Impact of Malware on an Organization

Requirement

Your CIO is concerned about malware (viruses, worms, Trojan horses, etc.) that could cripple your organization. You have been tasked with describing the various attacker motives for attacking information networks. You also must provide at least one example demonstrating how a particular virus has affected one or more organizations. Describe the essential elements of a good security policy for an organization. Write your paper in a memo format that you would submit to your CIO.

Discuss and cite at least one additional credible or scholarly source other than the course textbooks to support your analysis and positions. Use Saudi Electronic University academic writing standards and APA style guidelines, citing references as appropriate. Your paper should be two to three pages in length. Before submitting your final version, be sure to submit a draft version to the TurnItIn Checker on the Colorado Platform.

Solution

Malware is a term given to software which get installed on our systems unknowingly/knowingly and then perform various unwanted tasks. These tasks are mainly done for some third party and their benefits. They can range from very simple ad-pop ups to complicated, computer damaging software which steals sensitive data. Certain malwares are designed just for extracting the surfing habits of an individual and provide information to advertisers.
Some of the major malwares are (IST, 2015):-

  • Virus- They are able to multiply themselves and spread to other devices and delete files, modify them and use the memory of computer.

  • Spyware-They are able to gather certain sensitive information and then forward that to particular parties of interest. Information such as IP address of computer, visited website information etc.

  • Browser hijacking software- these software make changes to the settings of the browser, display pop-ups, create shortcuts on the desktop

  • Adware- These create pop-ups when a device is connected to internet and financially support some other program.

The experts of Allassignmenthelp.com can provide computer science assignment help for all modules based on your university's syllabus. We have the ability and knowledge to assist you with any aspect of computer network assignments. The students can anytime take our computer programming assignment help and score their desired grades.

Now talking more specifically about viruses (Lister, 2015):-

  • Worm- It has the ability to multiply itself which leads to several negative effects on the system. It can cause problem to the C drive of the computer.

  • Trojan- It is able to trace the login credentials of users sitting online and is dangerous for people who operate E-banking.

  • Memory resident viruses- The hide in the RAM of a computer and execute themselves every time OS runs and infects other open files.

  • Trojan horse- It is one of the dangerous virus as it portrays itself to be an important file or an attractive application but actually it does more harm than the other viruses. They do not attack on any file, rather are themselves dangerous  

Some of the important elements of a good security policy for an organization are (Taylor, 2001):-

  • Accountability for security- It is important to stipulate responsibilities and roles of all the users, management and extra staff.

  • Policies for network services- It is important to create policies for remote access, management of all the IP’s, security switch procedures. 

  • Policies for system- It is important to designate and explain the security configuration of host for all the operations of mission-critical systems.

  • Physical security- Analysing the security of card-key readers, installation of cameras, handling of visitors.

  • Response and Incident handling- It is important to make protocols when security is breached or disrupted, in that case things will remain a bit stable.

  • Acceptable and behaviour use policies- It is important for analysing the importance of behaviour that is to be expected from various employees and on what needs to be filled on various forms and documents.

  • Training of security- It is important to keep your regular security staff up to date with the latest techniques. Hence, having proper training plans is important.

Place Order For A Top Grade Assignment Now

We have some amazing discount offers running for the students

Place Your Order

REFERENCES

  • 1.    IST. (2015). Viruses, Spyware, and Malware. Retrieved April 17, 2016, from https://ist.mit.edu/security/malware

  • 2.    Lister, T. (2014, October 9). The different types of computer viruses. Retrieved April 17, 2016, from http://typeslist.com/different-types-of-computer-viruses/ Solutions, L. T. C. (2015, April 1). 

  • 3.    Taylor, L. (2001, February 16). Seven elements of highly effective security policies. Retrieved April 17, 2016, from http://www.zdnet.com/article/seven-elements-of-highly-effective-security-policies/

Get Quality Assignment Without Paying Upfront

Hire World's #1 Assignment Help Company

Place Your Order