ratzan2

Machine ac t io np lan 1 write d o wnth e e rro ro ra

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: S h a re d ne two rk d rive h a ng e s o nly: Inc re m e nta l/d iffe re ntia l Do no t b a c k up a file o rig ina l! o n th e s a m e d is c a s th e As s um e e ve ry d is c , C D, e tc is s us p e c t, no m a tte r wh o g a ve it to yo u “Do ve rya y , No P ro ve rya y ” (T ru s t b ut Ve rify) MACHINE INFECTED? MACHINE AC T IO N P LAN: 1) Write d o wn th e e rro r o r a le rt m e s sage ve rb inform your tech support team • a tim •quarantine the machine 2) Look up the message in an authoritative anti­virus site (demo) •diagnose the problem •take recommended remedial action If appropriate: •Download, install, run the anti­virus removal tool (demo) •Apply all missing critical security patches (demo) 3) Reboot the machine •Run a full system scan before placing the machine back in service THE HOAX STOPS HERE THE IF THE MESSAGE: •tells you to do something •tells you to take immediate action •cites a recognizable source to give itself credibility (“Microsoft has warned that…”) •does not originate from a valid computer vendor AND : •lacks specific verifiable contact information IF IN DOUBT, CHECK IT OUT C o nfirm th e h o a x b y c h e c king it a g a ins t a uth o rita tive h o a x s ite s Info rm o th e r s ta ff s o th e h o a x d o e s no t p ro p a g a te POPULAR HOAXES INCLUDE: POPULAR JDBG MG R (te d d y­b e a r ic o n) NIG ER I A $ 8 0 0 FR O M MIC R O S O FT T ric ks us e rs into d e le ting a file Mo ne y scam P y ra m id s c he m e STOPPING THE TROJAN HORSE STOPPING The Horse must be “invited in” …. How does it get in? By: Downloading a file Ins ta llin g a p ro g ra m O p e ning a n a tta c h m e nt O p e ning b o g us We b pag e s C o p ying a file fro m s o m e o ne e ls e MORE ON THE HORSE……. A T ro ja n Ho rs e e xp lo its c o m p ute r p o rts le tting its “frie nd s ” e nte r, a nd “o nc e a th ie f g e ts into y o ur h o us e h e o p e ns a re a r wind o w fo r h is p a rtne rs ” S e c urity p a tc h e s o fte n c lo s e c o m p ute r p o rts a nd vu lne ra b ilitie s NOTE #1 NOTE S e a rc h e ng ine s a re NO T re lia b le s o urc e s o f virus info rm a tio n Info...
View Full Document

This document was uploaded on 01/14/2014.

Ask a homework question - tutors are online