Discuss reaction strategies to handle Malware? Solution Malware: Malware is a software that is dangerous, It can damage phone, desktop or tablet. There are many types of malware: Strategies: There are two ways : 1.Protecting the enclave boundaries 2.Protecting the computing environment. Enclave Boundaries: Enclave Boundary is the point where the organisation interacts with internet. Firewall: Firewall is used to access the control for inbound and outbound comunications.Various attacks will be reduced .The firewall needs to be configured for outbound network traffic. Intrusion Detection system: It is used to identify network traffic in real time.They have signatures to detect malwars and abnormal network communications. The IDS placement is external to the organization as well as internally, just behind the firewall. Computed Environments Computing hardware and software from attack will be the first line of defence against the malware inside and outside. Authorised local network devices: USB thumb-drives, MP3 players, personal or consultant laptops may be a threat ,therefore if an exception is required by business case, the owner should ensure the device is free of malware before allowed to connect to the network. Operating systems hardening: Operating systems should be hardened to improve the ability to withstand attacks. Anti virus updating: Anti virus updation is a very important strategy to control malware. Every updation of viruses will clean up the system particularly and prevent by network malwares. Change control process: A change control has to be processed for the document and review firewall and other network changes before they are implemented. Host based firewall: These are  helpful to identify applications that may have been trojanized after initial installation. It is also used to validate the application. Vulnerability scanning:It is used to scan results in which hosts are vulnerable of various attacks. .