Devry Voip Paper

Submitted by: Submitted by

Views: 143

Words: 728

Pages: 3

Category: Science and Technology

Date Submitted: 10/20/2013 05:53 PM

Report This Essay

Running Head: MALWARE RESPONSE POLICY 1

Network Security



MALWARE RESPONSE POLICY

2

ABSTRACT

Network failure is a constant peril to nearly all enterprises globally (McHugh & Deek, 2005). The interruption of production in the event of a failure or attack of a corporate network can be incidental or premeditated (Logan & Logan, 2003). As an organization becomes more prevalent they inherit a responsibility to design a malware policy to protect themselves and by extension their customers from malware attacks.

MALWARE RESPONSE POLICY 3

Malware Response Policy

According to Logan and Logan (2003), the CIH virus commonly known as Chernobyl (1999) erased information in the flash BIOS thus shuttering operation of any infected system making impossible for them to even boot. In this instance, to repair one computer or laptop from this malware surpassed the initial price of the system. The devastation of the effected machines left a lasting impression in the computer world and established a documented necessity for a malware attack policy. With a well-developed response policy, organizations such as Gem Infosys can respond to malicious software effectively. The policy formulated for Gem Infosys contains seven steps as discussed below.

Gem Infosys should identify a team of experts and operational leaders as their Malware response team. The response team should contain software professions, researchers, and malware forensics personnel whom can effectively respond to an information security incident. Moreover, the team should be able to provide expert diagnosis, technical assistance, network forensic inspection, and malware binary analysis. In this stage, the response team will conduct an assessment to identify scale, affected infrastructure and produce reports to be dispersed to high-level officials including legal staff to determine liability and public response (when required).

The team will then focus on recognition of the outbreak, samples collection,...