SECURING ELECTRONIC FILES
Assignment #2
SCHOOL-BASED ASSESSMENT
Candidate’s Name: Malikah Wildman
Candidate’s Number: 100112
Centre Number: 100112
Subject: Electronic Document Management Preparation
Name of School: St Mary High
Teacher: Ms Henry
Territory: Jamaica
Year of Examination: 2025
1 | Page
TABLE OF CONTENTS
Contents Pages #
Table Of Contents...............................................................................................2
Introduction........................................................................................................3
What does it mean to Secure Electronic Files?..................................................4
Why is Securing Electronic Files Important?....................................................5
Roles and Importance........................................................................................6
Three Most Common Information Security......................................................7
Practices For Organizations To Use..................................................................8
2 | Page
INTRODUCTION
In today's digital world, protecting electronic files is crucial for individuals and businesses.
With the rise of cyber threats, data breaches, and unauthorized access, safeguarding sensitive
information has never been more important. Whether it's personal documents, financial
records, or confidential business files, proper security measures help prevent data loss, theft,
and corruption.
This guide explores essential strategies for securing electronic files, including encryption,
password protection, access control, and cloud security best practices. By implementing these
measures, you can ensure your digital assets' confidentiality, integrity, and availability .
3 | Page
WHAT DOES IT MEAN TO SECURE ELECTRONIC FILES?
Device security is a set of cybersecurity measures to protect enterprise endpoint devices. In
critical infrastructure organizations, devices for work purposes such as PCs, laptops, mobile
devices, and tablets must be safeguarded from numerous cybersecurity threats and
unauthorized access. Effective device security is often rooted in strong
authentication, endpoint device management, and network access control.
4 | Page
WHY IS SECURING ELECTRONIC FILES IMPORTANT?
The rapid pace of technological advancement has increased the rise of cybersecurity threats,
especially for enterprise endpoint devices. Critical infrastructure organizations employ a wide
range of information and operation technology (IT, OT) devices, which interconnect and
interact within complex networks. The rise of remote work, BYOD policies, and diverse
work device options introduce threats like malicious apps, unauthorized access, phishing
attacks, and unsecured Wi-Fi networks.
5 | Page
ROLES AND IMPORTANCE OF THE FOLLOWING METHODS:
Passwords: Use complex passwords to protect your accounts and devices from
unauthorized access and cyber threats. Use complex passwords to protect your accounts
and devices from unauthorized access and cyber threats.
Firewall: A firewall safeguards your computer or network from unwanted traffic by
inspecting and authenticating data packets.
Encryption: Encryption encodes data, keeping it hidden from unauthorized users and
securing communication between applications and servers.
Virus Protection: Antivirus software defends against various threats like viruses, spyware,
malware, and phishing attacks.
6 | Page
THREE MOST COMMON INFORMATION SECURITY THREATS
WITHIN BUSINESS ORGANIZATIONS:
Malware Attacks: Malware, also known as malicious software, hacks devices by
slowing them down significantly or stopping them from working entirely. It destroys
computer systems through agents such as trojan malware, spyware, viruses,
ransomware, adware, and worms.
Malware can be released into a computer by clicking an infected link, downloading a
file or material from an unknown source, clicking a pop-up ad, or downloading an
email attachment from an unknown sender. Once malware is released into a computer
system, hackers can access your company’s passwords, credit card numbers, banking
data, personnel files, and more.
Insider threats refer to harmful actions carried out by individuals within an
organization, including employees, contractors, or business partners. Examples
include data theft, sabotage, and espionage. Companies need to monitor insider threats
as they can impact reputations and operations over the long term.
Phishing: In phishing attacks, hackers attempt to get users to take some
recommended action, such as clicking on links in emails that take them to fraudulent
websites that ask for personal information or install malware on their devices.
Opening attachments in emails can also install malware on users' devices that are
designed to harvest sensitive information, send out emails to their contacts or provide
remote access to their devices.
7 | Page
BEST PRACTICES FOR ORGANIZATIONS TO USE TO PROTECT
ELECTRONIC FILES
1.Backup Your Documents
Regularly create backups of important files and store them securely, protecting them like
the originals.
2. Track Revisions
Keep a record of revisions with details on who made them and when for added clarity and
security.
3. Digitize and Automate
Convert paper documents into secure, unalterable formats (like PDFs) to improve
accessibility and efficiency.
4. Invest in Cybersecurity
Utilize cybersecurity tools such as network intrusion detection, antivirus software, and
encryption to enhance security.
8 | Page
BIBLIOGRAPHY
DocuPhase. (n.d.). Securing your electronic documents. DocuPhase. Retrieved from
https://www.docuphase.com/blog/securing-your-electronic-documents
Fortinet. (n.d.). What does a firewall do? Fortinet. Retrieved from
https://www.fortinet.com/resources/cyberglossary/what-does-a-firewall-do
Genetec. (n.d.). What is encryption and how important is it? Genetec. Retrieved from
https://www.genetec.com/blog/cybersecurity/what-is-encryption-and-how-important-is-it
LinkedIn. (n.d.). Top security threats facing businesses today. LinkedIn. Retrieved from
https://www.linkedin.com/pulse/top-security-threats-facing-businesses-today
OPSWAT. (n.d.). What is device security? OPSWAT. Retrieved from
https://www.opswat.com/blog/what-is-device-security
Security Magazine. (2021). 5 cybersecurity threats for businesses in 2021—and 3 tips to
combat them. Security Magazine. Retrieved from
https://www.securitymagazine.com/articles/96146-5-cybersecurity-threats-for-
businesses-in-2021and-3-tips-to-combat-them
TechTarget. (n.d.). Top 10 types of information security threats for IT teams. TechTarget.
Retrieved from https://www.techtarget.com/searchsecurity/feature/Top-10-types-of-
information-security-threats-for-IT-teams
TriStar Tech Solutions. (n.d.). The importance of antivirus and virus protection. TriStar
Tech Solutions. Retrieved from https://www.tristartechsolutions.co.uk/the-importance-of-
antivirus-and-virus-protection
Walden University. (n.d.). Cybersecurity 101: Why choosing a secure password is so
important. Walden University. Retrieved from
https://www.waldenu.edu/programs/information-technology/resource/cybersecurity-101-
why-choosing-a-secure-password-in-so-important
9 | Page
PICTURE
10 | P a g e
TITLE PAGE
11 | P a g e