SlideShare a Scribd company logo
1 of 2
Discuss reaction strategies to handle Malware?
Solution
Malware:
Malware is a software that is dangerous, It can damage phone, desktop or tablet.
There are many types of malware:
Strategies:
There are two ways :
1.Protecting the enclave boundaries
2.Protecting the computing environment.
Enclave Boundaries:
Enclave Boundary is the point where the organisation interacts with internet.
Firewall: Firewall is used to access the control for inbound and outbound comunications.Various
attacks will be reduced .The firewall needs to be configured for outbound network traffic.
Intrusion Detection system: It is used to identify network traffic in real time.They have
signatures to detect malwars and abnormal network communications. The IDS placement is
external to the organization as well as internally, just behind the firewall.
Computed Environments
Computing hardware and software from attack will be the first line of defence against the
malware inside and outside.
Authorised local network devices: USB thumb-drives, MP3 players, personal or consultant
laptops may be a threat ,therefore if an exception is required by business case, the owner should
ensure the device is free of malware before allowed to connect to the network.
Operating systems hardening: Operating systems should be hardened to improve the ability to
withstand attacks.
Anti virus updating: Anti virus updation is a very important strategy to control malware. Every
updation of viruses will clean up the system particularly and prevent by network malwares.
Change control process: A change control has to be processed for the document and review
firewall and other network changes before they are implemented.
Host based firewall: These are  helpful to identify applications that may have been trojanized
after initial installation. It is also used to validate the application.
Vulnerability scanning:It is used to scan results in which hosts are vulnerable of various attacks.

More Related Content

Similar to Discuss reaction strategies to handle Malware-SolutionMalware- Malware.docx

SDK Whitepaper
SDK WhitepaperSDK Whitepaper
SDK Whitepaperhanniw79
 
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...cyberprosocial
 
What are Advantages of Best Antivirus Software Protection_.pdf
What are Advantages of Best Antivirus Software Protection_.pdfWhat are Advantages of Best Antivirus Software Protection_.pdf
What are Advantages of Best Antivirus Software Protection_.pdfDigitals Good
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless NetworkingGulshanAra14
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesAlireza Ghahrood
 
Cryptography and system security
Cryptography and system securityCryptography and system security
Cryptography and system securityGary Mendonca
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfsrtwgwfwwgw
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
A Comprehensive Guide to Network Security All You Need to Know.pdf
A Comprehensive Guide to Network Security All You Need to Know.pdfA Comprehensive Guide to Network Security All You Need to Know.pdf
A Comprehensive Guide to Network Security All You Need to Know.pdfNeilStark1
 
How to prevent Ransomware with Essential Firewall Practices?
How to prevent Ransomware with Essential Firewall Practices?How to prevent Ransomware with Essential Firewall Practices?
How to prevent Ransomware with Essential Firewall Practices?VRS Technologies
 
Network security
Network securityNetwork security
Network securityPreethi B
 
Lecture 3 Security terminologies.pdf
Lecture 3 Security terminologies.pdfLecture 3 Security terminologies.pdf
Lecture 3 Security terminologies.pdfAsmaaLafi1
 
Endpoint Security Pres.pptx
Endpoint Security Pres.pptxEndpoint Security Pres.pptx
Endpoint Security Pres.pptxNBBNOC
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber SecurityBalwantBesra
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsüremin_oz
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityLumension
 

Similar to Discuss reaction strategies to handle Malware-SolutionMalware- Malware.docx (20)

Endpoint security
Endpoint securityEndpoint security
Endpoint security
 
SDK Whitepaper
SDK WhitepaperSDK Whitepaper
SDK Whitepaper
 
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
 
What are Advantages of Best Antivirus Software Protection_.pdf
What are Advantages of Best Antivirus Software Protection_.pdfWhat are Advantages of Best Antivirus Software Protection_.pdf
What are Advantages of Best Antivirus Software Protection_.pdf
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Globally.docx
Globally.docxGlobally.docx
Globally.docx
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Cryptography and system security
Cryptography and system securityCryptography and system security
Cryptography and system security
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
A Comprehensive Guide to Network Security All You Need to Know.pdf
A Comprehensive Guide to Network Security All You Need to Know.pdfA Comprehensive Guide to Network Security All You Need to Know.pdf
A Comprehensive Guide to Network Security All You Need to Know.pdf
 
How to prevent Ransomware with Essential Firewall Practices?
How to prevent Ransomware with Essential Firewall Practices?How to prevent Ransomware with Essential Firewall Practices?
How to prevent Ransomware with Essential Firewall Practices?
 
