Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

hypothetical For the scenario listed below, illustrate for the new hires the str

ID: 3868255 • Letter: H

Question

hypothetical For the scenario listed below, illustrate for the new hires the strengths and weaknesses of the different approaches. This will help new hires gain a more practical understanding of how to deal with these types of issues that they are likely to face in their day-to-day job. Base on the Information security core tenets (CIA) Confidentiality, Integrity, Availability. APA format with cited sources.

Malware: Recently, one of your client’s staff has been inundated with phishing emails that are targeted at individuals and related to current business opportunities for the company. These messages are linked to malware and sent by known threat actors. What physical and technical controls would be helpful to address the issue and prevent this type of vulnerability in the future? Compare and contrast the different methods that could be used to mitigate the given threat.

Explanation / Answer

In this world of ubiquitous computers and threats from the hackers protecting the system is a must. The key
path from which the malware attacks the systems is the internet and its popular service the web.
There are some ways which may be used to protect the system and remove malware from the systems. No one method is enough to ensure the system to be secure. more the layers of defence the harder it beccomes for the hackers to use or hack the system. here are some steps to protect the system from malware attacks.
1-Install Firewall
2-Install Antivirus Software
3-Install Anti Spyware Software.
4-Use Complex and secure passwords
5-Check on the security settings of the browser.

1- Install Firewall-
The firewall acts as the security guard for the system. There are two types of firewall- a software firewall and a hardware firewall.Each serves simiarly but have different purposes. firewall is the first step in providing the security to the system. it created a barrier between the system and any unauthorized program trying to come inside the system through net.

2-Install Antivirus software- Antivirus is another way of securing the system. it is a software that helps to protect the systems from any unauthorized code or files or software that can create threat to the system. Unauthorized software includes viruses,torjans etc this may slow down the speed of the system, delete the important files and can also access personal information.One must install Antivirus softwares on the systems to prevent from the malware attacks. Antivirus software also plays a major role in real time protection and it also provides atomatic updates and helps to protect the system from further attacks of viruses. Email protection is also provided by antiviruses.

3-Install anti spyware software - Spyware is a software that collects personal information or information about an organization without its approval. This information is redirected to a third party website. Spyware are designed
in such a way that are not easy to be removed. Anti spyware software is designed to combat spyware. Spyware also provides realtime protection.

4-Use complex password and secure password-
to keep or maintain the system secure is to have a strong and a complex passwords. it is difficult for the hackers to break or detect complex passwords.a complex passwords with minimum 8 characters in length and should include combination of lowercase letters,uppercaseletters,special characters,numbers so create a password complex. Hackers use certain tools to break passwords.

5-Check on security settings of the browser-
browsers have various security and privacy settings that should be reviewed and should be set to a level that is desired. recent browsers provides the ability to tell websites not to track one's location or its movements which potentially increases the privaacy and security of the systems.

These are some ways in which protection from malware attacks can be avoided on the system in an organization.