Malware consists of unwanted programs like Trojans and viruses. Signs of malware include degraded
system performance, unusual services and network traffic, altered or removed system logs, missing or
inactive anti-virus, and any number of application anomalies. Trojans and viruses impact all three tenets of
information systems security.
Identify and describe three techniques used in the lab to defend against malware. Describe some
advantages and disadvantages of each.
Enabled on the network and properly configured, a firewall can block outside sources from being able to
insert malware and viruses. By default, the Windows Firewall disables several important services like File
Transfer Protocol (FTP) and Internet Control Message Protocol (ICMP), both of which use the Ping
command.
Explain why enabling these default settings is significant to network security. Elaborate on what can
happen if they are left disabled.
Pick one of the following defense layers and provide descriptions (including how they work) of two
controls or countermeasures that can be effectively used within it.
Perimeter.
Network.
Host.
Application.
Data.
Physical.
Sample Solution