It is impossible to eradicate malware on a machine but


ISS:

Disc 1: Describe the best practice to employ to mitigate malware effects on a machine.

Please write at least 250 words for above topic (references mandatory)

Please respond to the below article with no less than 125 words

Surya Chinthalaphani :

It is impossible to eradicate malware on a machine, but there are few steps that could be followed to reduce malware attacks. Increased portability, ease of Wi-Fi and shared data across multiple devices are adding up to increased malware threats. It is hard to detect such malware and in many cases, by the time it is detected, the damage is already done.

Back-Up:

This needs to be performed to any cloud service regularly to recover important data in case of an attack. Data can also be stored in encrypted format to safeguard it further on a machine.

Software checks needs to done:

Maintenance for existing software and installing only secure software will have to ensured. Anti-malware software can be used to detect any such activities while installing new software. Filtering out at installation level is the key to logically blocking such malwares from attacking.

Education:

Most malware attacks take aid of social engineering to make a successful attempt of stealing data. This can be eradicated by educating one self. Updates for any apps or software should never be done unless and until it is from a verified link. Only educating helps in knowing the difference between an actual link and a fake link.

Changing default settings:

Making settings change on a mobile device can prevent updates from happening atomically. This way, user can check if the update is really necessary and do it manually. Same applies to tablets, laptops and for other software in desktops as well.

I conclude this topic by saying that planning to prevent and detect such malware and executing the plans in cases of attacks helps by promoting the user to be responsive to disaster recovery.

References:

1)Volykin A, (2017). Ransomware: Best practices for Prevention and Response.

2) Zeltser L, (2015). 4 steps to combat Malware Enterprise-wide.

3) Musthaler L, (2011) Best practices for stopping malware and other threats.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: It is impossible to eradicate malware on a machine but
Reference No:- TGS02871751

Now Priced at $10 (50% Discount)

Recommended (99%)

Rated (4.3/5)