STANDARD ON CONTROLS AGAINST MALICIOUS CODE
|
|
|
- Percival Harvey
- 9 years ago
- Views:
Transcription
1 EUROPEAN COMMISSION DIRECTORATE-GENERAL HUMAN RESOURCES AND SECURITY Directorate HR.DS - Security Informatics Security Brussels, 21/06/2011 HR.DS5/GV/ac ARES (2011) SEC /04 - Standards European Commission Information System Security Policy C(2006) 3602 STANDARD ON CONTROLS AGAINST MALICIOUS CODE ADOPTED BY MRS. IRENE SOUKA, DIRECTOR-GENERAL OF DG HUMAN RESOURCES AND SECURITY, ON 21/06/2011 Version 18/03/2011
2 TABLE OF CONTENTS 1. ADOPTION PROCEDURE INTRODUCTION SCOPE TERMINOLOGY SECURITY CONTROLS Risks targeted Security Controls statements Configuration Installation and procedures Checks Protection against malicious code at the Network Level Roles and Responsibilities REFERENCES RELATED STANDARDS AND GUIDELINES Page 2 of 10
3 1. ADOPTION PROCEDURE This Security Standard is adopted in accordance with Article 10(3) of Commission Decision C(2006) 3602 concerning the security of information systems used by the European Commission, adopted on 16 August It is drawn up under the responsibility of the Security Directorate pursuant to Article 9(1)(b) and takes into account the items listed in Article 10(2) of Commission Decision C(2006)3602, in particular internationally recognised norms and standards applicable in the field of information systems security. Under Article 10(3) of Commission Decision C(2006) 3602, the implementing rules may be supplemented by measures of a technical, physical, procedural or organisational nature proposed by the Director of the Security Directorate and adopted by the Director-General of the Directorate-General for Human Resources and Security in consultation with departments that have a legitimate interest. These supplementary measures are called security standards where their application is mandatory, or security guidelines where their application is optional or where they provide guidance on security standards implementation 2. INTRODUCTION Malicious code can be defined as "software which interferes with normal operation of a computer system". Another definition might be "software which executes without the express consent of the user". Malicious code is therefore a threat for the integrity, availability and confidentiality of data. The main concern of this standard is to implement effective and efficient prevention, detection and correction against malicious code and related security incidents. 3. SCOPE The scope of this document is limited to protection of information systems against malicious code by means of dedicated software often referred to as anti-virus software (also "anti-malware" or "virus protection software"). Issues such as spam or mobile code which share common patterns with malicious code have not been considered in this document. These issues will be treated in separate standards. Other preventive measures that can help to protect against malicious code, such as intrusion detection/prevention systems, patch management, network authentication or firewalls, are also not covered in this standard. Aspects of incident management and patching of system vulnerabilities relevant for malicious code protection are briefly addressed in this document. For further Page 3 of 10
4 information it is advised to consult the Standard on Information Systems Security Incident Management 4. TERMINOLOGY The colourful names given to different types of malicious code reflect different approaches to malicious programming: for example virus, Trojan horse, worm, logic bomb, spyware and adware. Some of them are explained below. The term computer used in this standard refers to all machines, including servers, gateways, NAS, mail gateways and workstations, including laptop computers, notebooks and handheld computing devices (e.g. PDAs). Malware: short for "malicious software"; malware is another name for malicious code and refers to software programs designed to damage, spy or perform other unauthorised actions on a computer system such as viruses, Trojan horses, worms, logic bombs, etc. Virus: A program that attaches itself to an executable file or application and delivers a payload that ranges from being just annoying to extremely destructive to computer's hard drive, files and programs in memory, and that can replicate itself to other disks. A file virus executes when an infected file is accessed. Also a generic term for any type of malware, and used as such hereafter. Trojan horse: A Trojan horse, or Trojan for short, is a term used to describe malware that appears, to the user, to perform a desirable function but, in fact, facilitates unauthorised action like unauthorised access to the user's computer system. Worm: A program that makes copies of itself elsewhere in a computing system. These copies may be created on the same computer or may be sent over networks to other computers. Some worms are security threats, using networks to spread themselves against the wishes of the system owners and disrupting networks by overloading them. A worm is similar to a virus in that it makes copies of itself, but different in that it needs not to be attached to particular files or sectors at all. Spyware: A computer software that is installed surreptitiously on a personal computer to collect information about a user or his/her computer or data without the user's informed consent. Adware: Software which displays advertisements, whether or not the user has consented. Adware will often also be spyware that displays advertisements related to what it finds from spying user's data. Keylogger: Software programs which logs the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their input is being monitored and the captured data used for malicious purposes. Page 4 of 10
