Saturday, November 3, 2012

Desktop Security – Chapter 2

This chapter was the nuts and bolts for Desktop security. It covered the malicious software attacks of malware. As we learned the two primary types of malware are viruses and Worms. The purpose of these two is to infect one’s computer and/or software. Concealed malware is introduced in many different forms to your computer. The following are explained along with some possible remedies:
  • Trojan horse
  • Rootkits
  • Logic Bombs
  • Zombies and Botnets
Another key area of attack is on Hardware. This would include cell phones, USB devices, and theft of computers and information. Some of the basic antidotes against this type of attack are to ensure:
  • Proper antivirus and malware software is used.
  • Updates and patches are done on regular basis.
  • Backups of data and files are done regularly.
  • Consider backup to independent drives.
  • Locking mechanism for laptop computer.
One must be prepared as best as possible to recovery from an attack. The following list will help you through the process:
  • Disconnect
  • Identify
  • Disinfect
  • Recheck
  • Reinstall
  • Analyze
Finally, I found the chapter to be very informative and helpful. Once again the Lab assignments were beneficial and verified the security integrity of the system.

No comments:

Post a Comment