virus malware spyware

5 pts.
Tags:
Information security governance
malware
Risk analysis
Risk assessment
Security threats
Spyware
Viruses
I want to how to conduct a risk assessment to protect our pcs, networks

Answer Wiki

Thanks. We'll let you know when a new response is added.

Check out these <a href=”http://searchsecurity.techtarget.com/search/1,293876,sid14,00.html?query=risk+assessment&x=0&y=0″>search results</a> from SearchSecurity.com.

———–

Conducting risk assessment could not be predicted right away. This is because virus or any other malware programs could attack anytime with a single click or press of your keyboard. The most important thing you have to consider is to make sure that you have the latest antivirus software in a full license and constantly scan your computer system for possible threats.

=============
The best factors you have to consider in your risk assessment procedure for the effective protection of your computer are the following.

-Antivirus Software
-Firewall
-Operating System Updates
-Restrictions

Discuss This Question: 2  Replies

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Bobkberg
    Before you get too far, I'd ask management (assuming that they asked you to do this), what sorts of risks they are looking for. Here are some basic areas - each of those divides into many more. 1) Physical - Dust, dirt, lack of cooling, dirty electricity, safety of equipment and personnel 2) Unpatched (and therefore vulnerable) workstations and servers, Event logs checks for important problems - disk failure, time synch errors, file system integrity. 3) Poor security configurations (no controls on passwords, file sharing, wide-open firewall, etc.) 4) Poor security awareness on the part of staff - i.e. has everyone been trained on what's good and bad? 5) State of cleanliness/infection from a virus and spyware point of view. Also - check out the SANS reading room at www.sans.org. Lots of good material there too. Bob
    1,070 pointsBadges:
    report
  • Paolaas
    Try to classify the data you would like to assess. With your classification as a basis, you know which data is vital for your organisation, and needs to be well protected and which data is more or less public. Classification in ITIL terms are confidentiality, integrity and availability. Re your local legislation, confidentiality refers to any privacy legislation local or, if applicable, European Union acts. With integrity you ensure the completeness and timelyness of your data and availability has to do with the continuity of your data. Let me know if there is anything I can help you with.
    10 pointsBadges:
    report

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following