Critical Thinking: Malware

User Generated

qvfthvfr

Programming

Securing the Enterprise Infrastructure with Cyber Security Techniques

Description

Assignment Details:

In an essay, answer the following questions based on the readings from this module:

  • How do you determine the type and location of malware present on the computer or device? Explain your rationale.
  • In your opinion, do you think that vulnerabilities can be minimized in the future? Why or why not?

Provide information from your readings to support your statements.

Deliverables:

Your essay should be 4-5 pages in length, incorporating at least two academic resources from the Library in addition to the case study. Cite all sources using University academic writing standards and APA style guidelines found in the Library, citing references as appropriate.


Course's textbook:
Solomon, M. G. (2014). Security strategies in Windows platforms and applications (2nd ed.). Burlington, MA: Jones & Bartlett Learning.

Unformatted Attachment Preview

Security Strategies in Windows Platforms and Applications Lesson 5 Protecting Microsoft Windows Against Malware © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Learning Objective and Key Concepts Learning Objective ▪ Install controls to protect a given Windows system from malware. Key Concepts ▪ Installing antivirus and anti-spyware software ▪ Maintaining a malware free Windows system ▪ Scanning and auditing Windows systems ▪ Tools and techniques for malware cleanup Security Strategies in Windows Platforms and Applications © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 2 Purpose of Malware Disrupt computer operations Security Strategies in Windows Platforms and Applications Gather sensitive information Gain unauthorized access © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 3 Types of Malware Programs that spread • Virus: infects other programs • Worm: self-contained program Programs that hide • Trojan horse: masquerades as a useful program • Rootkit: modifies programs to hide its presence • Spyware: covertly collects information Programs that generate funds • Ransomware: slows down the computer, encrypts files, or restricts acesss until a payment has been made Security Strategies in Windows Platforms and Applications © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 4 How Malware Spreads ▪ Opening infected e-mail messages ▪ Opening infected documents ▪ Over the network and via e-mail address books Security Strategies in Windows Platforms and Applications © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 5 How Malware Spreads (Continued) ▪ Following unknown links • Images • Embedded links in e-mail messages • Social media abbreviated links Security Strategies in Windows Platforms and Applications © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 6 Antivirus and Anti-Spyware Software Antivirus software Detects and mitigates many types of malware Focuses on viruses, worms, and Trojan horses, but may also address rootkits and spyware Antispyware software Detects and mitigates malware Uses multiple anti-spyware software products to ensure most spyware is detected Security Strategies in Windows Platforms and Applications © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 7 Procedure for Protecting Computers ▪ To be effective: • Keep antivirus/anti-malware software and definition files up to date • Periodically scan computers for malware Security Strategies in Windows Platforms and Applications © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 8 Resources for Developing Malware Eradication Plan Your anti-malware software’s support resources Security Strategies in Windows Platforms and Applications Microsoft’s online resources—specifically, the Microsoft Malicious Software Removal Tool © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 9 Malware Prevention Strategies ▪ Frequent media scans ▪ Multiple anti-malware software shields ▪ Frequent signature database updates ▪ Restrictive software installation policy ▪ Restrictive download policy ▪ Restrictive removable policy ▪ Limited Web browser functionality ▪ Don’t run in Administrator mode unless necessary Security Strategies in Windows Platforms and Applications © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 10 Summary ▪ Types of malware ▪ Indication of malware ▪ Anti-malware software ▪ Common areas of malware Security Strategies in Windows Platforms and Applications © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 11 Virtual Lab ▪ Identifying and Removing Malware from Windows Systems Security Strategies in Windows Platforms and Applications © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 12
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

hey buddy, here is the...


Anonymous
Awesome! Perfect study aid.

Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Similar Content

Related Tags