Discussion

  

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

3 Conference Questions:

  1. Please      compare the strengths and weaknesses of the primary methods that AV      software uses to detect viruses. Which method do you feel is the best in      the modern environment and why?
  2. You      are a cybersecurity professional for an enterprise organization with a      decent sized IT staff. An end-user in your environment calls you and says      they have a virus on their machine. What methods do you use to identify,      isolate, and remediate this issue? As this is a business, it is paramount      to minimize downtime and get the end-user back up and working as fast as      possible. Please remember to factor in that requirement in your answer.

Please create a separate top level thread for each question. Consider these mini writing assignments, with proper APA citations used for all sources. Responses should expand upon, or offer counter points or additional thoughts on a topic. Please note the rubric for conferences.

Readings / Videos

For this week, I have tried to present a baseline of the topics mentioned. Please remember that good research is key to success in cybersecurity, and readings/videos that are assigned can only cover so much without taking up every free hour you may have. If you come across a concept or term you are unfamiliar with, follow the links and/or google that term. Wikipedia is an excellent resource to obtain knowledge in a simplified form. If after searching, a concept, term, or idea is confusing or you want more information, please post in the QA forum and we can discuss it.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

· Messer. (2014, September 14). Application Configuration Baselining and Hardening – CompTIA Security+ SY0-401: 4.1. Retrieved February 12, 2017, from 

· S. (2012, September 17). Creating a Baseline Image for Windows Refresh. Retrieved February 11, 2017, from 

http://www.anotherwindowsblog.com/2012/09/baseline-image-for-windows-refresh.html

· Eli the Computer Guy Live. (2015, February 04). Question: What is the Most Efficient Way to Deploy Operating Systems on Different Hardware? Retrieved February 12, 2017, from 

· LinusTechTips. (2014, October 04). Antivirus vs Anti-malware as Fast As Possible. Retrieved February 12, 2017, from 

· Stowe, M. (2003). Security Management View of Implementing Enterprise Antivirus Protection. SANS Institute. Retrieved from 

https://www.sans.org/reading-room/whitepapers/malicious/security-management-view-implementing-enterprise-antivirus-protection-907

· Galarneau, L. (2002). Anti-virus Software: The Challenge of Being Prepared for Tomorrow’s MalWare Today. SANS Institute. Retrieved from 

https://www.sans.org/reading-room/whitepapers/commerical/anti-virus-software-challenge-prepared-tomorrows-malware-today-782

· Falkins, B. (2016). A SANS Guide to Evaluating Next-Generation Antivirus. SANS Institute. Retrieved from 

https://www.sans.org/reading-room/whitepapers/clients/old-new-replacing-traditional-antivirus-37377

· Chee, J. (2008). Host Intrusion Prevention Systems and Beyond. SANS Institute. Retrieved from 

https://www.sans.org/reading-room/whitepapers/intrusion/host-intrusion-prevention-systems-32824

Still stressed from student homework?
Get quality assistance from academic writers!

Order your essay today and save 25% with the discount code LAVENDER