5 5. SECURITY CONTROLS Policy objective 5.4.1: Permanent controls must be applied to prevent and detect the introduction of malicious software. Detection and prevention measures and appropriate user awareness procedures must be implemented Risks targeted Software and information processing facilities are vulnerable to the introduction of malicious code, such as computer viruses, network worms and Trojan horses. Security controls defined in this security standard cover the following threats: computer viruses, network worms and Trojans, etc. These security controls do not protect against threats originating from interpreted language applications (e.g. Java), cross-site scripting, etc 1. Non-compliance with this standard will result in greater risk of information systems being infected by malicious code that can: (1) Result in the loss of information/data and software on European Commission systems. (2) Increase the cost of computing maintenance and cause network downtime by malicious code outbreaks that will divert processing power and human resources to the task of watching out for and cleaning up after malicious code infections, attacks or outbreaks. (3) Result in loss of reliability of systems threatened by malicious code that spread from system to system across networks, and that can cause disclosure of European Commission sensitive data or worms that clog memory and storage facilities and slow down the systems. (4) Result in loss of reputation for the European Commission. Related threats from the "Standards on Risk Management (Appendix B)" Threat identification T23 Disclosure T26 Tampering with software T36 Corruption of data Impacted security needs Confidentiality Confidentiality, Integrity, Availability Confidentiality, Integrity 1 For these, see the Standard on Mobile Code. Page 5 of 10
6 5.2. Security Controls statements Typical controls to protect against malicious code use technology, policies, procedures and training, all applied in a multi-layered 2 manner from perimeters inward to hosts and data. The controls are of the preventive and detective/corrective variety. Controls must be applied at the hosts, servers and networks Configuration Virus 3 protection software must be configured to: (a) (b) (c) (d) scan computer memory, executable 4 files (including macros contained in data files), data files including protected files (e.g. compressed or password protected files,), and removable storage media; all files not scanned for any reason must be logged in the antivirus history logs; scan and filter incoming and outgoing traffic (including and downloads from external networks such as the Internet); be active at all times (on-access scanning); provide an alert when a suspected virus is identified; (e) comply with a standard reference configuration 5 for the anti-virus software 6 ; (f) (g) (h) disinfect, delete, rename or quarantine viruses when identified; ensure that end users cannot disable virus protection features or minimise core functionality; update virus recognition files used by virus protection software, virus protection software engines, patches, virus protection software versions, whenever new ones are released; Layered defence: a combination of security services, software and hardware, infrastructures, and processes which are implemented to achieve a required level of protection. These mechanisms are additive in nature with the minimum protection being provided by the network and infrastructure layers. Layer has to be understood in this context in the document. "VIRUS" is used with the meaning of "VIRUS", "SPYWARE", and "ROOTKIT", etc Not only *.EXE but all the files that could be executed by the operating system (e.g exe, bat, pif, scr, etc.) A configuration that has been tested and qualified internally before becoming a standard configuration to be installed on all information systems. "ANTI-VIRUS SOFTWARE" is used with the meaning of "ANTI-VIRUS", "ANTI-SPYWARE", and "ANTI-ROOTKIT SOFTWARE". Page 6 of 10
