What does malware free mean

Assignment Help Computer Engineering
Reference no: EM132578014

Assignment: Always Fresh allows external users, such as vendors and business partners, to access the Always Fresh Windows environment. You have noticed a marked increase in malware activity in the test environment that seems to originate from external users. After researching the likely source of new malware, you conclude that allowing external users to connect to your environment using compromised computers exposes Always Fresh to malware vulnerabilities.

After consulting with your manager, you are asked to create a policy that will ensure all external computers that connect to Always Fresh environment are malware free. You create the following policy:

"To protect the Always Fresh computing environment from the introduction of malware of any type from external sources, all external computers and devices must demonstrate that they are malware free prior to establishing a connection to any Always Fresh resource."

Consider the following questions:

1. What does "malware free" mean?

2. How can a user demonstrate that their computer or device is malware free?

3. What are the steps necessary to establish a malware-free computer or device?

4. How should Always Fresh verify that a client computer or device is compliant?

Tasks: Create a malware protection procedure guide that includes steps for installing and running anti-malware software. Fill in the following details to develop your procedure guide:

1. Provide a list of approved anti-malware software solutions-include at least three leading antivirus and two anti-spyware products. You may include Microsoft products and third-party products. Instruct users to select one antivirus and one anti-spyware product and install them on their computer.

2. Describe the process of:

a. Ensuring anti-malware software and data is up to date. Mandate daily updates.

b. Running regular malware scans. Mandate that automatic scans occur whenever the computer is idle. If that setting is unavailable, mandate daily fast scans and biweekly complete scans.

3. Provide steps to follow any time malware is detected.

a. Immediate reaction-what to do with current work, leave the computer on or turn it off

b. Who to contact

c. What information to collect

The procedure guide may be used by company security professionals in the future. Hence, all steps listed should be clear and self-explanatory.

Scenario: Always Fresh is expanding. The company is adding another application server and several workstations. As the IT infrastructure grows, it becomes more difficult to manage the added computers and devices.

Consider the Windows servers and workstations in each of the domains of a typical IT infrastructure. Based on your understanding of Group Policy, determine possible Group Policy Objects that will make it easier to manage groups of computers. Focus on common aspects of groups of computers, such as permissions for workstations or printers defined for use by groups of users.

Tasks: Recommend Group Policy Objects for the Always Fresh environment in a summary report to management. You must defend your choices with valid rationale.

Reference no: EM132578014

Questions Cloud

What is the organizational structure of the fed : What is the organizational structure of the Fed? How does the Fed influence monetary policy?
Discussion about the advanced operating systems : The control of the serialization of memory management is difficult in a "Virtual Memory" and especially when "Virtual Machines" are included.
Reach the break-even point : If fixed costs are $183,300, how many dollars of revenue must the company generate in order to reach the break-even point?
Use in investigations of the windows registry : Chapter 5 of the text discusses RegRipper, a forensics tool for use in investigations of the Windows Registry.
What does malware free mean : What does "malware free" mean? How can a user demonstrate that their computer or device is malware free? What are the steps necessary to establish a malware.
Favorite open source system : Go to the website of your favorite open source system. On the site, look for the architectural documentation of that system.
What are the company most important resources : A company's resources and capabilities are integral to achieving sustainable competitive advantage. Refer to your Thompson (2020) readings and the required.
How many futures contracts should the farmer trade : How many futures contracts should the farmer trade (long or short) to completely hedge against price risk?
Example of complex hybrid system : Describe the complex email system as shown within the image "Example of a Complex Hybrid System." below.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd