Summary

Summary

A malware protection procedure guide 2

A malware protection procedure guide

A malware protection procedure guide

User access websites and download files from unknown sources which could compromise user system such file or application know as malware or malicious software. Which can Record keystroke, leak personal information, get user credential or credit card or bank detail of user, Malware can also use to control user machines remotely.

Common Malware type is Virus, Trojan, Worm, spyware, Backdoor, Rootkit. Every day new malware and viruses are detected. Best practices for the defending system from malware is an update and implement antivirus scanning and patching regularly. On updating the antivirus program, we download new definitions, then start looking for new viruses listed in the definition.

a. List of approved anti-malware software

a. AVG Business Edition

b. Windows defender

c. Bitdefender Gravity Zone Advance Business security

Anti-Spyware

A. Total AV

B. Norton by Symantec

Antivirus software is running and identifying any malware before it causes trouble. Symptoms of malware infection are Slow response opening application, abnormal application behavior, OS not functioning correctly, Numerous windows pop up on the screen. We will use AVG, an antivirus program, to identify malware or spyware on the system. Manual scan good temporary measure but in real-time scan should perform regular intervals that minimizes impact to users.

Ensuring anti-malware software and data is up to date. Always ensure that the system running on the latest security patch helps to protect the system form other security risks or virus attacks. All workstations have an antivirus with updated virus definition, detection, and repair engine. Schedule a daily fast scan to check for viruses such as activity we can conduct during non-peak hours, such as during lunch break. Also, we can schedule a complete scan on Sunday when the system is performing minimal activities. Always scan removable disk and files downloaded from the internet before using it. Also, backup all programs and data regularly. Recovery from clean backup is the best way to restore files. We can also review logs to find any anomalies.

If any system is get attacked with malware, the IT administrator should disconnect those systems from the network to prevent further damage from the attacker.IT admin wants to know about the infection to stop it spreading or compromising our person file. Use a deep scan option and check for any possible malware infection. If we found any malware, remove it. If we did not find anything and we still feel something is not right boot system in safe mode. In safe mode, minimum required services and programs will load and prevent any malware is set to startup when OS starts and if PC working fast in safe mode means possible malware infection. “Before starting anything, delete temporary files to accelerate the malware scan, while clearing downloaded virus files.” (Elsie Otachi,2019)

Reference

  1. Otachi, E. (2019, September 17). What To Do If You Think Your Computer Or Server Has Been Infected With Malware. Retrieved from https://helpdeskgeek.com/help-desk/what-to-do-if-you-think-your-computer-or-server-has-been-infected-with-malware/
  2. Solomon, M. (2011). Security strategies in windows platforms and applications. Sudbury, MA: Jones & Bartlett Learning.(Chapter 5)

The post Summary appeared first on best homeworkhelp.

 

“Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!”

We offer homework writing services with you in mind. Our homework help service is made to meet your demands, whatever the challenge. Every paper is written from scratch by experts in your field. You can order essays, discussion, article critique, coursework, projects, case study, term papers, research papers, reaction paper, movie review, research proposal, capstone project, speech/presentation, book report/review, annotated bibliography, and more.

Your Writing Help Service in a Nutshell

PLACE YOUR ORDER