Nobody downloaded yet

Server malware protection policy - Assignment Example

Comments (0) Cite this document
Summary
Many companies have had their data corrupted, and some have even lost their confidential information. It is thus significant for a company to develop a server malware protection…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.1% of users find it useful
Server malware protection policy
Read TextPreview

Extract of sample "Server malware protection policy"

Download file to see previous pages Examples of such malware are Viruses, Worms, Trojan horses, Spyware, and Rogue security software.
Similarly, the term server refers to whatever computer system domiciling in the physically secured data center owned and operated by the Company. In summation, this includes any organization operating an operating system specifically designed for server usage as determined by the Company. The different types of servers include Microsoft Server 2000 and Microsoft Server 2003.
The policy provides that all servers of the company MUST be equipped and fitted with an anti-virus application. The installed anti-virus application should be one that offers a real-time scanning protection of files and applications running on the target system. The scanning of the files will aid in protecting the computer from being attacked by the viruses that may lead to the loss of data. Similarly, the anti-virus is of importance in case non-administrative users have remote access capability of the data processor machine. Again the anti-virus is required if the system is a file server or, HTTP/FTP access is open from the Internet and or if other “risky” protocols/applications are available to the system from the Internet at the free will of the Organization’s Security Administrator.
The server malware protection policy requires that all the mail servers being utilized by the company to have an anti-virus installed in them. For instance, in case the target system is a mail server, then, it MUST be equipped with either an outside or internal anti-virus scanning application. The application’s purpose is to examine all mail destined to and from the mail host. Likewise, while the external anti-virus application scan the inbound mail as a backup is being done, the local anti-virus scanning applications may be put off.
The server malware protection policy necessitates that all servers being used by the company to get set with an ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Server malware protection policy Assignment Example | Topics and Well Written Essays - 1000 words”, n.d.)
Server malware protection policy Assignment Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1657618-server-malware-protection-policy
(Server Malware Protection Policy Assignment Example | Topics and Well Written Essays - 1000 Words)
Server Malware Protection Policy Assignment Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1657618-server-malware-protection-policy.
“Server Malware Protection Policy Assignment Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1657618-server-malware-protection-policy.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Server malware protection policy

Malware Forensic Computing

...?Malware Forensic Computing This report is a discussion about malware used by cyber criminals to do cyber attacks, and respective computer forensics investigation. An introduction has been given which gives a better understanding of the topic. Common cyber crimes and types of malware are discussed. The forensic investigative procedure is explained with the help of a case study. Then, social, ethical and moral issues regarding identity theft have been discussed both from the user’s and the investigator’s side. 2. Introduction Forensic computing and malware forensics have become exceptionally significant areas in technological studies demanding special consideration so as to protect the security rights of e-consumers. Before going... tools and...
10 Pages(2500 words)Assignment

Profit Implications of Malware

...Trojan horse is released as payloads by computer worms that give the attackers full control of the victims’ personal computer (Effects of Malware Infections: Avoid the Dangers of Malware Programs ). There are several factors that make Trojans dangerous first of all Trojans are not visible in the traditional process viewer including windows and task managers, this coupled with the fact that most virus and Trojan scanners find it difficult detecting the Trojan code. Also the Trojan code is very difficult to unload hence making it hard cleaning it. The most common type of Trojan is the proxy Trojan that once it attacks the victims computer it turns it into a proxy server (Zombie) which then...
15 Pages(3750 words)Annotated Bibliography

Dynamic Analysis of Malware

...Victim server for certain services, keeping malicious traffic local! Multiple Worker (VM) Snapshot technology which can revert to the known state in seconds Anubis was designed to assist human experts to give fast overview of a sample’s behavior. Anubis is used in data tainting, which a powerful technique used in tracing data flows of a program like how network data is processed by a program, and also makes us able to find out if for infection, a malware uses random file names during a single analysis run. Anubis can also provide the feature known as “clustering”. This feature is used in finding and partitioning a given set of malware samples into subsets, so that subsets share some...
4 Pages(1000 words)Research Paper

