Viruses, Spyware and Malware Impacts
April 14, 2009Performance Impacts to your System(s)
Tax – Memory resources
Tax – Processor resources
Pop-ups
Trojans
Malware
Spyware
Greyware
Virus propagation
P2P applications / file sharing
Hidden applications
Removal of restore points
Keystroke loggers
Results in a:
Compromise use
Compromise data
Compromise email
Compromise confidentiality
System could be used to attack other systems
Shares
Hidden Shares
Hidden Files
Cookies
Keystroke LoggersFile system integrity
Un-authorized applications
Countermeasures:
Patch remediation
Antivirus updates
AntiSpyware updates
Virus removalPolicies:
Acceptable use
Restrict website access (firewall)
No USB or CD usagehttps://www.bestitdocuments.com/Samples/