7 (i) (j) (k) (l) (m) have multiple trusted updating sources and mechanisms, internal and external sources (failover mechanisms); ensure that virus protection updates are distributed to all servers/computers automatically and within a critical timescale, prioritised by their importance; log all alerts regarding the antivirus activity and send them to a central antivirus server (alerts should be monitored); regularly run a full scan on all computers to minimise the risk of having virus(es) not yet detected because they were already residing in these computers before the application of the antivirus updates that allow their detection via on-access scanning; regularly send reports about the antivirus to the relevant personnel (see section 5.3 Roles and Responsibilities) Installation and procedures To reduce the risk of virus infection the following controls must be applied: (a) (b) (c) (d) (e) (f) evaluating virus protection software prior to purchase; installing virus protection software on all computers, e.g. servers, gateways, NAS, mail gateways, and workstations, including laptop computers, notebooks and handheld computing devices (e.g. PDAs); traffic which passes through different layers, computers or systems across the information processing environment must be scanned by at least two different software products (e.g. an message coming in would be scanned by two different products, one on the network periphery layer and the other on the server; files downloaded from internet would be scanned at the proxy level as well as on the client layer - workstation or server). implementing emergency procedures for dealing with virus incidents, so that the virus spread is stopped and adequate measures are applied; procedures for sending "virus" samples in case of suspicions must be established and the IT service provider must take every action accordingly and ensure efficient reporting; include in the reference configuration recommended security settings which reduce the risk of malicious code infections (e.g. disable autorun or browser configuration). There must be documented standards/procedures for providing protection against viruses, which should specify: (g) methods for configuring virus protection software; Page 7 of 10
8 (h) (i) update mechanisms and frequencies for virus protection software and a process for dealing with virus attacks; standard reference configuration for all systems, e.g. desktops, servers, laptops and handheld computing devices (e.g. PDAs). End users must be: (j) (k) warned of the dangers posed by computer viruses and cyber-attacks, and trained to be aware of signs of abnormal system behaviour (e.g. slow running, new processes); notified quickly of significant new virus risks (e.g. by ). End users must: (l) (m) report suspected or actual virus attacks to a single point of contact for support (e.g. a help desk) and avoid attempting to remove suspected viruses themselves; keep the existing configuration of the virus protection software, and not disable or change the configuration of the virus protection software, or attempt to bypass it Checks Regular checks must be performed to ensure that: (a) (b) (c) (d) (e) (f) virus protection software has not been disabled; the configuration of virus protection software is still correct; all updates have been applied effectively; emergency procedures are in place to deal with a virus incident; reports are sent to the concerned persons; the effectiveness of the virus protection is maintained: monitor the patterns of virus infections, false positives, false negatives etc. and take corrective actions responsibly Protection against malicious code at the Network Level 7 Virus protection software at the Gateway level must be configured to: 7 Other preventive measures specific to intrusion detection/prevention systems, network authentication or firewalls are not covered in this standard. Page 8 of 10
9 (a) scan and filter the incoming and outgoing network traffic ( , HTTP, FTP and other messaging) for real-time detection and protection of malicious code 8 ; 5.3. Roles and Responsibilities The Information Systems Security Policy requires the definition of security roles and responsibilities, and some of them are defined in the decision C(2006)3602. The following security roles will take part in the implementation and management of controls against malicious code: (1) System owner (2) IT service provider (3) Information resource managers (IRMs) (4) Local Informatics Security Officer (LISO) (5) Security Directorate (6) Users Detailed responsibilities are defined in specific sections of this standard. A RACI chart a form of responsibility assignment matrix, linking activities to roles; responsibilities used in this standard are Responsible (carries out the actual work), Accountable (approves the completed work and is fully accountable for it), Consulted (must be consulted beforehand - is part of two-way communication), Informed (informed about progress and results - one-way communication). 8 As a result of scanning and filtering the traffic, suspected malware generation servers must be blocked, but this is the subject of another standard; Page 9 of 10
10 Roles System owners IT service providers (e.g. DIGIT) Information resource managers Security Directorate LISO Users Controls Configuration A R R (5.2.1 l ) C C Installation procedures and A R R (5.2.2 b) C C R (5.2.2 l) R (5.2.2 m) Checks A R R C Protection against malicious code at the Network Level A R C C 6. REFERENCES Commission Decision C(2006) 3602 of 16/8/2006 Implementing rules for Commission Decision C(2006) 3602 of International standard ISO/IEC Second edition International standard ISO/IEC Second edition RELATED STANDARDS AND GUIDELINES Standard on Network Security Management Standard on Information System Security Incident Management Standard on Information Security Risk Management Page 10 of 10
Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:
Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for
Version: 2.0. Effective From: 28/11/2014
Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
BCS IT User Syllabus IT Security for Users Level 2. Version 1.0
BCS IT User Syllabus IT for Users Level 2 Version 1.0 June 2009 ITS2.1 System Performance ITS2.1.1 Unwanted messages ITS2.1.2 Malicious ITS2.1.1.1 ITS2.1.1.2 ITS2.1.2.1 ITS2.1.2.2 ITS2.1.2.3 ITS2.1.2.4
Quick Heal Exchange Protection 4.0
Quick Heal Exchange Protection 4.0 Customizable Spam Filter. Uninterrupted Antivirus Security. Product Highlights Built-in defense keeps your business communications and sensitive information secure from
STANDARD ON LOGGING AND MONITORING
EUROPEAN COMMISSION DIRECTORATE-GENERAL HUMAN RESOURCES AND SECURITY Directorate DS - Security Coordination and Informatics Security Brussels, 27/09/2010 HR.DS5 ARES (2010) 630327 SEC20.10.05/04 - Standards
Desktop and Laptop Security Policy
Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious
ANTI-VIRUS POLICY OCIO-6006-09 TABLE OF CONTENTS
OCIO-6006-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. Purpose II. Authority III. Scope IV. Definitions V. Policy VI. Roles and Responsibilities VII. Exceptions
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
Network Security and the Small Business
Network Security and the Small Business Why network security is important for a small business Many small businesses think that they are less likely targets for security attacks as compared to large enterprises,
COMPUTER-INTERNET SECURITY. How am I vulnerable?
COMPUTER-INTERNET SECURITY How am I vulnerable? 1 COMPUTER-INTERNET SECURITY Virus Worm Trojan Spyware Adware Messenger Service 2 VIRUS A computer virus is a small program written to alter the way a computer
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
User Documentation Web Traffic Security. University of Stavanger
User Documentation Web Traffic Security University of Stavanger Table of content User Documentation... 1 Web Traffic Security... 1 University of Stavanger... 1 UiS Web Traffic Security... 3 Background...
Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003
Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while
ITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
Managing internet security
Managing internet security GOOD PRACTICE GUIDE Contents About internet security 2 What are the key components of an internet system? 3 Assessing internet security 4 Internet security check list 5 Further
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks Objectives Describe the different types of software-based attacks List types of hardware attacks Define
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 Revision History Update this table every time a new edition of the document is
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,
Section 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
SPEAR PHISHING UNDERSTANDING THE THREAT
SPEAR PHISHING UNDERSTANDING THE THREAT SEPTEMBER 2013 Due to an organisation s reliance on email and internet connectivity, there is no guaranteed way to stop a determined intruder from accessing a business
Computer Security Maintenance Information and Self-Check Activities
Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.
FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues.
FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues. The latest tactic currently being used by malware creators
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
UBC Incident Response Plan
UBC Incident Response Plan Contents 1. Rationale... 1 2. Objective... 1 3. Application... 1 4. Definitions... 1 4.1 Types of Incidents... 1 4.2 Incident Severity... 2 4.3 Information Security Unit... 2
Client Guide for Symantec Endpoint Protection and Symantec Network Access Control
Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in this book is
Don t Fall Victim to Cybercrime:
Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security
Chapter 8 Types of Utility Programs and Operating Systems. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 8 Types of Utility Programs and Operating Systems Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define system software and identify the two types of
NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT
Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent
What's the difference between spyware and a virus? What is Scareware?
What's the difference between spyware and a virus? What is Scareware? Spyware and viruses are both forms of unwanted or malicious software, sometimes called "malware." You can use Microsoft Security Essentials
Spyware. Michael Glenn Technology Management [email protected]. 2004 Qwest Communications International Inc.
