.

Friday, June 14, 2019

Policy Paper Assignment Example | Topics and Well Written Essays - 1250 words

Policy Paper - Assignment ExampleIn addition, certain malware programs are meant to transfer information regarding website activities to third parties (Vacca, 2013).The security policy addresses antivirus, spyware, and adware in a medium-sized organization. If defines the handling of calculator gadgets in the organization including how regularly computer software maintenance is expected to be performed, the manner in which computer updates are conducted, the type of programs to be installed and used on computers. The policy also defines the means by which prevention and removal of malware programs from computers is done (Aycock, 2011). It also denotes the types of files attachments to be impede at the stake server, anti-virus and anti-spyware programs to be run on the server. The policy also specifies whether the use an anti-spam firewall is acceptable in order to offer additional security measures to the mail server (Aycock, 2011).It also specifies the manner in which files shou ld be availed to the trusted sites and the examination process to determine unwanted or hostile content. A virus has the readiness to replicate and distribute to other programs in the computer (Aycock, 2011). It also causes damage by using up computer memory, reformatting the hard disk and deleting files. A spyware automatically gathers information from a computer and online activities and transfers it to other interested parties. Adware is financially supported or that which offers financial support to a different program through the unwrap of ads when a computer is connected to the internet (Aycock, 2011).This policy is applicable to all computers and servers that are connected or associated with the organization network through wireless connections, quantity network connections, virtual private network connections or modem connections. The policy explicitly includes computers owned by the organization, individuals or sharing the organizations network. The computer

No comments:

Post a Comment