Module 5 Unit 2 Using Best Practices
[Pages:21]CompTIA IT Fundamentals+ (Exam FC0-U61)
Module 5 / Unit 2 / Using Best Practices
Copyright ? 2018 CompTIA, Inc. All rights reserved. Screenshots used for illustrative purposes are the property of the software proprietor. Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission CompTIA, 3500 Lacey Road, Suite 100, Downers Grove, IL 60515-5439. CompTIA? and the CompTIA logo are registered trademarks of CompTIA, Inc., in
the U.S. and other countries. All other product and service names used may be common law or registered trademarks of their respective proprietors.
CompTIA IT Fundamentals+
2
Securing Devices
? Device "hardening" ? Anti-virus/anti-malware ? Patching/updates ? Enabling passwords ? Default/weak passwords ? Disabling unused features ? Removing unwanted/unnecessary software
CompTIA IT Fundamentals+
3
CompTIA IT Fundamentals+
Computer Viruses
? Infection vector
o Program viruses o Macro viruses o Worms
? Payload
? Delivery
o Email attachments o AutoRun media o Application exploits (drive-by
download)
4
Other Types of Malware
?Trojans ?Spyware ?Ransomware
CompTIA IT Fundamentals+
5
Operating System Vulnerabilities
?Most malware infects computers by tricking users into running it
?Malware can also exploit software vulnerabilities to execute without user intervention
?Vulnerabilities could also be exploited to crash a host or process
?Patch management ensures that software is protected against exploits for known vulnerabilities
CompTIA IT Fundamentals+
6
Preventing Malware Infections
? Risks
?Reducing exposure
oUnsafe websites oUnsolicited email oOther infected hosts oUncontrolled file execution oZero-day exploits
oBack up data
oApply patches and updates
oInstall and update security software
oScan files on-access
oLimit administrative privileges
oControl file execution
CompTIA IT Fundamentals+
7
Anti-virus Software
? Software that detects and blocks malware
o Identify known malware using signatures (definitions)
o Identify malware-like behaviour in a process using heuristics (behaviour analysis)
? Personal software and enterprise suites
? Vendors--Symantec (including the Norton brand), McAfee, Avast/AVG, Trend Micro, Sophos, Kaspersky, ESET, BitDefender
CompTIA IT Fundamentals+
8
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related download
- how to easily clean an infected computer malware removal
- malware
- free virus delete software download
- guide to malware incident prevention and handling for
- how to remove adware and pop up ads removal guide
- dnschanger malware
- the risks of using portable devices cisa
- chapter 8 malware ftms
- module 5 unit 2 using best practices
- 3 software troubleshooting all
Related searches
- 2 5 x 2 5 square in pixels
- lesson 5 unit 3
- phonics spelling grade 5 unit 4 week 1 page 94
- grade 5 unit 5 week 4
- ectd module 5 folder structure
- practice grade 5 unit 4 week 3
- practice grade 5 unit 1 week 1
- best practices using microsoft teams
- grade 5 unit 1 week 5
- word meaning grade 5 unit 1 week 5
- grade 5 unit 6 lesson2
- best practices for using ms teams