Spyware Michael Glenn Technology Management [email protected] Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References
Symantec Endpoint Protection Small Business Edition Implementation Guide
Symantec Endpoint Protection Small Business Edition Implementation Guide Symantec Endpoint Protection Small Business Edition Implementation Guide The software described in this book is furnished under
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
How to easily clean an infected computer (Malware Removal Guide)
How to easily clean an infected computer (Malware Removal Guide) Malware, short for malicious (or malevolent) software, is software used or programmed by attackers to disrupt computer operation, gather
Sophos Endpoint Security and Control Help. Product version: 11
Sophos Endpoint Security and Control Help Product version: 11 Document date: October 2015 Contents 1 About Sophos Endpoint Security and Control...5 2 About the Home page...6 3 Sophos groups...7 3.1 About
TERMS OF SERVICE TELEPORT REQUEST RECEIVERS
TERMS OF SERVICE These terms of service and the documents referred to in them ( Terms ) govern your access to and use of our services, including our website teleportapp.co ( our site ), applications, buttons,
(Self-Study) Identify How to Protect Your Network Against Viruses
SECTION 24 (Self-Study) Identify How to Protect Your Network Against Viruses The following objective will be tested: Describe What You Can Do to Prevent a Virus Attack In this section you learn about viruses
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Information Incident Management Policy
Information Incident Management Policy Change History Version Date Description 0.1 04/01/2013 Draft 0.2 26/02/2013 Replaced procedure details with broad principles 0.3 27/03/2013 Revised following audit
Contents. McAfee Internet Security 3
User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21
ESET SMART SECURITY 6
ESET SMART SECURITY 6 Microsoft Windows 8 / 7 / Vista / XP / Home Server Quick Start Guide Click here to download the most recent version of this document ESET Smart Security provides state-of-the-art
Codes of Connection for Devices Connected to Newcastle University ICT Network
Code of Connection (CoCo) for Devices Connected to the University s Author Information Security Officer (Technical) Version V1.1 Date 23 April 2015 Introduction This Code of Connection (CoCo) establishes
Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com. Version 6.
Webroot Software User Guide for Spy Sweeper Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com Version 6.1 Webroot Software User Guide Version 6.1 2003 2009 Webroot Software, Inc. All
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
1 Introduction. Agenda Item: 7.23. Work Item:
3GPP TSG SA WG3 Security S3#34 S3-040583 6-9 Jul 2004 updated S3-040566 Acapulco, Mexico Title: Selective Disabling of UE Capabilities; updated S3-040566 based on the comments on SA3 mailing list Source:
Client Guide for Symantec Endpoint Protection and Symantec Network Access Control
Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in this book is
Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed) 01.1 Purpose
IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers
IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy DOCUMENT INFORMATION Author: Vince Weldon Associate Director of IM&T Approval: Executive This document replaces: IM&T Policy No. 1 Anti Virus Version
NC DPH: Computer Security Basic Awareness Training
NC DPH: Computer Security Basic Awareness Training Introduction and Training Objective Our roles in the Division of Public Health (DPH) require us to utilize our computer resources in a manner that protects
ANTIVIRUS BEST PRACTICES
ANTIVIRUS BEST PRACTICES Antivirus Best Practices 1. Introduction This guideline covers the basics on Antivirus Software and its best practices. It will help to have an overall understanding of the subject
ViRobot Desktop 5.5. User s Guide
ViRobot Desktop 5.5 User s Guide ViRobot Desktop 5.5 User s Guide Copyright Notice Copyright 2007 by HAURI Inc. All rights reserved worldwide. No part of this publication or software may be reproduced,
Computer Viruses: How to Avoid Infection
Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you
WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World
Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your
Information Security Incident Management Policy and Procedure
Information Security Incident Management Policy and Procedure Version Final 1.0 Document Control Organisation Title Author Filename Owner Subject Protective Marking North Dorset District Council IT Infrastructure
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Sophos Endpoint Security and Control Help
Sophos Endpoint Security and Control Help Product version: 10.3 Document date: June 2014 Contents 1 About Sophos Endpoint Security and Control...3 2 About the Home page...4 3 Sophos groups...5 4 Sophos
When you listen to the news, you hear about many different forms of computer infection(s). The most common are:
Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,
BE SAFE ONLINE: Lesson Plan
BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take