Policy report barrat & associates ltd
Policy report  barrat & associates ltdPolicy report  barrat & associates ltd
Policy report barrat & associates ltd
 
Network security
Network securityNetwork security
Network security
 
Lecture 3 Security terminologies.pdf
Lecture 3 Security terminologies.pdfLecture 3 Security terminologies.pdf
Lecture 3 Security terminologies.pdf
 
Endpoint Security Pres.pptx
Endpoint Security Pres.pptxEndpoint Security Pres.pptx
Endpoint Security Pres.pptx
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsür
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint Security
 

More from rtodd615

Discuss the differences between a form and a report- What characterist.docx
Discuss the differences between a form and a report- What characterist.docxDiscuss the differences between a form and a report- What characterist.docx
Discuss the differences between a form and a report- What characterist.docxrtodd615
 
DQuestion 23 10 pts Explain how the de Broglie wavelength is related t.docx
DQuestion 23 10 pts Explain how the de Broglie wavelength is related t.docxDQuestion 23 10 pts Explain how the de Broglie wavelength is related t.docx
DQuestion 23 10 pts Explain how the de Broglie wavelength is related t.docxrtodd615
 
Discuss in scholarly detail implications of any considerations that sh.docx
Discuss in scholarly detail implications of any considerations that sh.docxDiscuss in scholarly detail implications of any considerations that sh.docx
Discuss in scholarly detail implications of any considerations that sh.docxrtodd615
 
Does adding debt increase or decrease the flexibility of a healthcare.docx
Does adding debt increase or decrease the flexibility of a healthcare.docxDoes adding debt increase or decrease the flexibility of a healthcare.docx
Does adding debt increase or decrease the flexibility of a healthcare.docxrtodd615
 
Discuss the difference between Financial Accounting and Managerial Acc (1).docx
Discuss the difference between Financial Accounting and Managerial Acc (1).docxDiscuss the difference between Financial Accounting and Managerial Acc (1).docx
Discuss the difference between Financial Accounting and Managerial Acc (1).docxrtodd615
 
Distinguish between individual barriers and organizational barriers to.docx
Distinguish between individual barriers and organizational barriers to.docxDistinguish between individual barriers and organizational barriers to.docx
Distinguish between individual barriers and organizational barriers to.docxrtodd615
 
Discussion Topic 1- Internal control consists of the policies and proc.docx
Discussion Topic 1- Internal control consists of the policies and proc.docxDiscussion Topic 1- Internal control consists of the policies and proc.docx
Discussion Topic 1- Internal control consists of the policies and proc.docxrtodd615
 
Discuss the tools and technologies for collaboration and teamwork that.docx
Discuss the tools and technologies for collaboration and teamwork that.docxDiscuss the tools and technologies for collaboration and teamwork that.docx
Discuss the tools and technologies for collaboration and teamwork that.docxrtodd615
 
Discuss the statement of cash flows Values Limitations This relates to.docx
Discuss the statement of cash flows Values Limitations This relates to.docxDiscuss the statement of cash flows Values Limitations This relates to.docx
Discuss the statement of cash flows Values Limitations This relates to.docxrtodd615
 
discuss the role of nanotechnology in today-'s information age-Solutio.docx
discuss the role of nanotechnology in today-'s information age-Solutio.docxdiscuss the role of nanotechnology in today-'s information age-Solutio.docx
discuss the role of nanotechnology in today-'s information age-Solutio.docxrtodd615
 
Discuss the reasons for the growing interest in and availability of hi.docx
Discuss the reasons for the growing interest in and availability of hi.docxDiscuss the reasons for the growing interest in and availability of hi.docx
Discuss the reasons for the growing interest in and availability of hi.docxrtodd615
 
Discuss the nature of Greek theater and the purpose it served in Ancie.docx
Discuss the nature of Greek theater and the purpose it served in Ancie.docxDiscuss the nature of Greek theater and the purpose it served in Ancie.docx
Discuss the nature of Greek theater and the purpose it served in Ancie.docxrtodd615
 
Discuss the impact of a strong culture on organization and managersSol.docx
Discuss the impact of a strong culture on organization and managersSol.docxDiscuss the impact of a strong culture on organization and managersSol.docx
Discuss the impact of a strong culture on organization and managersSol.docxrtodd615
 
Discuss the advantage and disadvantage of supporting links to files th.docx
Discuss the advantage and disadvantage of supporting links to files th.docxDiscuss the advantage and disadvantage of supporting links to files th.docx
Discuss the advantage and disadvantage of supporting links to files th.docxrtodd615
 
