Installing and running anti-malware software

Assignment Help Basic Computer Science
Reference no: EM132988991

Scenario

Always Fresh allows external users, such as vendors and business partners, to access the Always Fresh Windows environment. You have noticed a marked increase in malware activity in the test environment that seems to originate from external users. After researching the likely source of new malware, you conclude that allowing external users to connect to your environment using compromised computers exposes Always Fresh to malware vulnerabilities.

After consulting with your manager, you are asked to create a policy that will ensure all external computers that connect to Always Fresh environment are malware free. You create the following policy:

"To protect the Always Fresh computing environment from the introduction of malware of any type from external sources, all external computers and devices must demonstrate that they are malware free prior to establishing a connection to any Always Fresh resource."

Consider the following questions:

1. What does "malware free" mean?

2. How can a user demonstrate that their computer or device is malware free?

3. What are the steps necessary to establish a malware-free computer or device?

4. How should Always Fresh verify that a client computer or device is compliant?

Tasks

Create a malware protection procedure guide that includes steps for installing and running anti-malware software. Fill in the following details to develop your procedure guide:

1. Provide a list of approved anti-malware software solutions-include at least three leading antivirus and two anti-spyware products. You may include Microsoft products and third-party products. Instruct users to select one antivirus and one anti-spyware product and install them on their computer.

2. Describe the process of:

a. Ensuring anti-malware software and data is up to date. Mandate daily updates.

b. Running regular malware scans. Mandate that automatic scans occur whenever the computer is idle. If that setting is unavailable, mandate daily fast scans and biweekly complete scans.

3. Provide steps to follow any time malware is detected.

a. Immediate reaction-what to do with current work, leave the computer on or turn it off

b. Who to contact

c. What information to collect

Reference no: EM132988991

Questions Cloud

Programming languages provide concept called loop : Almost all the programming languages provide a concept called loop, which helps in executing one
Create an eco-map to represent claudia situation : Create an eco-map to represent Claudia's situation. Describe how the ecological perspective of assessment influenced how the social worker interacted with Claud
Outline for basic qualitative risk assessment plan : Create an outline for a basic qualitative risk assessment plan. Define the scope and boundaries for the risk assessment.
What are the benefits to using function to accomplish : What are the benefits to using a function to accomplish that task? Does the function need parameters or return value? Why or why not?
Installing and running anti-malware software : Create a malware protection procedure guide that includes steps for installing and running anti-malware software.
Compute their child credit : Mr. and Mrs. Cox reported $115,900 AGI on their 2018 joint return. The couple has three dependent children under age 17. Compute their child credit
Explain what is the nuclear nonproliferation : Explain what is the "Nuclear NonProliferation" treaty? Who or what are non-state hackers? Provide a brief explanation of a non-state hacker.
What amount will be reported as cost of goods sold : Using the FIFO perpetual inventory method, what amount will be reported as cost of goods sold for the 24 units that were sold
Prepare summary journal entries to record the raw materials : Prepare summary journal entries to record the raw materials requisitioned, factory labour used, the assignment of manufacturing overhead to jobs

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Will bfs always discover vertex x

Will BFS(s) always discover vertex x? Will DFS-Visit(s) always discover vertex x(assuming that DFS-Visit(s) is the first time DFS-Visit is called?)

  Ethical issues to the cyber domain

Open source code (As an example, what if Appleâs iPhone source code used in mobile applications helped the government?)

  Define the key attributes of cognitive computing

List and briefly define the key attributes of cognitive computing. How does cognitive computing differ from ordinary AI techniques?

  Write a function to compute the nth fibonacci number

Write a function to compute the nth Fibonacci number. Use your function to solve Programming Exercise 3 from Chapter 3.

  Evaluate how cookies affect your privacy when using internet

Evaluate how cookies affect your privacy when using the Internet?

  Industry experts believe blockchain is technology

Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years.

  Compare gdpr and coppa privacy regulations

Compare and contrast GDPR and COPPA privacy regulations. In your initial post include 2 articles to support your views on the differences and similarities

  Industry association of america lawsuit against napster

What was the premise behind Recording Industry Association of America's lawsuit against Napster? Why did Napster ultimately have to shut down its services?

  Industry experts believe blockchain is technology

Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years.

  Marketing masters course

The Lindner College of Business has about 2500 undergraduate students, including freshmen and sophomores who take little business course work while completing their General Education requirements in the first two years.

  Propose an alternate redesign that improves security

Propose a redesign of your software architecture for the system of automated banking machines from the previous exercise so that it improves performance. Propose an alternate redesign that improves security. Does your strategy to improve performan..

  Discuss the financial benefits of chatbots

Examine Alexa's skill in ordering drinks from Starbucks. Discuss the financial benefits of chatbots.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd