What does malware free mean

Assignment Help Basic Computer Science
Reference no: EM132696127

Scenario

Always Fresh allows external users, such as vendors and business partners, to access the Always Fresh Windows environment. You have noticed a marked increase in malware activity in the test environment that seems to originate from external users. After researching the likely source of new malware, you conclude that allowing external users to connect to your environment using compromised computers exposes Always Fresh to malware vulnerabilities.

After consulting with your manager, you are asked to create a policy that will ensure all external computers that connect to Always Fresh environment are malware free. You create the following policy:

"To protect the Always Fresh computing environment from the introduction of malware of any type from external sources, all external computers and devices must demonstrate that they are malware free prior to establishing a connection to any Always Fresh resource."

Consider the following questions:

1. What does "malware free" mean?

2. How can a user demonstrate that their computer or device is malware free?

3. What are the steps necessary to establish a malware-free computer or device?

4. How should Always Fresh verify that a client computer or device is compliant?

Tasks

Create a malware protection procedure guide that includes steps for installing and running anti-malware software. Fill in the following details to develop your procedure guide:

1. Provide a list of approved anti-malware software solutions-include at least three leading antivirus and two anti-spyware products. You may include Microsoft products and third-party products. Instruct users to select one antivirus and one anti-spyware product and install them on their computer.

2. Describe the process of:

a. Ensuring anti-malware software and data is up to date. Mandate daily updates.

b. Running regular malware scans. Mandate that automatic scans occur whenever the computer is idle. If that setting is unavailable, mandate daily fast scans and biweekly complete scans.

3. Provide steps to follow any time malware is detected.

a. Immediate reaction-what to do with current work, leave the computer on or turn it off

b. Who to contact

c. What information to collect

The procedure guide may be used by company security professionals in the future. Hence, all steps listed should be clear and self-explanatory.

Reference no: EM132696127

Questions Cloud

Business problem that requires data mining : Write a paper on a business problem that requires data mining, why the problem is interesting, the general approach you plan to take,
Discuss how a policy of providing a refund for customers : Discuss how a policy of providing a refund for customers that have simply changed their mind should be accounted for under accounting standards.
Provide all necessary journal entry to account for one year : Alba Electronics provides a one-year warranty, Provide all necessary journal entries to account for the one-year warranty in the 2019/20 financial year.
What are challenges to mobile forensics : What are mobile forensics and do you believe that they are different from computer forensics? What are challenges to mobile forensics?
What does malware free mean : What does "malware free" mean? How can a user demonstrate that their computer or device is malware free?
Make the general journal entry for the august : Make the General Journal entry (without explanation) for the August 31, 2018 monthly lease payment. If no entry is required then write "No Entry Required."
How employers should account for the pandemic leave : Many employers have provided their employees with 10 days. Discuss how employers should account for this pandemic leave under AASB 119 Employee Benefits.
Creating lottery program using arrays and methods : Describe how you would create a Java program for creating a lottery program using arrays and methods.
Why most groupware is deployed today over the web : Explain why most groupware is deployed today over the Web. Compare Simon's four-phase decision-making model to the steps in using GDSS.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Begin the drawing by constructing triangle abc

The driven wheel rotates one-fourth turn every time the drive pin enters and leaves a slot. Begin the drawing by constructing triangle ABC; then locate point P and center line CP. After the drawing is complete, measure angle X.

  Identification of current skilled information systems

Identification of current skilled information systems personnel in position and responsibilities. A description of current outsourcing and offshoring activities

  Price elasticity of demand for a monopolistic competitor

What factors determine the price elasticity of demand for a monopolistic competitor?

  Would the variable of interest in this problem

Would the variable of interest in this problem be quantitative or qualitative?

  Calculate the average and strike rate of all players

Read the team members' family names from the first data file and store them (wherever your program design says it is best to do so). There will be 15 names. You may then close the first file.

  Appropriate disciplinary action for the employees

Determine and explain the appropriate disciplinary action for the employees involved in this situation and identify motivational alternatives that can help turn the situation around;

  Application software and system software inventions

List 2 application software and 2 system software inventions that took place in the past 10 years. When was the software invented/introduced? What was the invention? Who invented/introduced the software? You should have a total of 4 inventions lis..

  How long will it be before you have enough to buy the car

You have $40,000 today that can be invested t your bank. The bank pays 4.8% annual interest on its accounts.

  What normalization is used for and why

What normalization is used for and why

  Facilitating effective collaboration in IT

Discuss at least three 3 steps for facilitating effective collaboration in IT.

  Pursue information technology major in college

Essay about yourself and explain why you want to pursue Information Technology major in college.

  Write script that enables user to enter eigher a fahrenheit

Use these functions to write a script that enables the user to enter eigher a Fahrenheit or a Celsius temperature and displays the Celsius or Fahrenheit equivalent.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd