Time
2 hours 23 minutes
Difficulty
Beginner
CEU/CPE
3

Video Transcription

00:02
Hello and welcome to I t Security Policy Training on Cyber Eri
00:06
This is Porter module to the malicious software policy with myself. Troy Lemaire
00:12
Learning objective for this part of the module is gonna be about anti virus software, new software distribution and retention of ownership.
00:24
If we look at the policy itself, this is gonna be a template that we have used from health. I t dot gov
00:30
purposes The stops requirements, which must be met by all computers connected to the network to ensure effective malicious code spam and spyware protection
00:39
go above it apart. The policy applies to all company employees and affiliates
00:44
looking at the body of the policy. First, we're gonna cover the antivirus software installation.
00:49
There's an anti virus. Software is installed on all practical personal computers and service
00:56
bars. Updates
00:58
must be updated daily on the practice server and workstation virus Update engines and data files are monitored by appropriate administrative staff that's responsible. Keeping all virus patterns up to date.
01:07
Then, when I would get into configuration, this is a piece that you will change in this template they're using. McAfee virus can enterprise whatever
01:17
system you're using or software, you're using four virus scanning, Whether it is McAfee or a trend product or a semantic product or a Cisco and product you would want to put in there. What is the actual software that is being used? And then what time frame
01:34
is the updates being received from the vendor on a daily basis?
01:40
Remote deployment configuration through an automated procedure, updates and virus patch to maybe push out to individual work stations on an as needed basis. So you want to cover if systems don't touch your network. And if this is apple to you, you want to put. Howard, though, is going to be updated
01:53
and in monitoring. Reporting record of iris patterns for all workstations Servers
01:59
may be maintained. So
02:00
what you're saying is the use of the reporting function and monitoring function is gonna be done by the administrative staff of the organization, as requested by the security officer Are appropriate personnel.
02:14
Now we're looking at new software distribution on Lee software created by the practice or the company
02:19
staff
02:21
and approved by the security officer appropriate personnel we used on internal computers and networks. All new software will be tested by appropriate personnel in order to ensure compatibility, current
02:30
installed software and network configurations.
02:32
So,
02:34
uh,
02:35
what you're saying is, is that you're not allowing people to just install software whenever they want to. It has to go through the I T department and some type of approval process.
02:43
In addition, appropriate personnel, my skin, all software for viruses before they actually installed.
02:49
So
02:50
that means that before a piece of software is actually insulted, you wanna verify that software does not have any type of virus or mouth or anything else attached to that will infect your network.
03:01
Although shareware everywhere can be often useful for sources of work related programs,
03:07
it must be approved by security officer are appropriate personnel
03:12
precaution included. Turning that software does not
03:15
because of all these on misbehavior, interfere with *** the practice hardware software data and the software does not contain viruses
03:22
from the software designer are required in the process of distribution, and this goes to at times what happened. His virus makers will take a piece of software and then repackage it with the execute well, having some type of malicious code in it so that whenever you install this application where you're thinking it is the version coming from? In fact, manufacturing is not.
03:42
It is coming
03:44
pre bonded with some type of virus software that will infect your network but also give you the software that you're looking for us. You have to be careful in those types of situations very hard to figure that out without doing a buyer scan first.
03:55
All their data and program files that have been Elektronik president to a practice computer network from another location must be scanned for viruses immediately after being received. So this is where your email scanning would come in. Basically, you wanna have some type of email server that will do a scan before it is actually sent to the end user.
04:15
Or if you're using some type of service like it
04:15
FTP or something like that, you want to make sure that anything sent over is scanned before it is actually used.
04:23
Every disk at City Rahm DVD and USB device, a potential source for computer buyers. Therefore, all of these must be scanned for virus infection. Prior to copying information to one of the computers for the organization are on the network.
04:38
Peter shall never be booted from a disc a cat or a CD or DVD or USB received from an outside source,
04:44
though this goes back to the story of
04:46
leaving USB drives in a parking lot with infected malware on it, and then random user walks by season and says, Oh, this must belong to somebody fell out their pocket. They take that salt that USB, plug it into their computer and then boot up and automatically. That infection
05:03
affected disk now takes over that computer and then infects the machine as well as could infect the whole network.
05:12
So if we look at the retention of ownership also for programs and documentation provided by employees, consult our contractors
05:18
or the um,
05:21
the ownership of the actual organization
05:25
Boys Developing programs Documentation was sign a statement knowledge that the organization owns
05:30
everything that they are producing.
05:34
You look at now the policy compliance
05:38
them for a SEC team, forcing and verify compliance to the policy from various methods.
05:43
Exceptions must be approved first by the information security team in advance,
05:47
and they're not compliance.
05:49
All employees found to have violated the policy may be subject to disciplinary action up to and including termination of employees.
06:00
In summary today's brief lecture, we talked about antivirus software, new software distribution as well as a retention of ownership in regards to software
06:13
malicious software policy. Recap question.
06:16
Robbery personnel My skin All software for viruses before what
06:21
and that would be installation on a system
06:26
Next policy. Recap Question Computer shall never be blank from a disc at CD ROM's DVD or USB device received from an outside source,
06:36
and that would be booted.
06:41
Looking forward the next lecture. We're gonna look at another general policy, which is the security incident policy.
06:47
You have any questions for clarification? Reach me on cyber message, username at trial mayor and thank you for attending this side. Very training.

Up Next

Introduction to IT Security Policy

Introduction to IT Security Policy, available from Cybrary, can equip you with the knowledge and expertise to be able to create and implement IT Security Policies in your organization.

Instructed By

Instructor Profile Image
Troy LeMaire
IT Security Officer at Acadian Ambulance
Instructor