Week 12, Securing Computers/ Operational Procedures.

 

    This week I learned how to secure computers and operational procedures through chapters 27 and 28. It is essential to protect data from cyber-attacks and system failure. The first chapter described common threats to computers and data, such as unauthorized access, social engineering, denial of service, data distribution- accidental or deliberate, administrative access, hardware failure, physical theft, malware, and environmental threats. It also explained key security concepts and technologies and detailed how to protect computers from network threats. From chapter 28, I learned documentation best practices, managing change management processes and implementation, and disaster prevention and recovery.  Finally, it discussed the difference between cloud storage and local storage. Overall it was an outstanding learning experience.

    The weekly blogging was a new experience, and I like blogging for future courses because it summarises weekly learning. It can be used for future reference. I may use it in the future depending on the job. 

Comments