Malware and computer system

...to an increase in the payload thus making our servers to crumble. This was made possible by the fact that it was able to disguise itself and stay safe from the defending mechanism (Christodorescu, 2006). Rootkits and ransomware Our computer system in the last twenty four hours have also face so much difficulty as far its operation is concerned due to the attacks by the rootkit malwares. Rootkit malware can be referred to as software that are intentionally created to modify the operating system of a computer system so that the person responsible for the rootkit can have an remote access to a computer system and stay unidentified by the user of the computer system. This rootkit that...
6 Pages(1500 words)Essay

NPS Deploying network policy server

...?NPS deploying network policy server Introduction The rate at which automation is done is very rapid and therefore calls for intense information system security to ensure that the information is kept safe. The information or rather data is always kept in the datacenter and mechanism is supposed to be put in place to ensure that the data is protected and preserved. In addition, access to this information should be restricted so that the organization’s integrity is maintained. In an organization, it is not only the staff or the employees that specialized in data security that has the responsibility of ensuring that data is secured? Each and every employee in the organization who...
8 Pages(2000 words)Essay

Server consolidation

...Summary of the work In its bid to improve operating efficiencies and enhance client services, this leading Indian investment bank called Bank Alpha decided to add 3 new branch servers and upgrade its teller and CSR software at all 6 operational locations within the country. The bank evaluated different software systems and architectures and decided to go in for SuperBlade system to drive its teller and CSR software architecture, a business-critical application accessed by thousands of users nationally that processes some 200000 transactions on a daily basis. Indian banks are getting more proactive when it comes to deploying IT hardware and software. There are a number of factors that have fuelled this change within the...
4 Pages(1000 words)Essay

Business: Information Technology Malware

...to computerize all health information for Ontario citizens. There are a number of concerns related to the ethical, social, and policy issues of the computerization of health records. Some of the most pervasive ethical concerns have emerged in terms of patient privacy rights. For instance, Mearian (2009) notes that eHealth poses a concern for many individuals with sensitive health records. One of the primary policy concerns within this context of understanding is the Personal Health and Information Protection Act, 2004 (PHIPA) regulatory amendment. Passed in 2004 this amendment indicates that Ontario can both undergo computerized documentation of health records, as well as maintain...
1 Pages(250 words)Research Paper

Server

...Server Server Introduction With technological advancements, the issue of network security has become of significant concern. It is essential for companies to secure the network infrastructure from vulnerabilities and shortcomings that may arise. This stems from the fact that unauthorized users may gain access to an organization’s computer network or system. Consequently, this may lead to exposure of the secret information belonging to a company. It is common for hackers to target the computer network of a company; this may have significant negative impacts on the company (Gollmann, 2011). The computer network should also be secured from damages that may result from physical factors and dangers caused by...
2 Pages(500 words)Essay

ISA Server

...restrictions and it was designed to be compatible with only a few of the Internet protocols. Furthermore, the second version was useful and it has expected function and one of its great functions, is to use Windows NT account databases. Finally, they came up with ISA Server, which has many tools and functions. ISA Server supports so many functions that its editions before. In addition, ISA Server components a lot of options and one of most important options is that Firewall. Moreover, it can support any version of Windows Server from Windows 2000 and they are used to offer certain security functions either at individual level or group level. Other than that, the...
10 Pages(2500 words)Research Paper

Policy Paper

...a computer is connected to the internet (Aycock, 2011). Purpose This security policy is designed with the aim of ensuring protection of the organizational resources against interference of intrusion by viruses, spyware, adware and other malware. Scope This policy is applicable to all computers and servers that are connected or associated with the organization network through wireless connections, standard network connections, virtual private network connections or modem connections. The policy explicitly includes computers owned by the organization, individuals or sharing the organization’s network. The computer definition in this...
5 Pages(1250 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic Server malware protection policy for FREE!

Contact Us