This website uses cookies to ensure you have the best experience. Learn more

Project Part 2 It Security Essay

953 words - 4 pages

Classification Description: Malicious Code and Activity

Task

Base on the premise that there is a mix of computers running Windows 2000, Windows XP, Windows Vista, Windows 7, and Mac OS X, you must research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses, and other related forms of intentionally created deviant code.

Introduction

Malicious software is written with the intent to damage or infect the system of Richman Investment. Malicious code or software is a threat to any internet-connected device or computer. The main goal of the attack is to affect one ...view middle of the document...

The controls are of the preventative and detective/corrective variety. Controls are applied at the host, network, and user levels:

Host Level

* Host hardening, including patch application and security-minded configurations of the operating system (OS), browsers, and other network-aware software.
* Host IPS, including anti-virus, anti-spyware, and anti-rootkit can enable the hiding and surreptitious execution of malicious software code. An additional technology is software that limits applications calls to the OS to the minimum necessary for the application to function.
* Integrity checking software, combined with strict change controls and configuration management.
* Application of known-good configurations at boot-up.
* Periodic auditing of host configurations, both manual and automated.

Network Level

* Limiting the transfer of executable files through the perimeter.
* IDS and IPS monitoring of incoming and outgoing network traffic, including anti-virus, anti-spyware and signature and anomaly-based traffic monitors.
* Routing ACLs that limit incoming and outgoing connections as well as internal connections to those necessary for business purposes.
* Proxy servers that inspect incoming and outgoing packets for indicators of malicious code and block access to known or suspected malware distribution servers.
* Filtering to protect against attacks such as cross-site scripting and SQL injection.

User Level

* User education in awareness, safe computing practices, indicators of malicious code, and response actions.

Preventive Techniques

​Network Users (including departmental staff on permanent, temporary, contract or casual tenure):

* Ensure they do not disable or interfere with the operation of antivirus software.
* Ensure corporate/education and TAFE personal computers/laptops in use are regularly made available for antivirus software updates.
* Exercise caution when opening email and related attachments.
* Do not download software from the Internet unless authorized by senior management and the technology support officer.  Risks may include infringement of copyright in addition to introduction of malware or malicious code.
* Scan downloaded software for malware and malicious code.
* Do not develop, distribute or run...

Other assignments on Project Part 2 It Security

Project Management Essay

2376 words - 10 pages PROJECT MANAGEMENT PART 1 1. maximum wealth of a share holder 2. P*I*T 3. P( 1+I)T 4. do constant strategic planning 5. Search Project for Aspects of Close Encounters 6. market growth 7. A+B+I 8. none

Top Five Management Challenges Essay

871 words - 4 pages LESSON 2 EXERCISE 2-1 THE TOP FIVE CHALLEGENGES 1. SCOPE OF THE PROJECT LACK OF CLARITY Once completed, becomes the basis for future project decisions because it contains the criteria used to determine if the project or phase of the project has been completed successfully. This scope will form the basis for an agreement between the project team, the customer and the project sponsor identifying both the project goals and mayor

Patient Portal

4012 words - 17 pages doing this research it was discovered that the area hospital in Kingman, Arizona had just implemented a new feature. That new feature is the Patient portal. This will help patients to schedule appointments, refill medication, view lab results and to communicate with their physicians. Part 2 Literature review One question is being asked is, “Are patient portals secure, are there security issues within these portals?” Another one is how the

Project Financing

4101 words - 17 pages immense support and dedicated their time toward it to sharing their knowledge in the field of finance and learn the day-to-day activities that are carried out in the CA firm. I would like to thanks to, Prof. BALA BHASKARAN (Director of Shanti Business School, Ahmadabad) who provides me this golden opportunity by giving this project. Table of Contents ACKNOWLEDGEMENT 2 EXECUTIVE SUMMARY: 4 Objective: 4 Brief Description of Project: 4

