security vulnerability 2

You purchased a used computer from a friend. You want to ensure the computer, your network, and data are secure once you start using it.

Describe the actions you will take to identify and address any potential issues that could affect the security of your computer system, network, and data. For example, you may review what wireless access points are configured and update or remove those not within your network.

Document your plan in a 1-page Microsoft® Word document.