0% found this document useful (0 votes)
10 views11 pages

Project

The document is an assignment on securing electronic files, emphasizing the importance of protecting sensitive information in today's digital landscape. It outlines various strategies for safeguarding electronic files, including the use of passwords, firewalls, encryption, and antivirus software, while also identifying common cybersecurity threats such as malware, insider threats, and phishing. Best practices for organizations include regular backups, tracking revisions, digitizing documents, and investing in cybersecurity tools.

Uploaded by

malikahwildman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views11 pages

Project

The document is an assignment on securing electronic files, emphasizing the importance of protecting sensitive information in today's digital landscape. It outlines various strategies for safeguarding electronic files, including the use of passwords, firewalls, encryption, and antivirus software, while also identifying common cybersecurity threats such as malware, insider threats, and phishing. Best practices for organizations include regular backups, tracking revisions, digitizing documents, and investing in cybersecurity tools.

Uploaded by

malikahwildman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

SECURING ELECTRONIC FILES

Assignment #2

SCHOOL-BASED ASSESSMENT

Candidate’s Name: Malikah Wildman


Candidate’s Number: 100112
Centre Number: 100112
Subject: Electronic Document Management Preparation
Name of School: St Mary High
Teacher: Ms Henry
Territory: Jamaica
Year of Examination: 2025

1 | Page
TABLE OF CONTENTS

Contents Pages #

Table Of Contents...............................................................................................2

Introduction........................................................................................................3

What does it mean to Secure Electronic Files?..................................................4

Why is Securing Electronic Files Important?....................................................5

Roles and Importance........................................................................................6

Three Most Common Information Security......................................................7

Practices For Organizations To Use..................................................................8

2 | Page
INTRODUCTION

In today's digital world, protecting electronic files is crucial for individuals and businesses.

With the rise of cyber threats, data breaches, and unauthorized access, safeguarding sensitive

information has never been more important. Whether it's personal documents, financial

records, or confidential business files, proper security measures help prevent data loss, theft,

and corruption.

This guide explores essential strategies for securing electronic files, including encryption,

password protection, access control, and cloud security best practices. By implementing these

measures, you can ensure your digital assets' confidentiality, integrity, and availability .

3 | Page
WHAT DOES IT MEAN TO SECURE ELECTRONIC FILES?

Device security is a set of cybersecurity measures to protect enterprise endpoint devices. In

critical infrastructure organizations, devices for work purposes such as PCs, laptops, mobile

devices, and tablets must be safeguarded from numerous cybersecurity threats and

unauthorized access. Effective device security is often rooted in strong

authentication, endpoint device management, and network access control.

4 | Page
WHY IS SECURING ELECTRONIC FILES IMPORTANT?

The rapid pace of technological advancement has increased the rise of cybersecurity threats,

especially for enterprise endpoint devices. Critical infrastructure organizations employ a wide

range of information and operation technology (IT, OT) devices, which interconnect and

interact within complex networks. The rise of remote work, BYOD policies, and diverse

work device options introduce threats like malicious apps, unauthorized access, phishing

attacks, and unsecured Wi-Fi networks.

5 | Page
ROLES AND IMPORTANCE OF THE FOLLOWING METHODS:

 Passwords: Use complex passwords to protect your accounts and devices from

unauthorized access and cyber threats. Use complex passwords to protect your accounts

and devices from unauthorized access and cyber threats.

 Firewall: A firewall safeguards your computer or network from unwanted traffic by

inspecting and authenticating data packets.

 Encryption: Encryption encodes data, keeping it hidden from unauthorized users and

securing communication between applications and servers.

 Virus Protection: Antivirus software defends against various threats like viruses, spyware,

malware, and phishing attacks.

6 | Page
THREE MOST COMMON INFORMATION SECURITY THREATS
WITHIN BUSINESS ORGANIZATIONS:

Malware Attacks: Malware, also known as malicious software, hacks devices by

slowing them down significantly or stopping them from working entirely. It destroys

computer systems through agents such as trojan malware, spyware, viruses,

ransomware, adware, and worms.

Malware can be released into a computer by clicking an infected link, downloading a

file or material from an unknown source, clicking a pop-up ad, or downloading an

email attachment from an unknown sender. Once malware is released into a computer

system, hackers can access your company’s passwords, credit card numbers, banking

data, personnel files, and more.

Insider threats refer to harmful actions carried out by individuals within an

organization, including employees, contractors, or business partners. Examples

include data theft, sabotage, and espionage. Companies need to monitor insider threats

as they can impact reputations and operations over the long term.

Phishing: In phishing attacks, hackers attempt to get users to take some

recommended action, such as clicking on links in emails that take them to fraudulent

websites that ask for personal information or install malware on their devices.

Opening attachments in emails can also install malware on users' devices that are

designed to harvest sensitive information, send out emails to their contacts or provide

remote access to their devices.

7 | Page
BEST PRACTICES FOR ORGANIZATIONS TO USE TO PROTECT
ELECTRONIC FILES

 1.Backup Your Documents

Regularly create backups of important files and store them securely, protecting them like

the originals.

 2. Track Revisions

Keep a record of revisions with details on who made them and when for added clarity and

security.

 3. Digitize and Automate

Convert paper documents into secure, unalterable formats (like PDFs) to improve

accessibility and efficiency.

 4. Invest in Cybersecurity

Utilize cybersecurity tools such as network intrusion detection, antivirus software, and

encryption to enhance security.

8 | Page
BIBLIOGRAPHY

DocuPhase. (n.d.). Securing your electronic documents. DocuPhase. Retrieved from

https://www.docuphase.com/blog/securing-your-electronic-documents

Fortinet. (n.d.). What does a firewall do? Fortinet. Retrieved from

https://www.fortinet.com/resources/cyberglossary/what-does-a-firewall-do

Genetec. (n.d.). What is encryption and how important is it? Genetec. Retrieved from

https://www.genetec.com/blog/cybersecurity/what-is-encryption-and-how-important-is-it

LinkedIn. (n.d.). Top security threats facing businesses today. LinkedIn. Retrieved from

https://www.linkedin.com/pulse/top-security-threats-facing-businesses-today

OPSWAT. (n.d.). What is device security? OPSWAT. Retrieved from

https://www.opswat.com/blog/what-is-device-security

Security Magazine. (2021). 5 cybersecurity threats for businesses in 2021—and 3 tips to

combat them. Security Magazine. Retrieved from

https://www.securitymagazine.com/articles/96146-5-cybersecurity-threats-for-

businesses-in-2021and-3-tips-to-combat-them

TechTarget. (n.d.). Top 10 types of information security threats for IT teams. TechTarget.

Retrieved from https://www.techtarget.com/searchsecurity/feature/Top-10-types-of-

information-security-threats-for-IT-teams

TriStar Tech Solutions. (n.d.). The importance of antivirus and virus protection. TriStar

Tech Solutions. Retrieved from https://www.tristartechsolutions.co.uk/the-importance-of-

antivirus-and-virus-protection

Walden University. (n.d.). Cybersecurity 101: Why choosing a secure password is so

important. Walden University. Retrieved from

https://www.waldenu.edu/programs/information-technology/resource/cybersecurity-101-

why-choosing-a-secure-password-in-so-important

9 | Page
PICTURE

10 | P a g e
TITLE PAGE

11 | P a g e

You might also like