Defense Plan to Prevent Attacks
There are many different external threats, vulnerabilities, and insider security threats that have existed in Aim Higher College IT Infrastructure. The best way to deal with any kind of a threat current or future is through hard training of IT Management staff and general employees of the institution, will it be Administration or Faculty. The second most important way to deal with threats is to have a thorough Disaster Recovery Plan that is in place for all employees of the AHC. So when the disaster or breach of systems strikes, IT personnel can follow a good guideline and procedure to recover from things like malware, viruses, Trojans, Worms, hacking attacks, breach of security, and even insider threats from disloyal employees.
Malware consists of programming code, scripts, active content, and other software designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access to system resources, and other abusive behavior. The best-known types of malware, viruses and worms, are known for the manner in which they spread, rather than any other particular behavior. The term computer virus is used for a program that has infected some executable software and, when run, causes the virus to spread to other executables.
Viruses may also contain a payload that performs other actions, often malicious. On the other hand, a worm is a program that actively transmits itself over a network to infect other computers. It too may carry a payload.
Trojan horse is any program that invites the user to run it, concealing a harmful or malicious payload. The payload may take effect immediately and can lead to many undesirable effects, such as deleting the user's files or further installing malicious or undesirable software. Trojan horses known as droppers are used to start off a worm outbreak, by injecting the worm into users' local network.
The issues related to the security of the...