Management Information System And How It Help In Business Application

281 words - 2 pages Project Management Information System Table of Contents Project Management Information System 2 Introduction 2 Types of project Management Software 3 Desktop software’s: 3 Web Based software: 4 Characteristics of Project Management Software: 5 Benefits of Using a Project Management Software 7 Things to Look for When Implementing Project Management Software 7 Application of PMIS in project management stages 11 Typical Reports in a

Stage 5 Umuc

1080 words - 5 pages TouchSuite implementation, based on planning that will be completed by the development team. 2. The schedule will include all required activities that will lead to project success. 3. It will include the detailed actions required by the steps of the SDLC and identify deliverables and dates that they must be completed. C. Resources 1. Monetary resource has been provided by UMUC Haircuts management. 2. Initial installation of

Project Management In Public Sector

3603 words - 15 pages municipality This part provides an overview of the project cycle. The purpose of this section is to provide an overall picture of the work that needs to be done through the different phases of the project cycle towards ensuring sustainable services. It also outlines some of the key performance indicators that should be achieved through the project cycle. To ensure effective implementation and management of capital projects, all projects should

Proj-595

5550 words - 23 pages supplies are not being installed. | Project Constraints | 1. Limiting factors include finding a suitable location because without a location this project will fail. 2. All the equipment needs to be setup and tested before it can be used by anyone. 3. Security guards can be constraints since there is valuable merchandise at the location. 4. Shortage of volunteers. 5. Shortage of donor funds. 6. Late arrival of equipment

Nothing

1075 words - 5 pages | |Fourth edition | |2. |Bigelow’s Trouble shooting, maintaining and| |Tata McGraw Hill |Latest edition | | |repairing PCs | | | | CICT PART II |SECTION 3

Wgu Capstone

8774 words - 36 pages perpetuated by the companies neglect in maintaining basic industry standards when it comes to security. The new ISMS plan will help alleviate the gaps that are present by providing written policies and documentation that users can readily access. The implementation of ISMS will put in place the security controls that will help secure access to customer’s information and documentation. Project Design Scope All organizations

Creating A Methodology

434 words - 2 pages According to the PMBOK guide, “An organization’s culture and style affect how it conducts projects. Cultures and styles are group phenomena known as cultural norms, which develop over time. The norms include established approaches to initiating and planning projects, the means considered acceptable for getting the work done, and recognized authorities who make or influence decisions.” Kerzner states, “Achieving project management excellence, or

Similar Documents

Course Project Part 2 Pro 592

3293 words - 14 pages Course Project Part 2 PROJ592 Proj. Cost and Schedule Control Leon Constructions, LLC (Construction of Residential Complex) Angel Carrasquilla D40123142 Keller Graduate School – MSc Project Management 1. Executive Summary Leon Constructions LLC, is a construction company that specializes in the residential and commercial building construction in Florida. The company normally constructs residential and commercial buildings for

Green Computing Research Project – Part 2

563 words - 3 pages Case Study 2: Green Computing Research Project – Part 2 CIS 517 Week 6 As previously stated, the main purpose of the Green Computing Research Project is to research possible applications of green computing for greater efficiency. Furthermore, in our second case study we will focus on documenting the requirements of this project. As well as developing the scope statement for this project. By document the requirements based on the

Principles Of Information Security Essay

953 words - 4 pages organization itself. Security culture can be collaborative or argumentative, structured or unstructured. Security can be an integral part of a process beginning at the project-definition stage, or a separate process added on to an existing project. It can be ingrained or reactive. Information security is the protection of information from a wide range of threats in order to ensure business continuity, minimize business risk, and maximize return on

Communication Essay

1932 words - 8 pages Instructor's Manual to accompany PROJECT MANAGEMENT A SYSTEMS APPROACH to PLANNING, SCHEDULING, and CONTROLLING TENTH EDITION HAROLD KERZNER, PH.D. John Wiley & Sons, Inc. Table of Contents PART ONE: Solutions to Chapter Problems Chapter 1-Problems Chapter 2-Problems Chapter 3-Problems Chapter 4-Problems Chapter 5-Problems Chapter 6-Problems Chapter 7-Problems Chapter 8-Problems Chapter 9-Problems Chapter 10