preview

Malaware Protects Against Viruses, Worms, Trojans

comparative Essay
962 words
962 words
bookmark

Malware Protection Policy Introduction Viruses, worms, Trojans, and Spy ware are nasty and dangerous intruders. Together they make up a class of software know as malware which is short for malicious software (Greene, 507). The Grocery, Inc. has been breached and now know that it was a inside job and it was a new and sophisticated plan that was developed by and disgruntled employee. The attacker was able to slip malware onto servers at all of the company's 200 stores. Further digging has brought to light that the malware appears to have snatched card data from customers as they swipe their card at the check out and transferred the data overseas. As a Information Security Administrator for Grocery Stores, Inc. I will asses the situation and develop a server malware protection policy that accounts for concerns of the stakeholders as well as reducing the chances for another attack and providing security controls. Purpose, Scope , and Overview The purpose of the policy should outline the server systems that require anti-virus and/or anti-spy ware (SANS) . The scope will need to apply to all servers that Grocery Inc. is responsible for. It also needs to include all server systems that is setup for internal use by Grocery Inc even if they do not retain administrative obligation or not. The overview will state that Grocery Inc. is trusted with the responsibility to provide professional management of clients servers as outlined in each of the contracts with its customer(SANS) . It also states that they have an obligation to provide appropriate protection against malware threats, such as viruses and spy ware applications(SANS) . Anti-Virus Grocery Stores Inc. needs all systems to have anti virus protection software... ... middle of paper ... ...s and how it may impact their work. Conclusion Having a layered security program that will protect at all levels and if one is unsuccessful the other defense is present. This is shown by having the anti virus, spy ware, and security restrictions. The fact of the matter is even having a layered defense will not guarantee that attacks can be prevented. Good security requires constant care and with out that care a vulnerable opening could develop. Monthly updates and reviews are needed to make sure that not holes are present in the systems. Reference Page Greene, S. Security Policies and Practice [VitalSouce bookshelf version]. Retrieved from http://devry.vitalsource.com/books/9781256084099/id/ch15fig08 SANS. (n.d.). Retrieved from http://www.sans.org/security- resources/policies/Server_Malware_Protection_Policy.pdf

In this essay, the author

  • Explains that viruses, worms, trojans and spyware are nasty and dangerous intruders. the grocery, inc. has been breached and now know that it was an inside job.
  • Explains the purpose, scope, and overview of the policy to outline the server systems that require anti-virus and/or antispy ware (sans).
  • Opines that anti-virus grocery stores inc. needs anti virus protection software installed, maintained, and monitored. they also suggest a virus scanning software on e-mail servers.
  • Explains that servers must have an anti-virus application installed that offers real-time scanning protection to files and applications running on the target system if they meet one or more of the following conditions.
  • Advises grocery stores inc. to protect themselves from spy ware and man in the middle attacks. they suggest encrypting the data at the time it transverses the network.
  • Opines that grocery store inc. needs to enforce strict security restrictions to every employee on the systems.
  • Recommends training employees on malware and how not to do activities that will harm the systems, customer data, and company reputation.
  • Concludes that having a layered security program will protect at all levels and if one is unsuccessful the other defense is present. good security requires constant care and monthly updates and reviews are needed to ensure that not holes are present in the systems.
Get Access