blog




  • Essay / Practices for Mitigating the Effects of Malware

    Malware is any type of malicious software that can modify the functionality of a machine. Malware is believed to be easy to deploy remotely and difficult to trace to its source, which has significantly increased the black market for malware providers (BITS, 2011). Before developing a strategy and practices to mitigate the effects of malware, it is important to understand the different types of malware and their behaviors that can impact an organization. Say no to plagiarism. Get a tailor-made essay on “Why violent video games should not be banned”? Get the original essay The fight against malware should be a collective approach rather than the responsibility of an individual or group. Within an organization, proper analysis and risk assessment should be carried out to ensure that there are no gaps in the way the company deals with malware issues. MSDN Library (2006) has listed an excellent strategic approach that provides guidance for identifying, prioritizing, controlling, and mitigating such malware attacks. According to this, it is important to assess the risk and prioritize it according to the company, to carry out decision support to periodically evaluate the controls put in place, by implementing controls on a regular basis depending on advancements in the malware industry by staying informed of the trends in this dark market and implementing effective ways to measure the risk management process implemented within a company so that the company can introspect at different levels to mitigate malware risks. Keep browser plug-ins up to date by installing patches as soon as they become available from vendors. Block the use of P2P by enforcing a no-P2P (peer to peer) policy so that malware cannot be shared via P2P. networks in a company. Disable Windows autoplay option, as external drives and USB cards can be a primary source of malware transfer to machines. Enable enhanced security in Adobe Reader that can protect the machine from any harmful attacks via PDF files. Limit the use of network mapped drives because there is a high probability of malware attacks being transferred through these mapped drives. These drives can be closed unless it is an absolute requirement in the business. It is important to examine the effectiveness of email security because emails and URLs are the very common type of medium for malware attacks (Musthaler, 2011). Efforts should be made to develop a mitigation system. organization's strategy to reduce, if not completely avoid, malware attacks, not only reactively, but also proactively, in order to prepare for and remain protected against such malware attacks against an organization . Keep in mind: This is just a strategy Get a custom article now from our expert writers. Get a Custom Trial At a high level, ways to minimize possible means of attack are to ensure that all patches are installed on time. Limit the number of services running on a system, which in turn reduces the possibility of attacks Control and limit publicly available data about the system and organization (Conklin et.al, 2016).