Preview

Description: Malicious Code And Activity Task

Better Essays
Open Document
Open Document
932 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Description: Malicious Code And Activity Task
Classification Description: Malicious Code and Activity

Task

Base on the premise that there is a mix of computers running Windows 2000, Windows XP, Windows Vista, Windows 7, and Mac OS X, you must research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses, and other related forms of intentionally created deviant code.

Introduction

Malicious software is written with the intent to damage or infect the system of Richman Investment. Malicious code or software is a threat to any internet-connected device or computer. The main goal of the attack is to affect one of the three information security properties which are Confidentiality,
…show more content…
* IDS and IPS monitoring of incoming and outgoing network traffic, including anti-virus, anti-spyware and signature and anomaly-based traffic monitors.

* Routing ACLs that limit incoming and outgoing connections as well as internal connections to those necessary for business purposes.

* Proxy servers that inspect incoming and outgoing packets for indicators of malicious code and block access to known or suspected malware distribution servers.

* Filtering to protect against attacks such as cross-site scripting and SQL injection.

User Level

* User education in awareness, safe computing practices, indicators of malicious code, and response actions.

Preventive Techniques

Network Users (including departmental staff on permanent, temporary, contract or casual tenure):

* Ensure they do not disable or interfere with the operation of antivirus software.

* Ensure corporate/education and TAFE personal computers/laptops in use are regularly made available for antivirus software updates.

* Exercise caution when opening email and related attachments.

* Do not download software from the Internet unless authorized by senior management and the technology support officer. Risks may include infringement of copyright in addition to introduction of malware or malicious
…show more content…
* Report incidents of security breaches in relation to incidents of malware and malicious code infection and any unusual related behavior to their immediate supervisor.

* Isolate infected computers from the network quickly to prevent further infection. To isolate the computer, either turn it off or disconnect the network cable.

* Scan all files and information contained on portable media and storage devices (such as DVDs, USB drives, floppy disks, etc.) for malware and malicious code prior to being used on any department information systems (such as laptops, PDAs, desktop computers, etc.).

Definitions

Antivirus

Anti-virus software is used to prevent, detect and remove a range of malware, including computer viruses, worms, trojan horses, adware and spyware.

Computer Virus

Computer program that can copy itself and infect a computer. The term ‘computer virus’ is sometimes used as a catch-all phrase to include all types of malware, including true viruses.

Malicious Code

A piece of unwanted computer software or code introduced into another program, attached to a document or exists on its own, for malicious purposes.

You May Also Find These Documents Helpful

  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. By conducting security awareness training, you can educate the user/employee on the policies and standards. Also make the user/employee aware of the violation consequences if the said policies and standards are broken. To further implement this security awareness plan, follow up by sending out reminder/updates in a bi-weekly email and flyer handout.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    ISA 650 Final Exam Paper

    • 4435 Words
    • 18 Pages

    73. Requires the creation of computer security plans, and the appropriate training of system users or…

    • 4435 Words
    • 18 Pages
    Satisfactory Essays
  • Good Essays

    Iscm Strategic Plan

    • 1276 Words
    • 6 Pages

    To the extent possible, organizations should identify, report, and remediate vulnerabilities in a coordinated, organization-wide manner using automated vulnerability and patch management tools and technologies. Vulnerability scanners are commonly used in organizations to identify known vulnerabilities on hosts and networks and on commonly used operating systems and applications. These scanning tools can proactively identify vulnerabilities, provide a fast and easy way to measure exposure, identify out-of-date software versions, validate compliance with an organizational security policy, and generate alerts and reports about identified…

    • 1276 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Cybersecurity Trends

    • 530 Words
    • 3 Pages

    Every year, millions of viruses are released through the Internet. The FBI reports that there are a variety of cyber-threats, such as identify theft, Internet fraud and cyber-crimes related crimes like terrorism.…

    • 530 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    A virus is a self-replicating program that copies itself from machine to machine, usually over a network. Viruses spread by attaching themselves to other programs. They have various effects, from displaying harmless messages to erasing hard disks. Unlike worms, viruses focus on damaging local data (Oz, 19). A virus can be embedded in a Trojan horse. A Trojan horse is a useful program, like a game, that has malicious software deliberately embedded within it. There are other poorly written software which are vulnerable to an SQL injection attack.…

    • 1128 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Virus Essay

    • 437 Words
    • 2 Pages

    A computer virus is a program that can copy itself and infect a computer without the user knowing. Some viruses are made to damage the computer by damaging programs, deleting files, or reformatting the hard disk. Others are not designed to do any damage, but replicate themselves and perhaps make their presence known by displaying text, video, or audio messages. Even these benign viruses can create problems for the computer. They usually take up computer memory used by other programs. As a result, they often cause crazy behavior and can result in system crashes. Also many viruses are bug-ridden, and these bugs may lead to system crashes and data loss.…

    • 437 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The security policy should include “Acceptable uses”, Uses of “Antivirus”, use of “Host based Intrusion Prevention System”…

    • 732 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    A computer virus is a piece of software that negatively affects the performance of a computer system. They may damage files, deny access to files or resources or be used to monitor the user’s personal data. A computer virus may come in different forms and is usually referred to as ‘malicious software’ hence the name malware.…

    • 259 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Internet & Email Threats

    • 1178 Words
    • 5 Pages

    A program that infects a computer by attaching itself to another program, and propagating itself when that program is executed. A computer can become infected by files downloaded over a network, or by the installation of new software or floppy disks that are infected with viruses as well as email attachments. Some viruses are only pranks, and perform harmless actions like displaying a screen with a joke message on it. Others can destroy files or wipe out a hard drive.…

    • 1178 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Computer Threats

    • 944 Words
    • 4 Pages

    A virus is a program written intentionally to change the way your computer operates without your permission or knowledge. Their behavior is similar to how real-life biological viruses work, and the ways of dealing with them can be quite similar as well!…

    • 944 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Antivirus Programs

    • 299 Words
    • 2 Pages

    Today, people rely on computers to create, store, and manage critical information, many times via a home computer network. Information transmitted over networks has a higher degree of security risk than information kept in a user’s home or company premises. Thus, it is crucial that they take measures to protect their computers and data from loss, damage, and misuse resulting from computer security risks. Antivirus programs are an effective way to protect a computer against viruses.…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. The original may modify the copies or the copies may modify themselves. A virus can only spread from one computer to another when its host is taken to the uninfected computer.A person might have a computer virus infection when the computer starts acting differently.These viruses may ‘corrupt' or damage various files on your computer and thus its important to protect your computer from viruses.…

    • 1131 Words
    • 5 Pages
    Good Essays
  • Good Essays

    As companies increasingly rely on the data contained on their computer systems, threats to the data are also growing. Threats to data, or to information, can come in the form of a breach of confidentiality, a violation of integrity, or a denial of availability. These threats can come from various sources including computer hackers with malicious intent, natural or unnatural disasters, the lack of security policies, the failure to enforce security policies and computer viruses. Computer viruses pose as serious a threat to data as can a malicious hacker. In order to thoroughly protect a company’s information, one must focus on protecting against all possible threats, including computer viruses. Although infection of computer systems by a virus is generally unintentional, the possibility of infection is real and without the proper protection, imminent. Computer viruses are designed to spread from one file to another, from one program to another, from one machine to another, and even from one network to another. Viruses threaten the integrity and availability of data. Data have become the backbone of most companies today, and therefore any threat to a company’s data cannot be tolerated. Time, resources and money must be invested to protect a company against the harmful and destructive intrusion of computer viruses. At first glance it would appear that protecting computers from viruses is a relatively simple task. On the surface this task involves selecting an anti-virus software package, installing it, and running the virus scan, rendering the computer virus-free. Unfortunately the process can be quite intricate, and require as much time and effort spent planning as on implementation. An enterprise wide anti-virus initiative involves numerous tasks, which at a high level can be broken into the following phases: planning, implementation and maintenance. Other phases may be identified for any given project and should be included as…

    • 766 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Suneel

    • 3434 Words
    • 14 Pages

    Antivirus or anti-virus software (usually written with the acronym of AV) is software used to prevent, detect and remove malware (of all descriptions), such as: computer viruses, maliciousBHOs, hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraudtools, adware and spyware. Computer security, including protection fromsocial engineering techniques, is commonly offered in products and services of antivirus software companies. This page discusses the software used for the prevention and removal of malwarethreats, rather than computer security implemented by software methods.…

    • 3434 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    A computer virus is an executable program. Depend on the nature of a virus, it may cause damage of your hard disk contents, and/or interfere normal operation of your computer.…

    • 375 Words
    • 2 Pages
    Good Essays