Thursday, July 18, 2019

Computer Virus and World Wide Web Essay

1. Workstation and desktop devices be prone to reckoner viruses, malw ar, and despiteful software, peculiarly if the exploiter surfs the net profit and mankind Wide Web. Given that users connect to the Internet and World Wide Web, what hostage countermeasures brook organizations implement to help mitigate the risk from viruses, malware, and malicious software?Organizations underside bind specific sites, key words analogous blogs, mirror sites and such. Organizations can also turn over sure specific ports are leave out down this can prevent adventure doors when plan of attacking a site. There are a lot of web sites out thither that do not take aim accessibility, especially for a work environment.2. Your employees e-mail tear attachments to each otherwise and externally by dint of and through the organizations firewall and Internet connection. What security countermeasures can you implement to help mitigate the risk of rouge e-mail attachments and universal resour ce locator Web links?The basic foot timber would be to not allow hyperlinks to mechanically work when in an e-mail. Some time when a link is in a user can click and it pull up stakes automatically launch it. other step would be for the e-mail to have the users skin senses. This is usually verified through the users machine, for example in the military we have a prevalent Access Card. This card is a defecate of identification on multiple levels, in order for you to access your e-mail you need to log in with your CAC and enter your pin. When you bare an mail it has a signature on it based on the figure in your CAC, this way the person receiving the e-mail knows it is from you. Another way of doing it is by having public keys and snobby keys, this way both users know it is from the individual.3. why is it recommended to do an antivirus signature turn on update before performing an antivirus glance over on your computer?From what the research laboratory showed me and from my understanding it is because the scan will not scan encrypted files. The signature file would have been able to overcharge it up and it would work in burn with the scan.4. Once a malicious file is found on your computer, what are the slackness settings for USB/removable device scanning? What should organizations do regarding use of USB hard drives and slots on be computers and devices? Some devices have serial rime associated with them, and this string is optional. This is defaulted with ripple drives, USB hard drives and PDAs. closely scanning and tracking details would be of most use with the USB mass remembering devices. Organizations should immediately remove the AUTO expect feature This is basic in the military, every one would be able to write out in and throw a thumb drive and automatically run whatsoever it is on it making it a vulnerability.5. If you rise up a suspect executable and invite to perform dynamic analysis what does that soaked? Dynamic analysis is the testing and paygrade of a program by penalise data in real-time. The objective is to baffle errors in a program trance it is running, rather than by repeatedly examining the code offline 6. What is a malware and malicious code sandpile?This can be potentially solemn but it is looked like as a sandbox. This is by running the virus, preferably in a machine with limited access to a network and something that isnt more of a use and executing the virus in real time. This way you can debug the virus and see what is it doing so you can detected and prevent it.7. What are typical indicators that your computer system is compromised? It is slow, everything you do takes a lot longer to perform. You are missing data, your peripherals are not responding or they are performing automatic actions. Your computer starts up during odd hours and it is used as a zombie computer. You have additive items on your browser, you have an entirely distinguishable browsers, items are opening up and in that location are a lot of originate ups.8. Where does AVG Business Edition 2012 place viruses, Trojans, worms, and other malicious software when it finds them? According to the lab it is quarantined, it is isolated and then removed by the users request. I am assuming it is then directed to the AVG corporations for except analysis fir updates.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.