Reflect on your own practices regarding cybersecurity and identify up to three key areas for further exploration. Briefly describe your thought process in an email



In the world of technology, where innovation is key, there also comes the other side called, risks. The cyber-world is full of risks and hence comes the need to protect oneself against all the threats and malicious activities. Be it network devices, the network itself, the servers or the local devices, every device is surrounded by threats and vulnerabilities. Thus to protect my system from misuse or prevent information theft, I use user-based protection against such activities. I use biometric locks on my device to safeguard it. In biometrics, there are multiple methods, out of which I use fingerprint scanning to lock my system. Under this method only my fingerprint can unlock my system, hence no one can misuse it even if it was stolen. Although there are many other ways I find this method as one of the best practices that I can adopt. 

Are you looking for professional report writing assistance? Then you've come to the right place. is a website that provides assistance with all types of assignment writing. We have expert writers with degrees from prestigious universities on our team. Whether you need essay writing or business report writing help we are always available to assist you.


  1. Use of Access Controls: Implementation of access control on my device can be another security area. For example securing personal data like social media passwords, account information, sensitive bank information stored in the device, other information like images, chats, etc. This can be done when try to implement access control on individual applications via application locking tools or procedures. These ensure that the application and the data within them is secure and not misused intentionally or unintentionally. 

  2. Detailed Log creation: Logging can be another area for exploration which can help in guarding against the cyber threats. We can maintain the cybersecurity if we implement logs and record internet activity. This can be done by adding tools to the device which maintains the logs. So now wherever an attack takes places or any intrusion, such addresses can be traced and blocked. Thus we will be able to track any security holes in an application and hence can be secured against any such internet threats. Also, we cab patch up such holes and maintain a security protocol. 

  3. Use of firewalls: We can use firewalls to guard our private network against malicious users. The malicious IP address we find via logging can be blocked in the future via firewalls. Or we can even block other website URLs, pop-ups, ads, etc. which can be used for social engineering or phishing. Firewalls implementation cab be done by installing anti-virus software or other specialized firewall tools. Also, they can filter every message packet, hence making it sure that only secure and safe messages reach the message. 

Place Order For A Top Grade Assignment Now

We have some amazing discount offers running for the students

Place Your Order


  • Zanderigo, M., 2016. 10 Best Practices for Cyber Security in 2016. [Online] 

  • Available at:

  • [Accessed 26 October 2016].

Get Quality Assignment Without Paying Upfront

Hire World's #1 Assignment Help Company

Place Your Order