Preview

Nt1330 Unit 3 Risk Management Essay

Good Essays
Open Document
Open Document
546 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Unit 3 Risk Management Essay
It is a common sense that systems and networks should be protected from the damage caused by Trojans, viruses, and Worms. Practices that can help to prevent infection include these:

1. Don’t run executable (.exe) files from unknown sources, including thoseattached to e-mail or downloaded from Web sites.
2. Don’t open Microsoft Office documents from unknown sources withoutfirst disabling macros.
3. Turn off the Preview and/or HTML mail options in your e-mail clientprogram.
4. Be careful about using diskettes that have been used in other computers.
5. Firewall software should be used and installed.
6. Install antivirus software, configuring it to run scans automatically at predefinedtimes and updating the definition files regularly.
7. Use intrusion prevention tools called behavior blockers that deny programsthe ability to execute operations that have not been explicitly permitted.
8. Use behavior detection solutions such as Fijian’s SurfinGate andSurfinShield that can use heuristic techniques to analyze executable filesand assess
…show more content…
For common indications that a virus might be present, Administrators and users need to be on the alert for missing files or programs; unexplained changes to the system’s configuration; unexpected and unexplained displays, messages, or sounds; new files or programs that suddenly appear with no explanation; memory “leaks or unexplained use of disk space; and any other odd behavior of programs or the operating system. If a virus is suspected, a good antivirus program should be installed and run to scan the system for viruses and attempt to remove or quarantine any that are found. in case all these measures fail, all mission-critical or irreplaceable data should be backed up on a regular basis.
To demonstrate that a particular type of virus can be written or created, some virus writers create “proof of concept” viruses that do not cause

You May Also Find These Documents Helpful

  • Satisfactory Essays

    When you are in college, get virus protection on your laptop, as this is one of th...…

    • 456 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Block all ports that are not in use by our network and monitor all inbound and outbound traffic, keeping a close eye on the inbound to detect threats before they become a threat. Place firewalls and anti-malware software at this point and route all workstation traffic through main servers to better protect the network as a whole.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    We will need to run intrusion detection software anti virus and view and asses logs to check for threats.…

    • 315 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 1

    • 345 Words
    • 2 Pages

    And once malwares, Trojans, viruses gain entry into the computer system then these software programs destabilize the operating system, cause damage to it. It is recommended to install and use effective PWS: Win32/QQpass.GR removal software like VSKsoft antivirus software to get rid of all malware related issues.…

    • 345 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Quiz Week 5

    • 381 Words
    • 2 Pages

    5. List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.…

    • 381 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    • Apply strict security monitoring controls for intruustion detection and prevention. Monitor for inbound IP traffic anomalies and malicious-intent traffic. Block traffic right away if malicious…

    • 447 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2. From an email message sent to all employees of a law firm advising them to be alert for a new virus: This virus has been known to cause the destruction of files, and it is very important that you perform a search of your hard drive to try and attempt eradication of it using the search feature. Search for . EDT file extensions and delete them. Then the problem will be solved.…

    • 510 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    What are the major security threats on my network and computers connected to the network?…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Viruses have been around for a long time, and can render a system useless if not dealt with. New, more destructive viruses and worms are being unleashed exponentially. Reports indicate that 50 percent more virus attacks were launched in 2003 than the prior year. The January-March 2004 Mydoom virus outbreaks were the biggest the Internet has encountered to date.…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    | Describe ways to protect hardware, software and data and minimise security riskThere are steps to prevent threats to system and information: access to information sources should be allowed with Username and password/PIN selection. The system set up on password strength; how and when to change passwords (monthly); online identity/profile; Real name, pseudonym; what personal information to include, who can see the information; Respect confidentiality, avoid inappropriate disclosure of…

    • 793 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Week3 Hacking

    • 391 Words
    • 2 Pages

    If you find a suspect executable and wish to perform “dynamic analysis” what does that mean?…

    • 391 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    5 List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.…

    • 531 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Quiz Week 5

    • 381 Words
    • 2 Pages

    5. List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.…

    • 381 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab #9

    • 650 Words
    • 3 Pages

    1. When you are notified that a user’s workstation or system is acting strangely and log files indicate system compromise, what is the first thing you should do to the workstation or system and why?…

    • 650 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Computer Virus Expository

    • 639 Words
    • 3 Pages

    “A true virus cannot spread to another computer without human assistance.” Computer virus has now become widespread. It’s almost everywhere in every computer. It is one of the major problems of the computer users. Viruses are like the disease of the computer. Letting the virus in it can cause harm or even destroy all files stored in the computer. Virus infection costs millions even billions of money if virus penetrates into major servers like government database system, bank and airport systems. Computer virus can destroy, control or even steal information without the knowledge of the user.…

    • 639 Words
    • 3 Pages
    Good Essays