This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

Best Practice to Employ to Mitigate Malware Effects on a Machine

downloadDownload printPrint

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

Get your price

121 writers online

Download PDF

Best Practice To Employ To Mitigate Malware Effects On A Machine can be defined as follows:

Only authorized devices should be allowed: Devices which are pre-approved only should be allowed to connect to main systems. Personal USB, music players smartphones etc should not be allowed to connect. If necessary proper scanning must be done to make sure that device is free of any malware.

Regular updates and patching of operating system: Every organization should form a standard policy for regular updates and patching of all devices. This policy should define procedures which will look for new patches provided by vendor and should name person responsible for smooth patching/update and to monitor the device after update/patching.

Updated Anti-Virus: It is required that anti virus program are set to automatic update so that new virus definitions and scan engine engines are available. It should be monitored that every single device is updated regularly as a single vulnerable machine can result in total security failure.

Changes should be monitored: A policy should be made to make sure that any change will not result in unexpected behavior of devices which could result in security lapse. Effects of every change should thoroughly analyzed and in case of failure A roll back mechanism should be available.

Local firewall on machines: Every machine including mobile and laptop should have a local firewall which will detect the incoming and outgoing data and will keep track of updating of devices.

Scanning for vulnerability: Vulnerability scanning plays a major role in mitigation of threat. In this any tool or script is used to mimic the behavior of malware and then scan results are used analyze which are the loopholes and weak points are available on machines. If any machine is vulnerable, then immediate steps should be taken to secure it.

Web content filter and proxy servers should be used: These steps can prevent user from unknowingly being redirected to malicious sites. Web server is the only server allowed to connect to external internet using HTTP and HTTPS protocol.

Email filter: Filter malicious looking attachment only document extension should be allowed and continuously monitored.

Monitoring of logs: Only anti-virus software, firewalls etc. should not be considered as last measure against malware. Logs of firewalls, proxy server, DNS server etc. should be monitored on daily basis.

What if machines still got infected: If only few machines are infected immediately they should be disconnected from network. All outgoing data to external networks should be immediately ceased. Analyze logs to find out which systems were affected and how. Start analyzing any new software or utility installed if yes try to remove them.

Remember: This is just a sample from a fellow student.

Your time is important. Let us write you an essay from scratch

experts 450+ experts on 30 subjects ready to help you just now

delivery Starting from 3 hours delivery

Find Free Essays

We provide you with original essay samples, perfect formatting and styling

Cite this Essay

To export a reference to this article please select a referencing style below:

Best Practice To Employ To Mitigate Malware Effects On A Machine. (2019, August 27). GradesFixer. Retrieved January 22, 2022, from
“Best Practice To Employ To Mitigate Malware Effects On A Machine.” GradesFixer, 27 Aug. 2019,
Best Practice To Employ To Mitigate Malware Effects On A Machine. [online]. Available at: <> [Accessed 22 Jan. 2022].
Best Practice To Employ To Mitigate Malware Effects On A Machine [Internet]. GradesFixer. 2019 Aug 27 [cited 2022 Jan 22]. Available from:
copy to clipboard

Sorry, copying is not allowed on our website. If you’d like this or any other sample, we’ll happily email it to you.

    By clicking “Send”, you agree to our Terms of service and Privacy statement. We will occasionally send you account related emails.


    Attention! This essay is not unique. You can get a 100% Plagiarism-FREE one in 30 sec

    Receive a 100% plagiarism-free essay on your email just for $4.99
    get unique paper
    *Public papers are open and may contain not unique content
    download public sample

    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.



    Please check your inbox.

    Want us to write one just for you? We can custom edit this essay into an original, 100% plagiarism free essay.

    thanks-icon Order now

    Hi there!

    Are you interested in getting a customized paper?

    Check it out!
    Having trouble finding the perfect essay? We’ve got you covered. Hire a writer

    Haven't found the right essay?

    Get an expert to write you the one you need!


    Professional writers and researchers


    Sources and citation are provided


    3 hour delivery