This chapter was the nuts and bolts for Desktop security. It
covered the malicious software attacks of malware. As we learned the two
primary types of malware are viruses and Worms. The purpose of these two is to
infect one’s computer and/or software. Concealed malware is introduced in many
different forms to your computer. The following are explained along with some
possible remedies:
- Trojan horse
- Rootkits
- Logic Bombs
- Zombies and Botnets
Another key area of attack is on Hardware. This would
include cell phones, USB devices, and theft of computers and information. Some
of the basic antidotes against this type of attack are to ensure:
- Proper antivirus and malware software is used.
- Updates and patches are done on regular basis.
- Backups of data and files are done regularly.
- Consider backup to independent drives.
- Locking mechanism for laptop computer.
One must be prepared as best as possible to recovery from an
attack. The following list will help you through the process:
- Disconnect
- Identify
- Disinfect
- Recheck
- Reinstall
- Analyze
Finally, I found the chapter to be very informative and
helpful. Once again the Lab assignments were beneficial and verified the
security integrity of the system.
No comments:
Post a Comment