Sign In
Not register? Register Now!
Essay Available:
You are here: HomeEssayIT & Computer Science
1 page/≈275 words
No Sources
IT & Computer Science
English (U.S.)
MS Word
Total cost:
$ 5.4

Mitigating Malware Risks It & Computer Science Essay (Essay Sample)


The paper entailed identifying the key controls that can be put in place to mitigate against the risk of malware attacks


Mitigating Malware Risk and Attacks
Student’s Name
Institutional Affiliation
Mitigating Malware Risk and Attacks
Malware attacks have becomes rampant in the recent past. There are various types of malware including Trojan horse, worms, viruses and ransomware. When an organization is attacked using malware, the controls put in place determine the impact of the attack. The organization in question had put in place strategies to mitigate against malware attacks. For instance, an acceptable user policy was put in place to ensure users only used the provided information technology resources for appropriate activities. Disciplinary measures were put in place for individuals who appear to have violated the acceptable use policy.
The new CISO implemented an incident response strategy and put up a team that could investigate the origin of malware. Incident response teams of the essence for organizations that want to reduce the impact of successful attacks. Awareness was created among users on what should be considered as an incident and email related extortions were considered incidents by the new CISO. 

Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Digital Evidence Business Plan It & Computer Science Essay
    Description: Procurement of a system for purposes of running any business requires an elaborate business case. The documentation of the business case has to prove beyond reasonable doubt that the system to be purchased will make business better. Management only buys into the idea of investing when...
    1 page/≈275 words| 2 Sources | APA | IT & Computer Science | Essay |
  • Network Devices And The Osi Model It & Computer Science Essay
    Description: Communication between end user machines and servers is facilitated by a network that lies between them. There are various network devices that fall on different layers of the OSI model that are used to build the network. The devices play different roles on a network and it is the roles that tie them...
    1 page/≈275 words| 1 Source | APA | IT & Computer Science | Essay |
  • Cyber Security Risk IT & Computer Science Essay Paper
    Description: Systems and underlying data are assets owned by the business. The information technology department comes in to support business in utilizing IT resources. Whenever a risk associated with systems or underlying data materializes, it is the business that suffers losses. The information technology department...
    1 page/≈275 words| 3 Sources | APA | IT & Computer Science | Essay |
Need a Custom Essay Written?
First time 15% Discount!