Malware protection procedure guide

Assignment Help Basic Computer Science
Reference no: EM132533313

Malware Protection Procedure Guide

Scenario

Always Fresh allows external users, such as vendors and business partners, to access the Always Fresh Windows environment. You have noticed a marked increase in malware activity in the test environment that seems to originate from external users. After researching the likely source of new malware, you conclude that allowing external users to connect to your environment using compromised computers exposes Always Fresh to malware vulnerabilities.

After consulting with your manager, you are asked to create a policy that will ensure all external computers that connect to Always Fresh environment are malware free. You create the following policy:

"To protect the Always Fresh computing environment from the introduction of malware of any type from external sources, all external computers and devices must demonstrate that they are malware free prior to establishing a connection to any Always Fresh resource."

Consider the following questions:

1. What does "malware free" mean?

2. How can a user demonstrate that their computer or device is malware free?

3. What are the steps necessary to establish a malware-free computer or device?

4. How should Always Fresh verify that a client computer or device is compliant?

Tasks

Create a malware protection procedure guide that includes steps for installing and running anti-malware software. Fill in the following details to develop your procedure guide:

1. Provide a list of approved anti-malware software solutions-include at least three leading antivirus and two anti-spyware products. You may include Microsoft products and third-party products. Instruct users to select one antivirus and one anti-spyware product and install them on their computer.

2. Describe the process of:

a. Ensuring anti-malware software and data is up to date. Mandate daily updates.

b. Running regular malware scans. Mandate that automatic scans occur whenever the computer is idle. If that setting is unavailable, mandate daily fast scans and biweekly complete scans.

3. Provide steps to follow any time malware is detected.

a. Immediate reaction-what to do with current work, leave the computer on or turn it off

b. Who to contact

c. What information to collect

The procedure guide may be used by company security professionals in the future. Hence, all steps listed should be clear and self-explanatory.

Reference no: EM132533313

Questions Cloud

Nerds galore case : What were some of the risk sources that emerged repeatedly in evaluating the risks? How is this helpful?
Concept and application of information technology : If you were in charge of Security and Privacy for the Nation, how far would you let the government go in examining people's private lives?
Environment monitoring : Vulnerability Assessment (Risk assessment steps for your organization's environment). Threat Intelligence (Understanding what threats are out there)
Popularity and rapid adoption of software as service : The popularity and rapid adoption of Software as Service (SaaS), Platform as Service (PaaS), and Infrastructure as Service (IaaS) by a number of organizations
Malware protection procedure guide : What does "malware free" mean? How can a user demonstrate that their computer or device is malware free?
Hackers launch cyber attacks : In this scenario, hackers launch cyber attacks that affect several parts of the nation's financial infrastructure over the course of several weeks.
Social network and information technology : Review the Roles of Line Management and Social Network and Information Technology sections.
Technical writing-present informal proposal : Determine when you might present an informal proposal as an email. Provide an example to illustrate your point.
Waterfall project management model : The waterfall project management model is often used for non-IT projects, while the Agile project management model is often used for IT projects.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What binary number represents the value 0

In a biased N-bit binary number system with bias B, positive and negative numbers are represented as their value plus the bias B.

  Write program print a business travel expenses attachment

Write a program to print a business travel expenses attachment for an income tax return.

  Input for the production of beef

Given that "high-value forage" is an input for the production of beef, how is the market for beef impacted by the drought? What happens to the equilibrium price

  Print the file path and the number of lines in the file

Run my script on a weekday, redirecting your output to the file my_save and append a copy of my script.

  Corporations and high-net-worth individuals

Argue a true statement that: Globalization only significantly affects the CEO's of multinational corporations and high-net-worth individuals.

  Designing a wireless network

What should be considered when designing a wireless network?

  Enterprise rent-a-car focuses on its people

Enterprise Rent-A-Car, with annual sales of more than $13 billion, is the largest and most profitable car-rental business in North America. The company runs more than 6000 locations that fall within 15 miles of 90 percent of the U.S. population. E..

  Would you leave all three predictors in this model

Does this model mean that by changing the levels of the predictors in this equation, we could affect life expectancy in that state? Explain

  Define data fitting and approximating a given function

What are basis functions? Does an approximant v(x) that is written as a linear combination of basis functions have to be linear in x?

  Describe in words what this 2d transform matrix does

Show that the inverse of the matrix for an affine transformation (one that has all zeros in the bottom row except for a one in the lower right entry) also has the same form.

  Draw a normal distribution for the speech grades

The mean of the chemistry grades was 73, and the standard deviation was 3. Draw a normal distribution for the chemistry grades.

  How ips-ids can protect user information on windows system

Discuss how an IPS/IDS can protect user information on a Windows system or any computing device that is connect to a network.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd