LabSim, n.d.). Based  on the Federal Bureau of Investigation internet crime report for 2021,  page 22, Phishing claimed the most victims, reporting 323,972 victims,  than any other crime type (Internet Crime  Complaint Center(IC3) | Annual Reports, n.d.). Protecting yourself from  phishing comes down to educating yourself and analyzing your emails.  Make sure that the emails are legitimate by reading carefully and  verifying the web address. “Hold your mouse over the link and it will  show you the website it’s linked to” (TestOut LabSim, n.d.). Before  putting in any sensitive information make sure the website is  legitimate. If you have any doubts contact the company to verify.  

Part 2: Mobile devices

  • Compare desktops to laptops, tablets, and  smartphones using best practices related to security. Discuss the best  practices that you use or plan to implement on your mobile device(s).

Computers and cell phones have come a long way in just a few  short years. You can now perform the same task on your smartphones as  you can on your computer. It’s no longer just calling people but the  ability to send and receive emails, surf the web, use apps and work from  anywhere has only grown. With the increase of abilities comes the  increase of vulnerabilities. It has been embedded into us to keep  antivirus software or firewalls on our computers. Though most don’t  think the same way with our mobile devices. A lot of people never update  their phones or apps until they are forced to. They don’t think about  them the same way they do with computers (Platsis, 2019).  What makes that worse is that people keep more sensitive information on  their phones for convenience. From storing credit card information to  saving all of their passwords right there on your phone, the personal  information vulnerable to attackers are huge. With mobile devices being  just that, mobile, we are taking these devices filled with this  information everywhere with us. Exposing and increasing possibilities of  attacks, especially when we have settings set to connect to any  available WIFI connections. Add to the fact, unlike most computers, our  smartphones are almost always on, sending and receiving data constantly  (Platsis, 2019). Our desire to increase convenience and speed have  decreased our thoughts on security and privacy. Even “many companies  have not implemented basic best practices for mobile security” (Platsis,  2019). This leaves a gap for attackers to use, bypassing their other  security measures (Platsis, 2019). Some security methods that mobile  devices offer that most desktops do not are multifactor authentication  measures, having face or fingerprint recognition as well as a password.  With these measures and being proactive, we can decrease the  vulnerabilities mobile devices present. Examples of being proactive  include using strong passwords (including upper and lower case letters,  numbers and words not found in the dictionary), rotating those  passwords, distrusting the web and viewing every email with suspicion  (TestOut LabSim, n.d.).


Internet Crime Complaint Center(IC3) | Annual Reports. (n.d.). Www.ic3.Gov. https://www.ic3.gov/Home/AnnualReports (Links to an external site.)

Platsis, G. (2019, April 19). Mobile Security Versus Desktop and Laptop Security: Is There Even a Difference Anymore? Security Intelligence; Security Intelligence. https://securityintelligence.com/mobile-security-versus-desktop-and-laptop-security-is-there-even-a-difference-anymore/ (Links to an external site.)

TestOut LabSim. (n.d.). Labsimapp.testout.com. Retrieved July 10, 2022, from    https://labsimapp.testout.com/v6_0_503/index.html/productviewer/242/13.13.1/c0c5d48b-b9d9-4933-a9c9-9003f41e62f7 (Links to an external site.)

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more