Information Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
PART D NETWORK SERVICES
CONTENTS 1 ABOUT THIS PART... 2 2 PUBLIC NETWORK... 2 Internet... 2 3 PRIVATE NETWORK... 3 Global WAN services... 3 4 SECURITY SERVICES... 3 Firewall... 4 Intrusion Prevention (Network)... 5 SSL/IPSEC
IT Security. Securing Your Business Investments
Securing Your Business Investments IT Security NCS GROUP OFFICES Australia Bahrain China Hong Kong SAR India Korea Malaysia Philippines Singapore Sri Lanka Securing Your Business Investments! Information
INTERNET ACCEPTABLE USE POLICY
INTERNET ACCEPTABLE USE POLICY 1 Introduction..3 Background..3 Objectives of this Policy...3 Application of this Policy..4 References and Related Legislation and Regulations..4 Policy Statement.4 Methods
Information Security Incident Management Policy and Procedure. CONTROL SHEET FOR Information Security Incident Management Policy
Bolsover District Council North East Derbyshire District Council & Rykneld Homes Ltd Information Security Incident Management Policy September 2013 Version 1.0 Page 1 of 13 CONTROL SHEET FOR Information
Sophos Anti-Virus for Mac OS X Help
Sophos Anti-Virus for Mac OS X Help For networked and standalone Macs running Mac OS X Product version: 9 Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5
Boston University Security Awareness. What you need to know to keep information safe and secure
What you need to know to keep information safe and secure Introduction Welcome to Boston University s Security Awareness training. Depending on your reading speed, this presentation will take approximately
Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning
Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans
HIPAA Compliance Evaluation Report
Jun29,2016 HIPAA Compliance Evaluation Report Custom HIPAA Risk Evaluation provided for: OF Date of Report 10/13/2014 Findings Each section of the pie chart represents the HIPAA compliance risk determinations
Symantec Endpoint Protection and Symantec Network Access Control Client Guide
Symantec Endpoint Protection and Symantec Network Access Control Client Guide Symantec Endpoint Protection and Symantec Network Access Control Client Guide The software described in this book is furnished
System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security
Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems
ESET SMART SECURITY 9
ESET SMART SECURITY 9 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / XP Quick Start Guide Click here to download the most recent version of this document ESET Smart Security is all-in-one Internet security
FOR MAC. Quick Start Guide. Click here to download the most recent version of this document
FOR MAC Quick Start Guide Click here to download the most recent version of this document ESET Cyber Security Pro provides state-of-the-art protection for your computer against malicious code. Based on
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
Top five strategies for combating modern threats Is anti-virus dead?
Top five strategies for combating modern threats Is anti-virus dead? Today s fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce.
Sophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
Network and Workstation Acceptable Use Policy
CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of
F-Secure Anti-Virus for Mac 2015
F-Secure Anti-Virus for Mac 2015 TOC F-Secure Anti-Virus for Mac 2015 Contents Chapter 1: Getting started...3 1.1 Manage subscription...4 1.2 How to make sure that my computer is protected...4 1.2.1 Protection
Common Cyber Threats. Common cyber threats include:
Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...
Firewall and UTM Solutions Guide
Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: [email protected] Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
E Commerce and Internet Security
E Commerce and Internet Security Zachary Rosen, CFE, CIA President, ACFE Czech Republic Chapter Introduction The Internet has become a global phenomenon reshaping the way we communicate and conduct business.
Acceptable Use Policy
Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance
Avira Small Business Security Suite. HowTo
Avira Small Business Security Suite HowTo Table of contents 1. Introduction... 3 2. Product Information... 3 2.1 Operation mode... 3 2.2 Scope of services... 3 2.3 Optimum protection. Fast updates. Efficient
UNCLASSIFIED. http://www.govcertuk.gov.uk. General Enquiries. Incidents [email protected] Incidents [email protected].
Version 1.2 19-June-2013 GUIDELINES Incident Response Guidelines Executive Summary Government Departments have a responsibility to report computer incidents under the terms laid out in the SPF, issued
Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1
Threats and Attacks Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to:
Why you need. McAfee. Multi Acess PARTNER SERVICES
Why you need McAfee Multi Acess PARTNER SERVICES McAfee Multi Access is an online security app that protects all types of devices. All at once. The simple monthly subscription covers up to five devices
Cyber Security Awareness
Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms
