security

Viruses, Spyware and Malware Impacts

April 14, 2009

Performance Impacts to your System(s)

Tax – Memory resources
Tax – Processor resources
Pop-ups
Trojans
Malware
Spyware
Greyware
Virus propagation
P2P applications / file sharing
Hidden applications
Removal of restore points
Keystroke loggers

Results in a:

Compromise use
Compromise data
Compromise email
Compromise confidentiality
System could be used to attack other systems
Shares
Hidden Shares
Hidden Files
Cookies
Keystroke Loggers

File system integrity
Un-authorized applications

Countermeasures:

Patch remediation
Antivirus updates
AntiSpyware updates
Virus removal

Policies:

Acceptable use
Restrict website access (firewall)
No USB or CD usage

https://www.bestitdocuments.com/Samples/