Discuss how engineers and risk experts view and deal with risks- (Appr.docx
Discuss how engineers and risk experts view and deal with risks- (Appr.docxDiscuss how engineers and risk experts view and deal with risks- (Appr.docx
Discuss how engineers and risk experts view and deal with risks- (Appr.docxrtodd615
 
Discuss how complementary social- managerial- and organizational asset.docx
Discuss how complementary social- managerial- and organizational asset.docxDiscuss how complementary social- managerial- and organizational asset.docx
Discuss how complementary social- managerial- and organizational asset.docxrtodd615
 
difference between Gre tunnel and vpn tunneling-Solution1- VPN tunneli.docx
difference between Gre tunnel and vpn tunneling-Solution1- VPN tunneli.docxdifference between Gre tunnel and vpn tunneling-Solution1- VPN tunneli.docx
difference between Gre tunnel and vpn tunneling-Solution1- VPN tunneli.docxrtodd615
 
Effective managers stay abreast of current HR topics- Some relevant is.docx
Effective managers stay abreast of current HR topics- Some relevant is.docxEffective managers stay abreast of current HR topics- Some relevant is.docx
Effective managers stay abreast of current HR topics- Some relevant is.docxrtodd615
 
effective managers stay abreast of current HR topics- Some relevant is (1).docx
effective managers stay abreast of current HR topics- Some relevant is (1).docxeffective managers stay abreast of current HR topics- Some relevant is (1).docx
effective managers stay abreast of current HR topics- Some relevant is (1).docxrtodd615
 
Discuss how the following court case illustrates how the courts- throu.docx
Discuss how the following court case illustrates how the courts- throu.docxDiscuss how the following court case illustrates how the courts- throu.docx
Discuss how the following court case illustrates how the courts- throu.docxrtodd615
 

More from rtodd615 (20)

Discuss the differences between a form and a report- What characterist.docx
Discuss the differences between a form and a report- What characterist.docxDiscuss the differences between a form and a report- What characterist.docx
Discuss the differences between a form and a report- What characterist.docx
 
DQuestion 23 10 pts Explain how the de Broglie wavelength is related t.docx
DQuestion 23 10 pts Explain how the de Broglie wavelength is related t.docxDQuestion 23 10 pts Explain how the de Broglie wavelength is related t.docx
DQuestion 23 10 pts Explain how the de Broglie wavelength is related t.docx
 
Discuss in scholarly detail implications of any considerations that sh.docx
Discuss in scholarly detail implications of any considerations that sh.docxDiscuss in scholarly detail implications of any considerations that sh.docx
Discuss in scholarly detail implications of any considerations that sh.docx
 
Does adding debt increase or decrease the flexibility of a healthcare.docx
Does adding debt increase or decrease the flexibility of a healthcare.docxDoes adding debt increase or decrease the flexibility of a healthcare.docx
Does adding debt increase or decrease the flexibility of a healthcare.docx
 
Discuss the difference between Financial Accounting and Managerial Acc (1).docx
Discuss the difference between Financial Accounting and Managerial Acc (1).docxDiscuss the difference between Financial Accounting and Managerial Acc (1).docx
Discuss the difference between Financial Accounting and Managerial Acc (1).docx
 
Distinguish between individual barriers and organizational barriers to.docx
Distinguish between individual barriers and organizational barriers to.docxDistinguish between individual barriers and organizational barriers to.docx
Distinguish between individual barriers and organizational barriers to.docx
 
Discussion Topic 1- Internal control consists of the policies and proc.docx
Discussion Topic 1- Internal control consists of the policies and proc.docxDiscussion Topic 1- Internal control consists of the policies and proc.docx
Discussion Topic 1- Internal control consists of the policies and proc.docx
 
Discuss the tools and technologies for collaboration and teamwork that.docx
Discuss the tools and technologies for collaboration and teamwork that.docxDiscuss the tools and technologies for collaboration and teamwork that.docx
Discuss the tools and technologies for collaboration and teamwork that.docx
 
Discuss the statement of cash flows Values Limitations This relates to.docx
Discuss the statement of cash flows Values Limitations This relates to.docxDiscuss the statement of cash flows Values Limitations This relates to.docx
Discuss the statement of cash flows Values Limitations This relates to.docx
 
discuss the role of nanotechnology in today-'s information age-Solutio.docx
discuss the role of nanotechnology in today-'s information age-Solutio.docxdiscuss the role of nanotechnology in today-'s information age-Solutio.docx
discuss the role of nanotechnology in today-'s information age-Solutio.docx
 
