Hello and welcome to I t Security Policy Training on Cyber Eri
This is Porter module to the malicious software policy with myself. Troy Lemaire
Learning objective for this part of the module is gonna be about anti virus software, new software distribution and retention of ownership.
If we look at the policy itself, this is gonna be a template that we have used from health. I t dot gov
purposes The stops requirements, which must be met by all computers connected to the network to ensure effective malicious code spam and spyware protection
go above it apart. The policy applies to all company employees and affiliates
looking at the body of the policy. First, we're gonna cover the antivirus software installation.
There's an anti virus. Software is installed on all practical personal computers and service
must be updated daily on the practice server and workstation virus Update engines and data files are monitored by appropriate administrative staff that's responsible. Keeping all virus patterns up to date.
Then, when I would get into configuration, this is a piece that you will change in this template they're using. McAfee virus can enterprise whatever
system you're using or software, you're using four virus scanning, Whether it is McAfee or a trend product or a semantic product or a Cisco and product you would want to put in there. What is the actual software that is being used? And then what time frame
is the updates being received from the vendor on a daily basis?
Remote deployment configuration through an automated procedure, updates and virus patch to maybe push out to individual work stations on an as needed basis. So you want to cover if systems don't touch your network. And if this is apple to you, you want to put. Howard, though, is going to be updated
and in monitoring. Reporting record of iris patterns for all workstations Servers
may be maintained. So
what you're saying is the use of the reporting function and monitoring function is gonna be done by the administrative staff of the organization, as requested by the security officer Are appropriate personnel.
Now we're looking at new software distribution on Lee software created by the practice or the company
and approved by the security officer appropriate personnel we used on internal computers and networks. All new software will be tested by appropriate personnel in order to ensure compatibility, current
installed software and network configurations.
what you're saying is, is that you're not allowing people to just install software whenever they want to. It has to go through the I T department and some type of approval process.
In addition, appropriate personnel, my skin, all software for viruses before they actually installed.
that means that before a piece of software is actually insulted, you wanna verify that software does not have any type of virus or mouth or anything else attached to that will infect your network.
Although shareware everywhere can be often useful for sources of work related programs,
it must be approved by security officer are appropriate personnel
precaution included. Turning that software does not
because of all these on misbehavior, interfere with *** the practice hardware software data and the software does not contain viruses
from the software designer are required in the process of distribution, and this goes to at times what happened. His virus makers will take a piece of software and then repackage it with the execute well, having some type of malicious code in it so that whenever you install this application where you're thinking it is the version coming from? In fact, manufacturing is not.
pre bonded with some type of virus software that will infect your network but also give you the software that you're looking for us. You have to be careful in those types of situations very hard to figure that out without doing a buyer scan first.
All their data and program files that have been Elektronik president to a practice computer network from another location must be scanned for viruses immediately after being received. So this is where your email scanning would come in. Basically, you wanna have some type of email server that will do a scan before it is actually sent to the end user.
Or if you're using some type of service like it
FTP or something like that, you want to make sure that anything sent over is scanned before it is actually used.
Every disk at City Rahm DVD and USB device, a potential source for computer buyers. Therefore, all of these must be scanned for virus infection. Prior to copying information to one of the computers for the organization are on the network.
Peter shall never be booted from a disc a cat or a CD or DVD or USB received from an outside source,
though this goes back to the story of
leaving USB drives in a parking lot with infected malware on it, and then random user walks by season and says, Oh, this must belong to somebody fell out their pocket. They take that salt that USB, plug it into their computer and then boot up and automatically. That infection
affected disk now takes over that computer and then infects the machine as well as could infect the whole network.
So if we look at the retention of ownership also for programs and documentation provided by employees, consult our contractors
the ownership of the actual organization
Boys Developing programs Documentation was sign a statement knowledge that the organization owns
everything that they are producing.
You look at now the policy compliance
them for a SEC team, forcing and verify compliance to the policy from various methods.
Exceptions must be approved first by the information security team in advance,
and they're not compliance.
All employees found to have violated the policy may be subject to disciplinary action up to and including termination of employees.
In summary today's brief lecture, we talked about antivirus software, new software distribution as well as a retention of ownership in regards to software
malicious software policy. Recap question.
Robbery personnel My skin All software for viruses before what
and that would be installation on a system
Next policy. Recap Question Computer shall never be blank from a disc at CD ROM's DVD or USB device received from an outside source,
and that would be booted.
Looking forward the next lecture. We're gonna look at another general policy, which is the security incident policy.
You have any questions for clarification? Reach me on cyber message, username at trial mayor and thank you for attending this side. Very training.