Week3 Hacking

Topics: World Wide Web, Computer virus, Malware Pages: 2 (391 words) Published: August 28, 2013
1.Workstation and Desktop devices are prone to viruses, malware, and malicious software, especially if the user surfs the Internet and World Wide Web. Given that users connect to the Internet and World Wide Web, what security countermeasures can organization implement to help mitigate the risk caused from viruses, malware, and malicious software?

a.Up to date anti-virus software and updated firewall.

2.Your employees e-mail file attachments to each other and externally through the organization’s firewall and Internet connection. What security countermeasures can you implement to help mitigate the risk of rogue e-mail attachments and URL web links? a.

3.Why is it recommended to do an anti-virus signature file update before performing an anti-virus scan on your computer?

a.So you have the most up to date anti-virus signature
4.Once a file is found malicious on your computer what are the default settings for USB/removable device scanning?What should organization do regarding use of USB hard drives and slots on existing computers and devices?

5.If you find a suspect executable and wish to perform “dynamic analysis” what does that mean?

6.What is a malware and malicious code sandbox? How you test the

7.What are typical indicators that your computer system is compromised?

a.System crashes
b.Waiting for programs
c.Antivirus is disabled
d.Desktop icons have changed
e.Pop-up ads

8.What is a rootkit and what threat does it incur on systems?

a.Rootkit is association with malware. Once installed, it becomes possible to hide the intrusion as well as to maintain privileged access. The key is the root/Administrator access. Full control over a system means that existing software can be modified, including software that might otherwise be used to detect or circumvent it.

9.What security countermeasures are available to combat against root kits and malicious software? a.Install a good antimalware solution on...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Research Paper Computer Hacking
  • Rogerain Essay on Computer Hacking
  • Essay about The Good the Bad to Hacking
  • Computer Hacking is Ethical Essay
  • Ethical Hacking Essay
  • Ethical Hacking Essay
  • Hacking Research Paper
  • Ethical Computer Hacking Research Paper

Become a StudyMode Member

Sign Up - It's Free