Review the antivirus program and ensure

Assignment Help Basic Computer Science
Reference no: EM131268812

After the productive team meeting, Dr. Sallkind, from Valley Healthcare, wants to engage you in further analysis to establish a plan to mitigate risks, threats, and vulnerabilities. You have determined that a malware attack presented a dialog box to the employees of Valley Healthcare. This dialog box was disguised as a Windows request for their login credentials to install a security patch. When one employee entered his credentials, the malicious software was installed. Even if Valley Healthcare had the most sophisticated perimeter defense, it would not have prevented this. As part of the mitigation plan, your team will configure baseline security on all workstations. You will ensure that the antivirus software is running properly, identify unnecessary software and services, and implement a control related to password hacking attempts. You have also been asked to provide a security reminder training for all employees.

Tasks

Using a computer that has Windows 7 installed (if possible):

  • Review the antivirus program and ensure it is up to date and running a full scan of the system.
  • Identify at least five unnecessary services from the default installation of Windows.
  • Think about how you can provide security training in 30 minutes.
  1. What antivirus (AV) program and what version of the AV is the computer running? Is this the latest version?
  2. What 5 unnecessary services from the default installation did you identify?
  3. What steps would you take to turn on auditing and what type of information would you expect to appear in the log file?
  4. Provide an outline of the training you will provide for the employees of Valley Healthcare. What will you do to make sure that security awareness doesn't go away after the training is finished?

Reference no: EM131268812

Questions Cloud

Build a simple network : Discuss with your Learning Team the components and behaviors of devices needed to build a simple office network based on the following office scenario:
Build to logical and obvious prediction : A description of your creative process including: what it looks like, how it is similar to or different from when you first started the course, what affects it, supports it, and/or derails it. How does it change when working with others? Make sure yo..
Difference between half and full duplex communication : Discuss examples of communication or network devices such as voice phones, pagers, intercoms, hubs, switches, wireless access points, etc. and describe why they are characterized as half or full duplex systems. Discuss how the use of a switch, as ..
What is the point of diminishing returns : When is the rate of change of sales increasing and when is it decreasing? What is the point of diminishing returns and the maximum rate of change of sales?
Review the antivirus program and ensure : Review the antivirus program and ensure it is up to date and running a full scan of the system. Identify at least five unnecessary services from the default installation of Windows. Think about how you can provide security training in 30 minutes.
Provide functionality for insertion alongside edition : provide functionality for insertion alongside edition and deletion. Implement field checking for empty fields. -We talked about this on slides and the video contains some information regarding this- Create another table called Admin and include col..
Important role parents play in a childs early learning : Write a 3 page research paper discussing the important role parents/caregivers play in a child's early learning experiences.
Statements is true of the plaintiffs case : Which of the following statements is true of the plaintiff's case? The plaintiff's attorney examines the witnesses during cross-examination.
How would you assess weinbach''s use of feedback : Which communication method did CEO Weinbach use within his first few days, with customers and shareholders, and then with employees? Which method of communication did he primarily use with all three groups?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd