Preview

Nt1330 Unit 3 Risk Management Essay

Good Essays
Open Document
Open Document
546 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Unit 3 Risk Management Essay
It is a common sense that systems and networks should be protected from the damage caused by Trojans, viruses, and Worms. Practices that can help to prevent infection include these:

1. Don’t run executable (.exe) files from unknown sources, including thoseattached to e-mail or downloaded from Web sites.
2. Don’t open Microsoft Office documents from unknown sources withoutfirst disabling macros.
3. Turn off the Preview and/or HTML mail options in your e-mail clientprogram.
4. Be careful about using diskettes that have been used in other computers.
5. Firewall software should be used and installed.
6. Install antivirus software, configuring it to run scans automatically at predefinedtimes and updating the definition files regularly.
7. Use intrusion prevention tools called behavior blockers that deny programsthe ability to execute operations that have not been explicitly permitted.
8. Use behavior detection solutions such as Fijian’s SurfinGate andSurfinShield that can use heuristic techniques to analyze executable filesand assess
…show more content…
For common indications that a virus might be present, Administrators and users need to be on the alert for missing files or programs; unexplained changes to the system’s configuration; unexpected and unexplained displays, messages, or sounds; new files or programs that suddenly appear with no explanation; memory “leaks or unexplained use of disk space; and any other odd behavior of programs or the operating system. If a virus is suspected, a good antivirus program should be installed and run to scan the system for viruses and attempt to remove or quarantine any that are found. in case all these measures fail, all mission-critical or irreplaceable data should be backed up on a regular basis.
To demonstrate that a particular type of virus can be written or created, some virus writers create “proof of concept” viruses that do not cause

You May Also Find These Documents Helpful

  • Satisfactory Essays

    When you are in college, get virus protection on your laptop, as this is one of th...…

    • 456 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Block all ports that are not in use by our network and monitor all inbound and outbound traffic, keeping a close eye on the inbound to detect threats before they become a threat. Place firewalls and anti-malware software at this point and route all workstation traffic through main servers to better protect the network as a whole.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    We will need to run intrusion detection software anti virus and view and asses logs to check for threats.…

    • 315 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 1

    • 345 Words
    • 2 Pages

    It is important to learn the various ways how the malwares, malicious files like the ones in context enters an unprotected PC system.…

    • 345 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit Btec Diploma It

    • 950 Words
    • 4 Pages

    Virus checking software: Antivirus (or "anti-virus") software is a class of program that searches your hard drive and floppy disks for any known or potential viruses. The market for this kind of program has expanded because of Internet growth and the increasing use of the Internet by businesses concerned about protecting their computer assets.…

    • 950 Words
    • 4 Pages
    Good Essays
  • Good Essays

    There are many precautions that can be taken to protect IT systems and data. These are as simple as:…

    • 914 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Quiz Week 5

    • 381 Words
    • 2 Pages

    5. List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.…

    • 381 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    • Apply strict security monitoring controls for intruustion detection and prevention. Monitor for inbound IP traffic anomalies and malicious-intent traffic. Block traffic right away if malicious…

    • 447 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    What are the major security threats on my network and computers connected to the network?…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Viruses have been around for a long time, and can render a system useless if not dealt with. New, more destructive viruses and worms are being unleashed exponentially. Reports indicate that 50 percent more virus attacks were launched in 2003 than the prior year. The January-March 2004 Mydoom virus outbreaks were the biggest the Internet has encountered to date.…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    | Describe the security issues that may threaten system performanceThe possible threats to system performance may be: unwanted e-mail (‘spam’), malicious programs (including viruses, trojans) and hackers. Security precautions can be taken beforehand such as use of access controls. We can configure anti-virus software, adjust firewall settings, adjust internet security settings; backup; store personal data and software safely; treat messages, files, software and attachments from unknown sources with caution; download security software updates.…

    • 793 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Week3 Hacking

    • 391 Words
    • 2 Pages

    If you find a suspect executable and wish to perform “dynamic analysis” what does that mean?…

    • 391 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    5 List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.…

    • 531 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Quiz Week 5

    • 381 Words
    • 2 Pages

    5. List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.…

    • 381 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computer Virus Expository

    • 639 Words
    • 3 Pages

    “A true virus cannot spread to another computer without human assistance.” Computer virus has now become widespread. It’s almost everywhere in every computer. It is one of the major problems of the computer users. Viruses are like the disease of the computer. Letting the virus in it can cause harm or even destroy all files stored in the computer. Virus infection costs millions even billions of money if virus penetrates into major servers like government database system, bank and airport systems. Computer virus can destroy, control or even steal information without the knowledge of the user.…

    • 639 Words
    • 3 Pages
    Good Essays