Discuss the reasons for the growing interest in and availability of hi.docx
Discuss the reasons for the growing interest in and availability of hi.docxDiscuss the reasons for the growing interest in and availability of hi.docx
Discuss the reasons for the growing interest in and availability of hi.docx
 
Discuss the nature of Greek theater and the purpose it served in Ancie.docx
Discuss the nature of Greek theater and the purpose it served in Ancie.docxDiscuss the nature of Greek theater and the purpose it served in Ancie.docx
Discuss the nature of Greek theater and the purpose it served in Ancie.docx
 
Discuss the impact of a strong culture on organization and managersSol.docx
Discuss the impact of a strong culture on organization and managersSol.docxDiscuss the impact of a strong culture on organization and managersSol.docx
Discuss the impact of a strong culture on organization and managersSol.docx
 
Discuss the advantage and disadvantage of supporting links to files th.docx
Discuss the advantage and disadvantage of supporting links to files th.docxDiscuss the advantage and disadvantage of supporting links to files th.docx
Discuss the advantage and disadvantage of supporting links to files th.docx
 
Discuss how engineers and risk experts view and deal with risks- (Appr.docx
Discuss how engineers and risk experts view and deal with risks- (Appr.docxDiscuss how engineers and risk experts view and deal with risks- (Appr.docx
Discuss how engineers and risk experts view and deal with risks- (Appr.docx
 
Discuss how complementary social- managerial- and organizational asset.docx
Discuss how complementary social- managerial- and organizational asset.docxDiscuss how complementary social- managerial- and organizational asset.docx
Discuss how complementary social- managerial- and organizational asset.docx
 
difference between Gre tunnel and vpn tunneling-Solution1- VPN tunneli.docx
difference between Gre tunnel and vpn tunneling-Solution1- VPN tunneli.docxdifference between Gre tunnel and vpn tunneling-Solution1- VPN tunneli.docx
difference between Gre tunnel and vpn tunneling-Solution1- VPN tunneli.docx
 
Effective managers stay abreast of current HR topics- Some relevant is.docx
Effective managers stay abreast of current HR topics- Some relevant is.docxEffective managers stay abreast of current HR topics- Some relevant is.docx
Effective managers stay abreast of current HR topics- Some relevant is.docx
 
effective managers stay abreast of current HR topics- Some relevant is (1).docx
effective managers stay abreast of current HR topics- Some relevant is (1).docxeffective managers stay abreast of current HR topics- Some relevant is (1).docx
effective managers stay abreast of current HR topics- Some relevant is (1).docx
 
Discuss how the following court case illustrates how the courts- throu.docx
Discuss how the following court case illustrates how the courts- throu.docxDiscuss how the following court case illustrates how the courts- throu.docx
Discuss how the following court case illustrates how the courts- throu.docx
 

Recently uploaded

History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 

Recently uploaded (20)

History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 

Discuss reaction strategies to handle Malware-SolutionMalware- Malware.docx

  • 1. Discuss reaction strategies to handle Malware? Solution Malware: Malware is a software that is dangerous, It can damage phone, desktop or tablet. There are many types of malware: Strategies: There are two ways : 1.Protecting the enclave boundaries 2.Protecting the computing environment. Enclave Boundaries: Enclave Boundary is the point where the organisation interacts with internet. Firewall: Firewall is used to access the control for inbound and outbound comunications.Various attacks will be reduced .The firewall needs to be configured for outbound network traffic. Intrusion Detection system: It is used to identify network traffic in real time.They have signatures to detect malwars and abnormal network communications. The IDS placement is external to the organization as well as internally, just behind the firewall. Computed Environments Computing hardware and software from attack will be the first line of defence against the malware inside and outside.
  • 2. Authorised local network devices: USB thumb-drives, MP3 players, personal or consultant laptops may be a threat ,therefore if an exception is required by business case, the owner should ensure the device is free of malware before allowed to connect to the network. Operating systems hardening: Operating systems should be hardened to improve the ability to withstand attacks. Anti virus updating: Anti virus updation is a very important strategy to control malware. Every updation of viruses will clean up the system particularly and prevent by network malwares. Change control process: A change control has to be processed for the document and review firewall and other network changes before they are implemented. Host based firewall: These are  helpful to identify applications that may have been trojanized after initial installation. It is also used to validate the application. Vulnerability scanning:It is used to scan results in which hosts are vulnerable of various attacks.