Read Response-1 below and give your opinion on response given by one of your classmate. your answer should be supported with research unless the question is opinion oriented.. Responses to discussions below should not be “I agreeâ€ or “I like the way you stated that.â€ These responses should again be insightful, offering an opinion or facts based on your research and experiences. The response to one classmate should be a minimum of 200 words. See APA criteria for citing resources.
Question:Describe the best practice to employ to mitigate malware effects on a machine.?
A lot of things can be put in place to protect the internal network of the organization by installing firewall which could prove as the first line of defense. Also, the access to those firewalls should be controlled. Intrusion Detection Systems can be put in place which does a very good job of identifying network traffic by detecting port scans and in other fishy communications in real-time. There are new viruses discovered every day and plans should be put in place to upgrade the anti-virus systems automatically and periodically. The monitor logs should be checked regularly to detect any break-in in the systems. From illicit document sharing administrations: You’re without anyone else if you enter this domain.
There is minimal quality control in the realm of illicit programming, and it is simple for an aggressor to name a bit of malware after a prevalent film, collection, or program to entice you into downloading it. Antivirus programming: Someone should do a job on antivirus software to be sheltered. Keep it refreshed, turn, and plan an output to keep running in any event once every month. (Try not to run two antivirus programs; they will each other. Hostile to malware: With malware attacks on the rise, certain preventative measures can be taken to protect the computer and the data in it. These include but are not limited to keeping the software updated, installing anti-malware and anti-virus software, running periodic checks on the computer, using security tokens and firewalls, avoid using open networks and adding protective layers to keep sensitive data secure. Also called an enemy of spyware, numerous antivirus applications incorporate an enemy of malware part. On the off chance that yours does not, introduce and utilize an independent enemy of malware program that does not strife with your antivirus program. Keep it refreshed. Execution can be initiated by various client activities, the most well-known trigger being only a tick, regularly on a connection or spring up. The portrayals could state something upsetting like, “Your record has been undermined. If it’s not too much trouble sign in and confirm late charges” or “Guarantee your prize.” Very frequently, a spring up will be shown quickly in the wake of tapping the connection, for example, “Your framework is tainted! Snap here to run a sweep.” The following snap, for the most part, initiates the download of a vindictive payload, regardless of whether the client neglects to choose one of the alternatives and rather attempts to close the program utilizing the corner.The user should go ahead to limit network shares. Malware is easily spread through organization drives. users should utilize the Intrusion Prevention System (IPS) in Systemic Endpoint Protection to prevent intruders before they get an access to the machine. Protecting mobile devices is important because devices can carry and transfer malware to the PC and the entire system.
Zhang, M., Jha, N., & Raghunathan, A. (2014). A defense framework against malware and vulnerability exploits. International Journal of Information Security, 13(5), 439â€“452. https://doi.org/10.1007/s10207-014-0233-1
Khammas, B. M., Ismail, I., & Marsono, M. N. (2019). Pre-filters in-transit malware packets detection in the network. Telkomnika, 17(4), 1706â€“1714. https://doi.org/10.12928/TELKOMNIKA.v17i4.12065