eliminating threats with a layered security approach 1

Address each of the following in the Word document that contains your screenshots. Clearly label each section.

  1. Malware consists of unwanted programs like Trojans and viruses. Signs of malware include degraded system performance, unusual services and network traffic, altered or removed system logs, missing or inactive anti-virus, and any number of application anomalies. Trojans and viruses impact all three tenets of information systems security.
    • Identify and describe three techniques used in the lab to defend against malware. Describe some advantages and disadvantages of each.
  2. Enabled on the network and properly configured, a firewall can block outside sources from being able to insert malware and viruses. By default, the Windows Firewall disables several important services like File Transfer Protocol (FTP) and Internet Control Message Protocol (ICMP), both of which use the Ping command.
    • Explain why enabling these default settings is significant to network security. Elaborate on what can happen if they are left disabled.
  3. Pick one of the following defense layers and provide descriptions (including how they work) of two controls or countermeasures that can be effectively used within it.
    • Perimeter.
    • Network.
    • Host.
    • Application.
    • Data.
    • Physical.