Malware protection procedure guide

Assignment Help Basic Computer Science
Reference no: EM132577532

Project Part : Malware Protection Procedure Guide

Scenario

Always Fresh allows external users, such as vendors and business partners, to access the Always Fresh Windows environment. You have noticed a marked increase in malware activity in the test environment that seems to originate from external users. After researching the likely source of new malware, you conclude that allowing external users to connect to your environment using compromised computers exposes Always Fresh to malware vulnerabilities.

After consulting with your manager, you are asked to create a policy that will ensure all external computers that connect to Always Fresh environment are malware free. You create the following policy:

"To protect the Always Fresh computing environment from the introduction of malware of any type from external sources, all external computers and devices must demonstrate that they are malware free prior to establishing a connection to any Always Fresh resource."

Consider the following questions:

1. What does "malware free" mean?

2. How can a user demonstrate that their computer or device is malware free?

3. What are the steps necessary to establish a malware-free computer or device?

4. How should Always Fresh verify that a client computer or device is compliant?

Tasks

Create a malware protection procedure guide that includes steps for installing and running anti-malware software. Fill in the following details to develop your procedure guide:

1. Provide a list of approved anti-malware software solutions-include at least three leading antivirus and two anti-spyware products. You may include Microsoft products and third-party products. Instruct users to select one antivirus and one anti-spyware product and install them on their computer.

2. Describe the process of:

a. Ensuring anti-malware software and data is up to date. Mandate daily updates.

b. Running regular malware scans. Mandate that automatic scans occur whenever the computer is idle. If that setting is unavailable, mandate daily fast scans and biweekly complete scans.

3. Provide steps to follow any time malware is detected.

a. Immediate reaction-what to do with current work, leave the computer on or turn it off

b. Who to contact

c. What information to collect

The procedure guide may be used by company security professionals in the future. Hence, all steps listed should be clear and self-explanatory.

Reference no: EM132577532

Questions Cloud

Strict security policy interpretation : In your opinion, does strict security policy interpretation provide better security than a less strict interpretation? Why or why not?
Calculate the number of shares xyz : XYZ Inc., and Thor, Inc. have entered into a stock swap merger agreement whereby XYZ will pay a 20% premium over Thor's premerger price
How many orders should make in a year : Advise Mr. Litali on how many orders he should make in a year. 27/06/2020 1,100 chipsets were acquired at Kshs 4,000 per unit
Appropriate finance theories : Researchers document significant first trading day share price increases in a large sample of initial public offerings
Malware protection procedure guide : What does "malware free" mean? How can a user demonstrate that their computer or device is malware free? Ensuring anti-malware software and data is up to date.
Analyze the importance of school cultural theory : A school cultural theory has been one of the significant measures utilized in the learning institution. Analyze the importance of school cultural theory
Solve budgeted fmoh costs per machine-hour : Solve Budgeted FMOH costs per machine-hour. Budgeted VMOH costs per machine-hour. Budgeted number of machine-hours allowed for actual output achieved.
Stock performance based on sharpe measure : You are assigned to evaluate the performance of the QAC stock. You collect the past data on the risk-free assets, the stock
What is the project modified irr : Timco's CEO attended a conference and heard about the modified IRR. He decides that this is what the company should use to analyze projects

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Difference in real gdp per capita between country

Suppose that yA(0) = yB(0) = 1, gA = 2% and gB = 4%. What is the (log) difference in real GDP per capita between country A and B when t = 50?

  Determine which guilds are affected more

The two forest locations are "Low," the forest edge and forest fragment are "Moderate," and the two pasture locations are "High." The data are given in Table 3.4. Perform an analysis to determine which guilds are affected more or which are affecte..

  Calculate the net expected value for the project risks

Calculate the net expected value for the project risks and opportunities cited above. How much should you plan for your contingency reserve budget based on the above?

  Complex risk assessment techniques

How does efficient frontier analysis differ from other forms of complex risk assessment techniques?

  Describe the process of ood

Splash Screen. When the program first fires up, have it print a short introductory message about the program and buttons for "Let's Play" and "Exit." The main interface shouldn't appear unless the user selects "Let's Play."

  Explain possible sources of upward bias in the rate

Using the arguments presented in the chapter, explain possible sources of upward bias in the rate you calculate, relative to the actual trend of food prices.

  Purpose of the logical network perimeter mechanism

Describe the purpose of the logical network perimeter mechanism and how it establishes a logical boundary. Further, list the components commonly used to create a logical network perimeter. How does this get implemented? Find a company who uses it..

  Any tactics to reduce negative connotations

What happens to the organizational climate when this resistance occurs and any tactics to reduce negative connotations when dealing with change.

  Describe the concept of the ternary relationship

Is a ternary relationship the equivalent of the three possible binary relationships among the three entities involved? Explain.

  External share between the two domains

You have two domains (contoso.com and adatum.com) that have an external share between the two domains. You want to configure selective authentication. What should you do.

  Evolution of a data warehouse

Briefly describe the factors which have led to the evolution of a data warehouse?

  Income stream of nine equal annual withdrawals

He will use the $430,000 and any interest earnings to provide an income stream of nine equal annual withdrawals. If 4.2% interest can be earned on any amount

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd