Friday, March 8, 2019
Computer Virus and World Wide Web Essay
1. Workstation and desktop devices atomic number 18 prone to vir accustoms, malwargon, and malicious software system, especially if the drug substance abuser surfs the Internet and World ample Web. Given that users connect to the Internet and World Wide Web, what security countermeasures rat organizations implement to help mitigate the risk from viruses, malware, and malicious software?Organizations trick restrict specific sites, key words like blogs, mirror sites and such. Organizations lavatory also make sure specific ports are shut gloomy this arse prevent back doors when accessing a site. There are a serving of web sites out there that do not hold accessibility, especially for a fashion environment.2. Your employees e-mail file attachments to each other and externally through the organizations firewall and Internet connection. What security countermeasures stick out you implement to help mitigate the risk of rouge e-mail attachments and universal resource locator We b connectednesss?The basic step would be to not bequeath hyperlinks to mechanically work when in an e-mail. Some times when a link is in a user can click and it will automatically launch it. Another step would be for the e-mail to have the users signature. This is usually verified through the users machine, for subject in the military we have a Common Access Card. This plank is a form of identification on multiple levels, in score for you to access your e-mail you need to log in with your CAC and enter your pin. When you accuse an mail it has a signature on it based on the cypher in your CAC, this way the person receiving the e-mail knows it is from you. Another way of doing it is by having public keys and private keys, this way both users know it is from the individual.3. Why is it recommended to do an antivirus signature file update before get alonging an antivirus examine on your computer?From what the lab showed me and from my understanding it is because the scan will n ot scan encrypted files. The signature file would have been able to pick it up and it would work in tangent with the scan.4. Once a malicious file is institute on your computer, what are the default settings for USB/removable device scanning? What should organizations do regarding use of USB hard drives and slots on existing computers and devices? Some devices have sequential numbers associated with them, and this string is optional. This is defaulted with thumb drives, USB hard drives and PDAs. Most scanning and tracking details would be of most use with the USB mass storage devices. Organizations should flat remove the AUTO run feature This is basic in the military, either one would be able to come in and throw a thumb drive and automatically run whatever it is on it reservation it a vulnerability.5. If you find a suspect executable and wish to perform dynamic analysis what does that mean? Dynamic analysis is the testing and evaluation of a program by executing data in real -time. The neutral is to find errors in a program while it is running, rather than by repeatedly examining the code offline 6. What is a malware and malicious code sandbox?This can be potentially dangerous but it is looked like as a sandbox. This is by running the virus, preferably in a machine with confine access to a network and something that isnt much of a use and executing the virus in real time. This way you can debug the virus and see what is it doing so you can detected and prevent it.7. What are typical indicators that your computer system is compromised? It is slow, everything you do takes a lot long-run to perform. You are missing data, your peripherals are not responding or they are performing automatic actions. Your computer starts up during odd hours and it is used as a zombie computer. You have additional items on your browser, you have an entirely diverse browsers, items are opening up and there are a lot of pop ups.8. Where does AVG Business Edition 2012 place v iruses, Trojans, worms, and other malicious software when it finds them? According to the lab it is quarantined, it is isolated and then removed by the users request. I am assuming it is then directed to the AVG corporations for provided analysis fir updates.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.