Monday, September 16, 2019
Computer Virus and World Wide Web Essay
1. Workstation and desktop devices are prone to viruses, malware, and malicious software, especially if the user surfs the Internet and World Wide Web. Given that users connect to the Internet and World Wide Web, what security countermeasures can organizations implement to help mitigate the risk from viruses, malware, and malicious software? Organizations can restrict specific sites, key words like blogs, mirror sites and such. Organizations can also make sure specific ports are shut down; this can prevent back doors when accessing a site. There are a lot of web sites out there that do not need accessibility, especially for a work environment. 2. Your employees e-mail file attachments to each other and externally through the organizationââ¬â¢s firewall and Internet connection. What security countermeasures can you implement to help mitigate the risk of rouge e-mail attachments and URL Web links? The basic step would be to not allow hyperlinks to automatically work when in an e-mail. Some times when a link is in a user can click and it will automatically launch it. Another step would be for the e-mail to have the userââ¬â¢s signature. This is usually verified through the userââ¬â¢s machine, for example in the military we have a Common Access Card. This card is a form of identification on multiple levels, in order for you to access your e-mail you need to log in with your CAC and enter your pin. When you send an ââ¬âmail it has a signature on it based on the code in your CAC, this way the person receiving the e-mail knows it is from you. Another way of doing it is by having public keys and private keys, this way both users know it is from the individual. 3. Why is it recommended to do an antivirus signature file update before performing an antivirus scan on your computer?à From what the lab showed me and from my understanding it is because the scan will not scan encrypted files. The signature file would have been able to pick it up and it would work in tangent with the scan. 4. Once a malicious file is found on your computer, what are the default settings for USB/removable device scanning? What should organizations do regarding use of USB hard drives and slots on existing computers and devices? Some devices have serial numbers associated with them, and this string is optional. This is defaulted with thumb drives, USB hard drives and PDAs. Most scanning and tracking details would be of most use with the USB mass storage devices. Organizations should immediately remove the AUTO run feature! This is basic in the military, any one would be able to come in and throw a thumb drive and automatically run whatever it is on it making it a vulnerability. 5. If you find a suspect executable and wish to perform ââ¬Å"dynamic analysisâ⬠what does that mean? Dynamic analysis is the testing and evaluation of a program by executing data in real-time. The objective is to find errors in a program while it is running, rather than by repeatedly examining the code offline 6. What is a malware and malicious code sandbox? This can be potentially dangerous but it is looked like as a sandbox. This is by running the virus, preferably in a machine with limited access to a network and something that isnââ¬â¢t much of a use and executing the virus in real time. This way you can debug the virus and see what is it doing so you can detected and prevent it. 7. What are typical indicators that your computer system is compromised? It is slow, everything you do takes a lot longer to perform. You are missing data, your peripherals are not responding or they are performing automatic actions. Your computer starts up during odd hours and it is used as a zombie computer. You have additional items on your browser, you have an entirely different browsers, items are opening up and there are a lot of pop ups. 8. Where does AVG Business Edition 2012 place viruses, Trojans, worms, and other malicious software when it finds them? According to the lab it is quarantined, it is isolated and then removed by the userââ¬â¢s request. I am assuming it is then directed to the AVG corporations for further analysis fir updates.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.