Ken 7 Windows Limited new enterprise resource planning (ERP) software makes it p
ID: 3902664 • Letter: K
Question
Ken 7 Windows Limited new enterprise resource planning (ERP) software makes it possible for more employees, vendors, and customers to access the Ken 7 Windows environment. You have noticed a marked increase in malware activity in the test environment that seems to originate from external users. After researching the likely source of new malware, you conclude that allowing external users to connect to your environment using compromised computers exposes Ken 7 Windows to malware vulnerabilities. You take your findings to your manager and have been asked to create a policy that will ensure all external computers that connect to Ken 7 environment are malware free. You create the following policy: "To protect the Ken 7 computing environment from the introduction of malware of any type from external sources, all external computers and devices must demonstrate that they are malware free prior to establishing a connection to any Ken 7 Windows resource Answer the following questions: 1. What does "malware-free" mean? 2. How can a user demonstrate that their computer or device is malware free? 3. What are the steps necessary to establish a malware-free computer or device? 4. How should Ken 7 Windows verify that a client computer or device is compliant? Submission Requirements Format: Microsoft Word Font: Times New Roman, 12-Point, Double-Space Citation Style: APA Style with 3 references Length: 2-3 pagesExplanation / Answer
Malware: Malicious software is known as malware. There are various ways to detect and remove malware. Various malwares are computer viruses, Trojan horses, Spyware, Worms and Scareware, Software bug.
These are mainly used to establish a back door to the computer and to steal the secured data. World Wide Web is most harmful in spreading the malicious contents.
There are various way to protect a computer from the malware.
Keeping the environment updated helps to achieve the Malware-free computer.
1)
Malware – free: Computer that has no malicious software installed and protected without any backdoors are unnecessary software that may steal the data. Most of the pirated content may be malicious and should not be used. Security defects in software may help to progress malicious content and even helps to establish a backdoor and take control of system.
Antivirus and other software should be updated.
Patches has to be installed if released.
There are various types of malware that run at the time of booting and executing.
Boot scans should be performed based on schedule while booting up the system.
Even normal scan should be perform based on schedule
2)
Various antivirus software are available and those can be used to scan the entire system and the warnings detected should be cleared or corrected.
No unauthorized software should be installed. Usage of pirated content should be avoided.
Each and every device to be connected should be scanned thoroughly and verified.
Make sure that no unwanted programs are running in background.
Computer should have a activated updated antivirus software.
Thorough scanning of whole computer in frequent intervals is must.
Verify that all the software installed are authorized and updated.
3)
To avoid the malware care should be taken.
Various good antivirus software are available and to be installed.
Scheduled scan has to be performed.
Pirated content should be avoided. Unauthorized software should not be installed.
Spam content received through mail or other ways should be deleted or scanned by any antivirus program.
Safe mode or protected mode is available in antivirus software and that should be used to visit any unknown sites or sources.
No content (executable or non- executable) should be downloaded from the unknown sources.
Most care should be taken in providing privileges on content to other sources.
Read, Write and Execute are the main privileges given to software, contents. These privileges are to be provided accordingly to the requirement.
Only Reading privileges should be given to the unknown sources or clients or other computers.
4)
Before connecting to the client computer should be verified and confirmed malware-free.
Effective antivirus should be used to scan the computer to connect.
After confirming only reading privileges has to be provided and no writing and executing privileges should be provided unless its necessary.
Network resources should be protected and effective firewall should be designed to avoid the malicious contents.
If the system is highly public and there are more chances that system may get infected. To avoid this effective antivirus software should be installed and updated .
Thorough scanning is necessary and should be scheduled.
Other way to protect is to make the required or precious data isolated such that disabled to internet and avoid connecting the other media resources unless they are verified.
As it is not possible to isolate data and update it thoroughly effective measures has to be taken to avoid the malware.
Many of antivirus software provide the safe mode where all the programs run in read mode and modifications to the other content is restricted.
Enterprise should provide this mode to the clients to make it is more sophisticated and protected.
As the Enterprise computer is connected to various clients , staff and administrator. Over privileged code should be avoided.
Enterprise should concentrate more on providing privileges to its customer, staff and administrator. Such no client can infect the system knowingly or unknowingly.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.