You are on page 1of 1

In this video, you

will learn to describe how to protect systems against


malware and cyber attacks. We spoke about malware and
the things that they do. Now let's talk
a little bit of how do we protect against them. How can we protect as we
have technical controls. Technical controls
are the hardware or software that aid into protect any information which
may include antivirus, which is kind of files
for executable code and much of signatures that
are known viruses. We also have
inter-operation systems, internal detection systems, and unified threat
management systems. Those are systems that
can look for and texting interesting progress
when we get to compromise on the environment. Each implementation
is unique and it depends on the organization
security needs. Then we have updates. With all the software deployed, we need to
stay up to-date to prevent creating new holes
into our security. This is done by applying
the security patches. Then we have operational controls also known as
administratively controls. They are put in place by
management and depends on the stuff on complying in
order to be effective. One of these controls
are policies. So policies, it's
a written document issued by an organization
to ensure that all its users comply with the rules and guidelines
related to security. An example could be
a password policy, which the enterprise
requires a minimum of 15 characters with the list
one is efficiency more. Then we have trainings. Training is to make sure that
users of the organization are aware of its policies
or threats out there. An example could be
a switch engineering training. How it shows the user. It shows the user how to deal
with the social
engineering attacks. Lastly we have
revision and tracking. Revision and tracking,
it means ensuring that the items that we just
mentioned they stay up to date.

You might also like