Describe six malware safeguards.

What will be an ideal response?


It is possible for users to avoid most malware using the following malware safeguards:
• Users should install antivirus and antispyware programs on the computer-The IS department will have a list of recommended programs for this purpose. When users choose a program for themselves, they should choose one from a reputable vendor. Reviews of antimalware software should be checked on the Web before purchasing.
• Users should set up the antimalware programs to scan the computer frequently-Users should scan their computers at least once a week and possibly more often. When they detect malware code, they should use the antimalware software to remove it. If the code cannot be removed, users should contact the IS department or antimalware vendor.
• Users should update malware definitions-Malware definitions are patterns that exist in malware code and should be downloaded frequently. Antimalware vendors update these definitions continuously, and users should install these updates as they become available.
• Users should open email attachments only from known sources-also, even when opening attachments from known sources, users should do so with great care. Most antimalware programs check email attachments for malware code. However, all users should form the habit of never opening an email attachment from an unknown source. Also, if they receive unexpected emails from a known source or an email from a known source that has a suspicious subject, odd spelling, or poor grammar, users should not open the attachment without first verifying with the known source that the attachment is legitimate.
• Users should promptly install software updates from legitimate sources-unfortunately, all programs are chock full of security holes; vendors are fixing them as rapidly as they are discovered, but the practice is inexact. Users should install patches to the operating system and application programs promptly.
• Users should browse only reputable Web sites-It is possible for some malware to install itself when users do nothing more than open a Web page.

Business

You might also like to view...

An individual does not need to agree to uphold the code of professional conduct in order to become licensed as a CPA

a. True b. False Indicate whether the statement is true or false

Business

Which type of question offers no restrictions on the type of response that is expected?

A. directed B. leading C. open-ended D. secondary

Business

Martin, who owned a piece of property along with two other tenants, executed a will in which he left all his property to his son. When Martin died, his son received his interest in the shared property and became a tenant with the other two owners

What kind of concurrent ownership would allow such a passage of title? A) a joint tenancy B) a tenancy in common C) a tenancy by entirety D) a community property

Business

Use of the word consideration in an agreement means that consideration has been given.

Answer the following statement true (T) or false (F)

Business