StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Server Malware Protection Policy - Assignment Example

Cite this document
Summary
The thesis of this paper "Server Malware Protection Policy" is to look at ways of dealing with the various forms of malware that corrupt data. Malware refers to malicious software that is designed to infiltrate, do wrong or unwanted actions to a computer system without the knowledge of the owner. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.2% of users find it useful
Server Malware Protection Policy
Read Text Preview

Extract of sample "Server Malware Protection Policy"

Server malware protection policy Malware such as virus, Trojans and worms bring out a serious threat to data processing systems today. Many companies have had their data corrupted, and some have even lost their confidential information. It is thus significant for a company to develop a server malware protection policy to help tackle the various malware that lead to the loss of data. The thesis of this paper is to look at ways of dealing with the various forms of malware that corrupt data. Introduction Malware refers to a malicious software that is designed to infiltrate, do wrong or unwanted actions to a computer system without the knowledge the owner. Examples of such malware are Viruses, Worms, Trojan horses, Spyware, and Rogue security software. Similarly, the term server refers to whatever computer system domiciling in the physically secured data center owned and operated by the Company. In summation, this includes any organization operating an operating system specifically designed for server usage as determined by the Company. The different types of servers include Microsoft Server 2000 and Microsoft Server 2003. Antivirus The policy provides that all servers of the company MUST be equipped and fitted with an anti-virus application. The installed anti-virus application should be one that offers a real-time scanning protection of files and applications running on the target system. The scanning of the files will aid in protecting the computer from being attacked by the viruses that may lead to the loss of data. Similarly, the anti-virus is of importance in case non-administrative users have remote access capability of the data processor machine. Again the anti-virus is required if the system is a file server or, HTTP/FTP access is open from the Internet and or if other “risky” protocols/applications are available to the system from the Internet at the free will of the Organization’s Security Administrator. Mail server anti-virus The server malware protection policy requires that all the mail servers being utilized by the company to have an anti-virus installed in them. For instance, in case the target system is a mail server, then, it MUST be equipped with either an outside or internal anti-virus scanning application. The application’s purpose is to examine all mail destined to and from the mail host. Likewise, while the external anti-virus application scan the inbound mail as a backup is being done, the local anti-virus scanning applications may be put off. Anti-spyware The server malware protection policy necessitates that all servers being used by the company to get set with an anti-spyware application so as to provide and offer a real-time protection to the target system. A spyware can install on a computer without ones knowledge. The spyware changes the computer’s configuration and can track Internet search habits and also redirect the net browser to a dissimilar website unlike the one you intend to go to. The company, therefore, needs to install an anti-spyware application so as to provide protection in case of a state of business in which a non-technical or non-administrative user gets remote access to the system. Likewise, the anti-spyware is to aid in providing security when any outbound access is permitted to the Internet. Similarly, the anti-spyware is of assistance if a non-technical or non-administrative user can install software on his own without permission. Login applications The company needs to employ the use of an operating system with a secure logon application and authentication process. The logon and authentication process should have secure passwords that prevent malicious people from accessing the computer and its documents. The company needs to use passwords to protect its data so as to avoid and prevent access by non-administrators and non-technical users. The company should also create a password policy that is to be employed by administrators in the computers. Awareness Creation The company needs to create an education program to its staff and computer users towards virus protection. Similarly, the staff should be educated the different ways to prevent the computer from getting attacked by a virus. The company should implement awareness programs that include guidance to users on malware incident prevention. All users and company employees should be cognizant of how the malware spreads the risks the malware poses, the unfitness of technical commands to preclude all events and the purpose of users in preventing incidents. The company should also have regular malware-oriented training and exercises. (Mell et al., 2005) Likewise, the awareness program by the company should make the employees and the computer machine users aware of the policy and the procedures that apply to malware handling; such as how to detect malware and how to report suspected infections. An effective awareness program should be developed by the company that states and explains proper rules of behavior for the use of the organization’s IT systems and information, i.e., not downloading items from untrusted sources. (Mell et al., 2005) Encrypting Data. The policy also offers that the company encrypts its data using a cypher so as to provide protection for the data. Encryption is the most efficient manner to achieve data security (Newman, 2010). The transformation of the company’s data into a secret code will assist prevent the acquisition of the confidential information by other users. Similarly, only people with a secret code will be able to access the company’s vital information. The company should also do away with the default usernames and passwords for the computer applications and passwords that could be used by non-administrators. Changing the default usernames and passwords also aid in preventing the infection by the malware, since they use these passwords to gain unauthorized access. Similarly, the organization should consider using the guides to the applications and operating systems. These configuration guides and checklists, contain recommendations that improve the default level of security. Conclusion Companies need to develop a server malware protection policy so as to aid in tackling the attack by the various forms of malware. Consequently, companies should fit their data processors with anti-virus applications, anti-spyware applications and mail server applications. Consequently, the companies need to create awareness to their employees and the computer users and as well, ensure encryption of company data and secure logging applications are in place. References Mell, P., Kent, K., Nusbau, J. (2005). Guide to Malware Incident Prevention and Handling: Recommendations of the National Institute of Standards and Technology. Newman, R., C (2010).Computer Security: Protecting Digital Resources: Protecting Digital Resources. Jones and Barlett’s Publishers. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Server malware protection policy Assignment Example | Topics and Well Written Essays - 1000 words”, n.d.)
Server malware protection policy Assignment Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1657618-server-malware-protection-policy
(Server Malware Protection Policy Assignment Example | Topics and Well Written Essays - 1000 Words)
Server Malware Protection Policy Assignment Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1657618-server-malware-protection-policy.
“Server Malware Protection Policy Assignment Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1657618-server-malware-protection-policy.
  • Cited: 0 times

CHECK THESE SAMPLES OF Server Malware Protection Policy

Profit Implications of Malware

malware refers to any program or file that can harm a computer system.... Despite the fact that there no standard categorization of malware, still they can be grouped based on their effects, behaviors and intentions.... Worms are known to exploit a zero-day vulnerability that allows them to execute their copies within the same network (Effects of malware Infections: Avoid the Dangers of malware Programs ).... A Trojan horse is a non-self-replicating type of malware that tends to perform normal beneficial functions for the user though it facilitates unauthorized access to the user's computer system....
15 Pages (3750 words) Annotated Bibliography

Microsoft Baseline Security Analyzer

Focus on the overall “security assessment” risk rating that appears at the top of your report.... Considering what security measures you (or the computer owner) have undertaken for your computer, does the assessment surprise you?... Why or why not?... What measures should you.... ... ... I didn't receive a complete security assessment for my personal computer because the MBSA could not complete one or more requested checks....
7 Pages (1750 words) Essay

Computer Security - Preventing Malware Attacks

The paper "Computer Security - Preventing malware Attacks" states that the rate of production of malicious programs exceeds that of legitimate applications; and the most common malware transmission method is through email and the internet.... malware refers to malicious ware; and it involves software used in disrupting computer functions or operations, gets sensitive computer information, and gain access to private computer networks.... malware generally refers to types of hostile and intrusive software....
6 Pages (1500 words) Essay

The Analysis of the Security Policy

The paper "The Analysis of the Security policy" tells that Antivirus, spyware, and adware are malware categories.... The security policy covers other potential malware threats and issues including those associated with adware.... The security policy addresses antivirus, spyware, and adware in a medium-sized organization.... The policy also defines the means by which prevention and removal of malware programs from computers are done (Aycock, 2011)....
4 Pages (1000 words) Assignment

Malware Management in the Enterprise

The paper "malware Management in the Enterprise" describes that a few measures which one can take to fight malware on their own terms are that lock your system to protect privacy.... Securing your web browser and locking it is the first step against malware.... A few antivirus programs can protect against malware however the first step in solving a problem is identifying it.... For a long time, antivirus programs were not as familiar with the virulent malware as they should have been and malware scanners were overlooked however these days that is changing rapidly....
7 Pages (1750 words) Case Study

The Idea of Sandboxing and Its Techniques

This coursework "The Idea of Sandboxing and Its Techniques" focuses on the main function of the sandbox that generates a remote atmosphere in which the applications run to block malware attacks.... The applications that are mishandled by the vendors cannot be protected from malware by the sandbox.... The applications that are run by sandbox include IM consumers, Web browsers, Online games, Emails, and other applications that are open for malware attacks....
14 Pages (3500 words) Coursework

Security Analysis of A2Z and Redesign of its Network

The author of this paper "Security Analysis of A2Z and Redesign of its Network" discusses the statistical network analysis on the examples of two companies, including the quantitive network analysis ranking of assets, NMAP, password cracking, policy creation, information about security policies.... Finally, I will create a security policy and a template for future security systems.... In addition, it also demystified the mail server IP as ns1....
7 Pages (1750 words) Assignment

Personal Firewalls and Online Armor Personal Firewall Advantages and Disadvantages

iltering of traffic packets based on 'accept or deny' policy that is defined by the information security policy ... ersonal firewalls are software-based firewalls that are installed on a computer to provide protection for the data therein from unauthorized access or intrusion.... As such there are several types, namely packet inspection or filtering router firewall, application inspection or proxy server firewall, authentication and virtual private network (VPN) firewall, small office or home (SOHO) firewall, and the network address translation (NAT) firewall....
9 Pages (2250 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us