Installing and running anti-malware software

Assignment Help Basic Computer Science
Reference no: EM132645681

Always Fresh allows external users, such as vendors and business partners, to access the Always Fresh Windows environment. You have noticed a marked increase in malware activity in the test environment that seems to originate from external users. After researching the likely source of new malware, you conclude that allowing external users to connect to your environment using compromised computers exposes Always Fresh to malware vulnerabilities.

After consulting with your manager, you are asked to create a policy that will ensure all external computers that connect to Always Fresh environment are malware free. You create the following policy:

"To protect the Always Fresh computing environment from the introduction of malware of any type from external sources, all external computers and devices must demonstrate that they are malware free prior to establishing a connection to any Always Fresh resource."

Consider the following questions:

1. What does "malware free" mean?

2. How can a user demonstrate that their computer or device is malware free?

3. What are the steps necessary to establish a malware-free computer or device?

4. How should Always Fresh verify that a client computer or device is compliant?

Tasks

Create a malware protection procedure guide that includes steps for installing and running anti-malware software. Fill in the following details to develop your procedure guide:

1. Provide a list of approved anti-malware software solutions-include at least three leading antivirus and two anti-spyware products. You may include Microsoft products and third-party products. Instruct users to select one antivirus and one anti-spyware product and install them on their computer.

2. Describe the process of:

a. Ensuring anti-malware software and data is up to date. Mandate daily updates.

b. Running regular malware scans. Mandate that automatic scans occur whenever the computer is idle. If that setting is unavailable, mandate daily fast scans and biweekly complete scans.

3. Provide steps to follow any time malware is detected.

a. Immediate reaction-what to do with current work, leave the computer on or turn it off

b. Who to contact

c. What information to collect

The procedure guide may be used by company security professionals in the future. Hence, all steps listed should be clear and self-explanatory.

Reference no: EM132645681

Questions Cloud

What is the value of the share : ZET Co. has just paid a dividend of 0.07$ or 7% per share. An investment analyst estimates that the growth in dividends will be the equivalent of 4% per year
How many placements of order per year : How many placements of order per year? The purchase price is RM20 per unit and the ordering cost of each order is RM1,000. Lead time is 2 weeks.
Define nonsystematic risk : Define nonsystematic risk and explain why you agree or disagree with Wilson's remark
What is the benefits of a diversified corporate bond : What is the importance and benefits of a diversified corporate bond portfolio during COVID-19. Explain in detail. Provide the suitable example.
Installing and running anti-malware software : Create a malware protection procedure guide that includes steps for installing and running anti-malware software.
Which capital investments to make : Pertaining to Capital expenditures - How does a company go about deciding which capital investments to make and which ones to pass on?
Consider prior to deploying the new technology : What are the pros and cons of the technology selected? What various factors the business should consider prior to deploying the new technology?
Network will impact corporate wans : Write a short research paper on the development of Internet2 and how this deployment of this network will impact corporate WANs based on the Internet.
Discuss example where unclear writing had adverse military : Review the "old" Army Writing Guide (on blackboard) and discuss one real world example where unclear writing had an adverse effect on military personnel

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Estimate the heat transfer coefficient for liquid sodium

The entering velocity is 2 ft/s, based on the area of the shell, and the tube surface temperature is 400°F. The outlet sodium temperature is 600°F.

  Privacy protection act and forensic computer science

Research a scholarly paper in two paragraphs summaries. First paragraph is a summary of the article and the second paragraph is a reaction or discussion to the article. - Must be in APA formatTopic 1: Privacy Protection Act,

  Respond to it security incidents

Discuss what incident response is, why it is needed and how it provides for a mechanism to better respond to IT security incidents.

  What are the various types of malware

What are the various types of malware? How do worms differ from viruses? Do Trojan horses carry viruses or worms? ( 160 word minimum, give example of atleast one worm and virus and differences)

  What properties are needed in a secure hash function h

What properties are needed in a secure hash function H?

  Need a complete depth project details on present

Need a complete depth project details on present  hyper local players in bangalore. where can i get it pls suggest some websites or link, ineed it badly

  Create irp and change management plan

The CEO and CIO need you and your team to create an IRP and change management plan. These plans will help organization choose appropriate cyber security tool.

  Briefly outline any relevant requirements

How could legislation impact on operations within your organisation in relation to innovation, project management, and operational planning?

  Discuss the relative performance seen by the telnet user

Assume Telnet packets have 1 byte of data, FTP packets have 512 bytes of data, and all packets have 40 bytes of headers.

  The average number of bookings for each type of room

Guest (guestNO, guestName, guestAddress)Question:  How do I write an SQL Query (mysql) that would give me  "the average number of bookings for each type of room?"

  What is an anomaly in finance

Give three examples of anomalies that academic research has uncovered in the past two decades (make sure and explain these anomalies in detail.

  Comparing and contrasting five of the design patterns

Comparing and contrasting five of the design patterns below. Just compare them with each other. Adapter - helps to reuse an object or method by adapting its interface to a more common one. Controller - controls client access and manages every request

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd