Unit5PortfolioProject

docx

School

Athabasca University, Athabasca *

*We aren’t endorsed by this school

Course

210

Subject

Computer Science

Date

Apr 3, 2024

Type

docx

Pages

4

Uploaded by DeaconBoulderTurkey40

Report
COMP 210 Kalin Desrocher’s Security Audit September 3 rd , 2023 AUDIT FOR KALIN DESROCHER’S PERSONAL COMPUTER & SOCIAL MEDIA. Device: Lenovo ThinkPad E495 (DESKTOP-9FFN7N3) Processor : AMD Ryzen 5 3500U with Radeon Vega Mobile Gfx 2.10 GHz Installed Ram: 8 GB DDR4 OS: Windows 11 Pro (64-bit operating system) 1. Is the system in an area where casual access is possible (e.g., the kitchen table) as opposed to a private or semiprivate space (such as a basement or upstairs office with a lockable door)? The computer is in a home office in the basement of the house. The door is not lockable. I would recommend the installation of a door handle lock that is only accessible by key or code. There are three other individuals in the household that could have access to the computer when Kalin is not around. 2. Is the system in a place where it could be exposed to moisture? The climate of the room is dry and warm. There are no windows in the room – helps with reducing moisture (but is a fire hazard). Workstation is found to be clean with no beverages in sight. Little moisture is found in the room. Would recommend avoiding prolonged use in room with door closed. 3. Are food and/or beverages routinely consumed at the workstation? Client says food is never consumed at the workstation. If there is a beverage brought into the room, it is an enclosed water bottle. 4. Does the system have general start-up password security enabled? The system has start-up password security enabled. The password only contains digits which is not very secure. Would recommend changing to a password containing capital letters and special characters. The password should be updated routinely. Other options of password protection (Facial recognition, fingerprint) unavailable with device. 5. Does the system have user-level password security enabled? The system does have password protection put in place for the main user of device (User: Kalin) to access his account, and/or change any important information on the device. There is a guest account with limited access to the device. 6. Does the system have a surge protector and/or uninterrupted power supply? The system has a built-in battery and a surge protector. Battery is said to have 5 hours and 30 minutes of moderate use when fully charged. There is an uninterrupted power supply for device. The device is set to “best power efficiency” in the settings of the battery. There is also a battery saver mode put in place when the device is below 20% battery level.
COMP 210 Kalin Desrocher’s Security Audit September 3 rd , 2023 7. Does the system have an anti-virus program installed? The computer has Windows (Defender) Security & Firewall base anti virus, along with Norton 360 Deluxe anti virus installed. Norton Toolbar, Norton Safe Search, Norton Home Page, and Norton Password Manager extensions are all enabled. 8. How does the anti-virus program installed on your computer rate among other products? (See https://www.pcmag.com/categories/antivirus .) Windows base Defender anti-virus software is currently ranked a 3.5/5 on the editors’ choice scale, while Norton 360 Deluxe is ranked a 4.5/5. Norton 360 Deluxe is amongst the highest rated anti-virus on www.pcmag.com. 9. Is the anti-virus program set for regularly scheduled scans? Norton 360 Deluxe anti-virus program is set to do weekly scans, which is the recommended time frame a computer scan should be scheduled. The program has a built-in threat detector. I would recommend user to do a deep scan once every month, especially after consistent online use of device. 10. Is the anti-virus program set for automatic updates of virus definition files? The Norton 360 Deluxe anti-virus software is automatically set to update software, virus definition files, regular backups, and security measures. 11. Is there an anti-malware/adware program installed? There is a five-security suite and VPN license installed with the Norton 360 Deluxe anti-virus software. There is no identity theft protection at this tier of anti virus. There is anti-malware/adware protection included with the anti-virus program but is limited without certain protections. AntiTrack, Privacy Monitor Assistant, Utilities Ultimate, Identity Advisor, Home Title Protect, Computer Tune Up, and Ultimate Help Desk are all optional plug-ins to the base version of Norton 360 Deluxe. I would only recommend the installation of these plug-ins if the uses of the computer change in the future. 12. Is the anti-malware/adware program set for regularly scheduled scans? The anti-malware/adware virus scan is included in the deep scan, which was recommended to scan once a month to user. The weekly quick scan also picks up on unusual software identities. 13. Is the anti-malware/adware program set for automatic updates? Since the anti-malware/adware is included in Norton 360 Deluxe, it is included in the regular updates of the software.
COMP 210 Kalin Desrocher’s Security Audit September 3 rd , 2023 14. Is the firewall enabled? Firewall is connected and operating on both Norton 360 Deluxe and Windows Defender anti viruses. 15. Are your browser security settings at recommended levels? Norton extensions have computer protected and secure when browsing Microsoft Edge and Google Chrome. VPN in place to reroute internet traffic and encrypt IP address. Microsoft anti- virus activates Microsoft Defender SmartScreen with Microsoft Edge. Security settings were changed from basic to balanced, and strict for InPrivate browsing. Would recommend use of Microsoft Edge for this extra layer of protection for device. 16. Is there a regular schedule of temporary file/browser history deletion, particularly if online banking services are used? Scheduling of temporary file/browser history deletion is unactive. User says they delete information when they remember to, but not often. Schedule set to once a month of temporary file/browser history deletion. Set through Windows 11 to clean web browser. 17. Are regular backups of valuable data being made? Norton 360 Deluxe has scheduled regular backups for data on device. Recommended the user manually backups valuable data when it is created. 18. Are periodic backups of valuable data being created and stored offsite? User had 2 terabytes of external hard drive space connected to device. It is being used as a separate storage space by user (always connected). Recommended user only has external hard drive plugged in when accessing the data. 19. Are system and application passwords adequately robust? (See http://www.symantec.com/connect/articles/simplest-security-guide-better-password-practices or do your own search for an online resource providing password advice.) All social media passwords meet the proper criteria for a strong password. Device needs an updated password as it only contains digits. Storage of passwords kept mentally, which is a good practice to have. Two-step authentication set for important programs. 20. Are you aware of the privacy policies and settings on all your social networking applications (e.g., Facebook, Twitter, etc.)? Social media passwords are all distinct, and unique. They differ from each other, as well as device password. User is not fully briefed on all the privacy policies of application use. Recommend reviewing social networking policies.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
COMP 210 Kalin Desrocher’s Security Audit September 3 rd , 2023 SECURITY AUDIT OVERALL FEEDBACK. Hardware Security Device Security Anti-virus Security Social media Security Back-up and updates Overall Maintenance Overall Security 5/10 6/10 9/10 7/ 10 8/10 7/ 10 7/ 10 Software is in excellent condition with a prominent anti-virus program. Settings are all adjusted within the anti virus to ensure proper scanning and updates. After updated security measures with a more unique password to access device, the computer will pass the software portion of the security audit check. Hardware is in a great location for use and privacy. Living in a house with three other individuals is unfortunate for user. Even with them being family members, room is easily accessible by others and proper security measures are not met. Once a lock is installed on the door of the home office, the computer will pass the hardware portion of the security audit check. Other Notes: - Great warranty on product’s battery and anti-virus software. - Easy changes to achieve better scores.