Information Security (IS18)

Agencies are required to implement controls for the prevention, detection and removal of malicious and mobile code. Malicious code. Malicious code includes, but is not limited to, viruses, spyware, worms, Trojan horses and logic bombs. The following controls are recommended: anti-malware software. software authorisation policy and processes ................
................