What does malware free mean

Assignment Help Basic Computer Science
Reference no: EM132652139

Scenario

Always Fresh allows external users, such as vendors and business partners, to access the Always Fresh Windows environment. You have noticed a marked increase in malware activity in the test environment that seems to originate from external users. After researching the likely source of new malware, you conclude that allowing external users to connect to your environment using compromised computers exposes Always Fresh to malware vulnerabilities.

After consulting with your manager, you are asked to create a policy that will ensure all external computers that connect to Always Fresh environment are malware free. You create the following policy:

"To protect the Always Fresh computing environment from the introduction of malware of any type from external sources, all external computers and devices must demonstrate that they are malware free prior to establishing a connection to any Always Fresh resource."

Consider the following questions:

1. What does "malware free"mean?

2. How can a user demonstrate that their computer or device is malwarefree?

3. What are the steps necessary to establish a malware-free computer ordevice?

4. How should Always Fresh verify that a client computer or device iscompliant?

Tasks

Create a malware protection procedure guide that includes steps for installing and running anti-malware software. Fill in the following details to develop your procedure guide:

1. Provide a list of approved anti-malware software solutions-include at least three leading antivirus and two anti-spyware products. You may include Microsoft products and third-party products. Instruct users to select one antivirus and one anti-spyware product and install themon theircomputer.

2. Describe the processof:

a. Ensuring anti-malware software and data is up to date. Mandate dailyupdates.

b. Running regular malware scans. Mandate that automatic scans occur whenever the computer is idle. If that setting is unavailable, mandate daily fast scans and biweekly completescans.

3. Provide steps to follow any time malware isdetected.

a. Immediate reaction-what to do with current work, leave the computer on or turn itoff

b. Who tocontact?

c. What information tocollect

The procedure guide may be used by company security professionals in the future. Hence, all steps listed should be clear and self-explanatory.

Reference no: EM132652139

Questions Cloud

The global treps project : The Global Treps Project team is working hard to ensure they meet expectations,
Several big data visualization tools : Several Big Data Visualization tools have been evaluated in this week's paper.
Describing how knowledge-skills of cloud computing : Develop a paper describing how the knowledge, skills, or theories of the course CLOUD COMPUTING have been applied or could be applied,
What are the payoffs at the final nodes of the tree : A stock price is currently $34. During each three-month period for the next six months it is expected to increase by 8% or decrease by 7%.
What does malware free mean : What does "malware free"mean? How can a user demonstrate that their computer or device is malwarefree?
What is the opportunity cost-alfajores havanna : One of your first assignments is to help the local team assess the company's current investments. See below for a series of items you've been asked to analyze.
Discuss clinical narrative using the unfolding case study : Discuss the clinical narrative provided here using the unfolding case study format to promote situated learning of clinical reasoning.
Advantages and disadvantages of cloud-based storage : Discuss the advantages and the disadvantages of Cloud-Based Storage. Give at least two examples of real world Cloud-Based Database.
What is the duration and convexity of the portfolio : Assume you have a portfolio zero coupon bonds. The first bond is 15 year bond with yield of 3.5% and the other bond is 5 year bond with a yield of 2.8%.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Assignment incorporates the concepts from prior

The following assignment incorporates the concepts from prior weeks (variables, if-else logic, loops, and arrays), along with this week's topic of file input/output process.

  Information on the cia triad

Search the Web for information on the CIA Triad. How does this concept impact security efforts in the real world and what is it used for?

  Designing an application server

Designing an Application Server

  How to write an extensive outline

How to write an extensive outline? Use five examples to show the difference between Windows Server 2008 and Windows Server 2012.

  Question regarding the multidimensional model

You are working on a DW/BI project for a clothing retailer. They want to better understand the details surrounding what's selling in each store.

  What sizes in memory in c++ and size of a char and a string

What are the sizes in memory of other data types in C++? I mean, I know that a double is 8 bytes and an int is 4 bytes. What is the size of a Char and a String?

  Implications of smith governance model

What were the implications of Smith's governance model about the role of the WestJet CIO and the skills required to be effective in that position?

  What are the basic algorithms one uses

Please list and discuss thoroughly what are the basic algorithms one uses with a linked list data structure for me?

  Revise the implementation of the adt binary search tree

Revise the implementation of the ADT binary search tree to add this new feature by adding the data member last Accessed to the class.

  What is enterprise information architecture

What is Enterprise Architecture? What is Enterprise Information Architecture? What is the relationship between the two or are they the same thing?

  Define culture and the major elements in a culture

Defend your position on whether or not culture can be managed and how firms can understand and improve their cultures to support IT management in a global enterprise. Your paper should be 3 pages in length, well-written, and formatted according to..

  Draw the block diagrams using the parallel methods

Mason's formula to show that you will get the same transfer function from the block diagrams.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd