What does malware free mean

Assignment Help Computer Engineering
Reference no: EM132835462

Assignment: Project Part 3: Malware Protection Procedure Guide

Scenario: Always Fresh allows external users, such as vendors and business partners, to access the Always Fresh Windows environment. You have noticed a marked increase in malware activity in the test environment that seems to originate from external users. After researching the likely source of new malware, you conclude that allowing external users to connect to your environment using compromised computers exposes Always Fresh to malware vulnerabilities.

After consulting with your manager, you are asked to create a policy that will ensure all external computers that connect to Always Fresh environment are malware free. You create the following policy:

"To protect the Always Fresh computing environment from the introduction of malware of any type from external sources, all external computers and devices must demonstrate that they are malware free prior to establishing a connection to any Always Fresh resource."

Consider the following questions:

1. What does "malware free" mean?

2. How can a user demonstrate that their computer or device is malware free?

3. What are the steps necessary to establish a malware-free computer or device?

4. How should Always Fresh verify that a client computer or device is compliant?

Tasks: Create a malware protection procedure guide that includes steps for installing and running anti-malware software. Fill in the following details to develop your procedure guide:

1. Provide a list of approved anti-malware software solutions-include at least three leading antivirus and two anti-spyware products. You may include Microsoft products and third-party products. Instruct users to select one antivirus and one anti-spyware product and install them on their computer.

2. Describe the process of:

a. Ensuring anti-malware software and data is up to date. Mandate daily updates.

b. Running regular malware scans. Mandate that automatic scans occur whenever the computer is idle. If that setting is unavailable, mandate daily fast scans and biweekly complete scans.

3. Provide steps to follow any time malware is detected.

a. Immediate reaction-what to do with current work, leave the computer on or turn it off

b. Who to contact

c. What information to collect

The procedure guide may be used by company security professionals in the future. Hence, all steps listed should be clear and self-explanatory.

Reference no: EM132835462

Questions Cloud

What amount of cash should be reported at year-end : Savings deposit set aside for dividend payable on December 31, 2021. What amount of "cash and cash equivalents" should be reported at year-end
What are you offering the investors : What are you offering the investors? Why should they invest in your company? What do they gain?
What amount of realize gain should ribbon company recognized : What amount of realized gain should Ribbon Company recognized on the disposal of the security assuming the security was classified as investment
Find what amount of unrealized gain or loss on securities : Find What amount of unrealized gain or loss on these securities should be included in Morgan's profit or loss for the year ended December 31, 2012
What does malware free mean : Always Fresh allows external users, such as vendors and business partners, to access the Always Fresh Windows environment. You have noticed a marked increase.
What is the difference of low and remote inclusion : Why is dangerous? What is the difference of low and remote inclusion? What methods can me employed to prevent a security breach?
Find what is the amount of gain should the company recognize : Find what is the amount of gain or loss should the company recognize in its 2015 profit or loss as a result of the redesignation?
What is the amount of depreciation expenses : What is the amount of depreciation expenses that should be recognized on the income statement for the year ended on December 31, 2020
Discuss the reasons for different accuracies : Python code to run those classifiers on the test data and compare their results and accuracy. Discuss the reasons for different accuracies.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write a formula using each of the arithmetic operators

Write a formula using each of the arithmetic operators with those two numbers. Solve each formula the way Java would solve it.

  Compute the bubble point temperature for mixture containing

Compute the bubble point temperature for mixture containing 10 mole % 1-propanol, 70 mole % 1-butanol, and 20 mole % 1-pentanol at pressure equal to 1000 mm Hg.

  Write a data validation loop that prompts the user

Write a data validation loop that prompts the user and gets a value of type Month_Type.

  Questionwhen running snort ids why may there be no alertsif

questionwhen running snort ids why may there be no alerts?if we only went to a few web sites why are there so several

  Explore the considerations helpful when creating a terminal

explore the considerations useful when creating a terminal server farm including additional streams of business income

  What are the ramifications of a private company

What are the ramifications of a private company failing to implement the guiding framework or update/maintain their system in accordance.

  Does your microcontroller have a stop-clocks instruction

Does your microcontroller have a wait-6r-interrupt instruction? If so, what does it do (other than wait for the interrupt)?

  Write pseudocode to sum consecutive odd integers

Write pseudocode to sum consecutive odd integers. Let the lowest odd integer be L and the highest odd integer be H, and let both L and H be provided.

  Develop a report regarding the impact of IT developments

ICTICT511 Match ICT needs with the strategic direction of the enterprise Assignment, Baxter Institute, Australia. Report regarding the impact of IT developments

  Assignment cores on computer systemssingle-processor

assignment cores on computer systemssingle-processor computers were able to handle and process smaller sets of data.

  Write a prolog program that solves the 8 queens problem

Write a PROLOG program that solves the 8 queen's problem (location of 8 queens on a chess board so that no queens have each other in check.)

  What is the advantage when target is throughput and security

What is the advantage when target is throughput and securityty

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd