Internally the security policy entails securing of hardware and software from any unauthorized access. Unwarranted access into the company systems is a high risk avenue for Conficker and similar malware infestation. The IT team should have the use of password assigned to select 4 Carole Theriault, "Conficker: How To Avoid Infection And What To Do If You Are Infected", Naked Security, Last modified 2011, .
Subscribe to view the full document.
company executives trusted with private and confidential information. Password use is an essential tool that serves an important security role. Part of the data and security policy is to run frequent malware scans to detect any threats to the system. The antivirus technology has been proven as a trusted cushion against Conficker and similar malware infestation. Internally, the company has to keep up with the system update based on the type of software on which the system runs. If notifications on software update are not made in good time, it opens up gaps for possible bug infiltration. It has been established that Conficker and similar malware get into systems via unpatched software, unsupported servers and updated systems. Recommendations Based on the Delphi Method aided risk analysis - on a simulated Conficker and similar malware infestation - on Payday Loans (an instant digital money lending company), the following are some of proposed measures meant to avert such a re-occurrence. As much as cyber security is shared responsibility between the company and the client, Payday Loans would be held more accountable in the event of a security breach. Regular antivirus scan and update: Run frequent malware scans to detect and combat any threats to the system before information is corrupted. Proper password management: The passwords should be assigned to select company executives trusted with private and confidential information. Software updates: Payday Loans has to keep up with the system update based on the type of software on which the system runs.Bibliography
Kumar, AJ. 2019. "An Introduction To Cyber Security Policy". Infosec Resources. .Porras, Phillip, Hassen Saidi, and Vinod Yegneswaran. 2009. "An Analysis Of Conficker". Usenix.Org. .html.Theriault, Carole. 2011. "Conficker: How To Avoid Infection And What To Do If You Are Infected". Naked Security. -avoid-infection/.Vijayan, Jai. 2017. "Conficker: The Worm That Won't Die". Dark Reading. -id/1330594.
As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.
Temple University Fox School of Business ‘17, Course Hero Intern
I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.
University of Pennsylvania ‘17, Course Hero Intern
The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.