Application Security Research Project
Order ID:89JHGSJE83839 Style:APA/MLA/Harvard/Chicago Pages:5-10 Instructions:
Application Security Research Project
Write 200 to 300 words describing file-less malware and what unique considerations it brings to application security.
Project: Securing a Microsoft Windows Environment
Project Part 3: Malware Protection Procedure Guide
Scenario
Always Fresh allows external users, such as vendors and business partners, to access the Always Fresh Windows environment. You have noticed a marked increase in malware activity in the test environment that seems to originate from external users. After researching the likely source of new malware, you conclude that allowing external users to connect to your environment using compromised computers exposes Always Fresh to malware vulnerabilities.
After consulting with your manager, you are asked to create a policy that will ensure all external computers that connect to Always Fresh environment are malware free. You create the following policy:
To protect the Always Fresh computing environment from the introduction of malware of any type from external sources, all external computers and devices must demonstrate that they are malware free prior to establishing a connection to any Always Fresh resource.
Consider the following questions:
- What does malware free mean?
- How can a user demonstrate that their computer or device is malware free?
- What are the steps necessary to establish a malware-free computer or device?
- How should Always Fresh verify that a client computer or device is compliant?
Tasks
Create a malware protection procedure guide that includes steps for installing and running anti-malware software. Fill in the following details to develop your procedure guide:
- Provide a list of approved anti-malware software solutions include at least three leading antivirus and two anti-spyware products. You may include Microsoft products and third-party products. Instruct users to select one antivirus and one anti-spyware product and install them on their computer.
- Describe the process of:
- Ensuring anti-malware software and data is up to date. Mandate daily updates.
- Running regular malware scans. Mandate that automatic scans occur whenever the computer is idle. If that setting is unavailable, mandate daily fast scans and biweekly complete scans.
- Provide steps to follow any time malware is detected.
- Immediate reaction, what to do with current work, leave the computer on or turn it off
- Who to contact
- What information to collect
The procedure guide may be used by company security professionals in the future. Hence, all steps listed should be clear and self-explanatory.
Required Resources
· Internet access
· Course textbook
Submission Requirements
· Format: Microsoft Word (or compatible)
· Font: Times New Roman, size 12, double-space
· Citation Style: APA
· Length: 2 to 4 pages
Self-Assessment Checklist
· I created a procedure guide that provides clear instructions that anyone with a basic technical knowledge base can follow.
· I created a well-developed and formatted procedure guide with proper grammar, spelling, and punctuation.
· I followed the submission guidelines.
TEXTBOOK:
Title: Security Strategies in Windows Platforms and Applications
Authors: Michael G. Solomon
Publisher: Jones & Bartlett Learning
Publication Date: 2019-10-15
Application Security Research Project
RUBRIC
Excellent Quality
95-100%
Introduction 45-41 points
The background and significance of the problem and a clear statement of the research purpose is provided. The search history is mentioned.
Literature Support
91-84 points
The background and significance of the problem and a clear statement of the research purpose is provided. The search history is mentioned.
Methodology
58-53 points
Content is well-organized with headings for each slide and bulleted lists to group related material as needed. Use of font, color, graphics, effects, etc. to enhance readability and presentation content is excellent. Length requirements of 10 slides/pages or less is met.
Average Score
50-85%
40-38 points
More depth/detail for the background and significance is needed, or the research detail is not clear. No search history information is provided.
83-76 points
Review of relevant theoretical literature is evident, but there is little integration of studies into concepts related to problem. Review is partially focused and organized. Supporting and opposing research are included. Summary of information presented is included. Conclusion may not contain a biblical integration.
52-49 points
Content is somewhat organized, but no structure is apparent. The use of font, color, graphics, effects, etc. is occasionally detracting to the presentation content. Length requirements may not be met.
Poor Quality
0-45%
37-1 points
The background and/or significance are missing. No search history information is provided.
75-1 points
Review of relevant theoretical literature is evident, but there is no integration of studies into concepts related to problem. Review is partially focused and organized. Supporting and opposing research are not included in the summary of information presented. Conclusion does not contain a biblical integration.
48-1 points
There is no clear or logical organizational structure. No logical sequence is apparent. The use of font, color, graphics, effects etc. is often detracting to the presentation content. Length requirements may not be met
You Can Also Place the Order at www.collegepaper.us/orders/ordernow or www.crucialessay.com/orders/ordernow