Malware protection procedure-what does malware free mean

Assignment Help Basic Computer Science
Reference no: EM132436981

Project Part 3: Malware Protection Procedure Guide

Scenario

Always Fresh allows external users, such as vendors and business partners, to access the Always Fresh Windows environment. You have noticed a marked increase in malware activity in the test environment that seems to originate from external users. After researching the likely source of new malware, you conclude that allowing external users to connect to your environment using compromised computers exposes Always Fresh to malware vulnerabilities.

After consulting with your manager, you are asked to create a policy that will ensure all external computers that connect to Always Fresh environment are malware free. You create the following policy:

"To protect the Always Fresh computing environment from the introduction of malware of any type from external sources, all external computers and devices must demonstrate that they are malware free prior to establishing a connection to any Always Fresh resource."

Consider the following questions:

1. What does "malware free"mean?

2. How can a user demonstrate that their computer or device is malwarefree?

3. What are the steps necessary to establish a malware-free computer ordevice?

4. How should Always Fresh verify that a client computer or device iscompliant?

Tasks

Create a malware protection procedure guide that includes steps for installing and running anti-malware software. Fill in the following details to develop your procedure guide:

1. Provide a list of approved anti-malware software solutions-include at least three leading antivirus and two anti-spyware products. You may include Microsoft products and third-party products. Instruct users to select one antivirus and one anti-spyware product and install themon theircomputer.

2. Describe the processof:

a. Ensuring anti-malware software and data is up to date. Mandate dailyupdates.

b. Running regular malware scans. Mandate that automatic scans occur whenever the computer is idle. If that setting is unavailable, mandate daily fast scans and biweekly completescans.

3. Provide steps to follow any time malware isdetected.

a. Immediate reaction-what to do with current work, leave the computer on or turn itoff

b. Who tocontact

c. What information tocollect

The procedure guide may be used by company security professionals in the future. Hence, all steps listed should be clear and self-explanatory.

Reference no: EM132436981

Questions Cloud

Overgrowth of harmful bacteria in the stomach tract : poor fat digestion, overgrowth of harmful bacteria in the stomach tract, inability to store many nutrients, frequent choking of food
Nutrition research proposal : Now that you have developed a nutrition research proposal, what are your thoughts about the process? How was this experience for you?
Define the cornerstone xenobiotic pharmacokinetic properties : Define the term concentration of metal that is considered toxic and symptoms of toxicity by metal.Discuss cornerstone xenobiotic pharmacokinetic
Stronger culture of appreciation in general : Or should we just have a stronger culture of appreciation in general for both partners?
Malware protection procedure-what does malware free mean : What does "malware free"mean? Create a malware protection procedure guide that includes steps for installing and running anti-malware software.
Write a review of a public domain business : Write a review of a public domain business considering the issues covered across the course. This task requires you to write a report on a public domain busines
Leading causes of death in the united states : Discuss how poor nutrition is related to the leading causes of death in the United States. How do nutrients contribute to health?
Determine the amount of annual depreciation : Question - Depreciation by Two Methods. Determine the amount of annual depreciation by the straight-line method
Pick any food item with a nutrition facts label : First, pick any food item with a Nutrition Facts label. Write down the name of the product and then make a list of the following:

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd