Saturday, July 27, 2019

Information Technology Malware Management in the Enterprise Essay

Information Technology Malware Management in the Enterprise - Essay Example Every business or an enterprise ought to follow this classic approach with the â€Å"just-on-time† feature that entails malware information assessment and handling (IATAC, 2009). Background Malware problems are ever growing and continue to be a nuisance for computer users. Manufactures of malware programs have continued to increase over the years and by 2010, there were 14 million different malware programs recorded. An astonishing 60,000 sections of malicious code was being discovered every single day. A rather recent work known as the Koobface surfaced, its purpose was to target people on social networks and it’s created profited by making 2 million dollars in one year. A worm known as the Mariposa has been known to create the largest network of zombie machines on the entire planet. Experts, despite making their best efforts, could not calculate its exact size however they were able to pinpoint the number of computers that became infected by Mariposa which was over 12 million. What the worm did was drop spyware that stole susceptible information from the individuals who suffered, which includes bank account numbers and credit card credentials. This idea was completely planned by a solitary hacker in Spain who happened to make a blunder by chance that uncovered him and he was arrested (Milosevic, 2010). Forms of Malware Web attacks are counted amongst the foremost subtle and dangerous ways cyber criminals use. For instance, if you are searching any sites which may seem good and harmless but at the backend they are uploaded with various harmful malware which secretly get downloaded in the browser’s PC. It can happen as such that cyber criminals square measure all their probabilities and then they frame a hijack process. Mostly the advertising banners on these sites are used for such reasons hence it is extremely important that enterprises must place security barriers between the company’s system and internet arrangement (Baloch, 2011 ). Other forms within which malware can be formed include: Botnets Instant electronic messaging Phishing tries Skype malware Gaming malware Redirects If an administrator fails to execute an immediate action once he/she has recognized the entry of malware, then it can be ascertained that a door has been opened for criminals to siphon personal information from the computer. In the fight against the malicious software system, it isn't enough to treat individual infected machines. Enterprise Strategy for fighting Malware Too often, organizations create the error of treating malware infections as a series of irregular occurrences. Anytime a bug is discovered, IT merely cleans up or rebuilds the affected host and the whole system moves on with routine operational tasks. Nonetheless this approach does not permit the enterprise to stay up with progressively aggressive and innovative attack techniques used by malware authors. It is this time when management needs to take corrective action to bypass malware defenses, evade detection, and resist efforts to get rid of it (Zeltser, 2011). In fact, combating malware whether it is a big or a small enterprise atmosphere requires locating suspicious programs on servers and workstations and then executing the strategy for removing them. However it can also be done in the manner to conjointly investigate the areas infected and detecting the departments which interfere with the utilization of malware on the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.