Вы находитесь на странице: 1из 7

Table of Contents

Question 1........................................................................................................................ 2
Use of Command Prompt in Windows....................................................................................... 2
Pictures for reference ............................................................................................................... 2
Question 2........................................................................................................................ 3
Question 3........................................................................................................................ 4
Question 4........................................................................................................................ 4
Question 5........................................................................................................................ 4
Question 6........................................................................................................................ 5
CONCLUSION .................................................................................................................... 6
REFERENCES ..................................................................................................................... 7

1
Question 1
To remove malware from a computer can be a big challenge, because hackers spent
most of their time finding new ways of developing better malware to corrupt or
destroy computer files or software. Because of the rapid evolve of technology one
can just not simple windows Remove Software tool to get rid of most viruses today,
because virus can run in the background without a user noticing at all. The following
are some ways in which computer viruses can be removed without the use of
antivirus software or programs

Use of Command Prompt in Windows


Firstly run the command prompt by going to the start and type command prompt on
the search programs and files, then select the affected drive name. Type(the signs
are not included while typing in the command prompt) s-h*.*/s/d . Then type dir
this command shows all the content in the drive that one has selected in the earlier
command. The next step is to check if there is an unusual .exe file, if theres an
autorun.inf file rename it rename filename.extension newfilename by doing the
previous steps one can access the drive without affecting the virus.

Then go back to my computer and select the drive then delete the harmful files, one
can also delete the harmful file by the use of the command prompt with the
command del filename. Then restart the computer and use it again without no
malware signs.

Pictures for reference

2
a. The reason why people manually remove computer virus is because it is a
challenge to remove totally using an antivirus software moreover since virus
are executable codes it becomes easier to detect it if it is running in the
background using the command prompt.
b. It is more efficient as opposed to using an antivirus software because one can
just search for the unfamiliar program in the drive and delete it as opposed to
doing scans with software which consume time and their search algorithms
may sometimes fail.
c. Manual virus removal is not user friendly to everyone or non-technical users
because it is hard to memories all the commands used in the command
prompt moreover they may be confusing, and once a command is mistakenly
executed there is no reversing.
d. It is a good idea to remove computer virus manually because computer virus
can hide from an antivirus so it is better and more efficient to remove it
manually before it can spread and cause damage.

Question 2
According to Firsher (2017) descriptions on samples of the most commonly
targeted carriers are:

1. Executable files. These are the files that run the series of instructions
contained in the file when it is opened. The examples of executable files
extensions are .exe, .com, .dll, .ovl, .app, .ocx, and .prg.
2. Scripts. These are the file that are not compliled, these files are not in binary
format but in plain text format The examples of executable files extensions are
.vbs, .js, .php, and .prl.
3. Macros. These are files that support a macro scripting language of a
particular application, such as a word processor, spreadsheet, or database
application.

3
Question 3
Some common examples of threats that should be considered and understood when
developing a comprehensive security strategy are:
1. Joke software: This is the application that is intent to produce a smile or, the
hand gestures, head gesture, a waste of someone's time, and many other
interesting screen effects to funny animations.
2. Internet cookies: These are text files that are placed on a user's computer by
Web sites that the user visits. Cookies contain and provide identifying
information about the user to the Web sites that place them on the user
computer, along with whatever information the sites want to retain about the
user's visit.
3. Scams: An e-mail message that attempts to trick the recipient into revealing
personal information that can be used for unlawful purposes, phishing is the
precise type of a scam.

Question 4
The questions may be helpful when balancing risk management and business needs
may be:

1. What is the companys budget for computer systems?


2. What is would be the cost if the company is to configure its security system?
3. What is the companys budget for technology support and maintenance?
4. What would be the cost if an alarm system is needed for the sever room?
5. Should electronic keys be used for the server room or the whole building
access? What would be the cost?

Question 5
With reference to Limkokwing University Maseru Campus, the critical elements to
consider for an effective physical defence plan can be:

1. The School security: It is not every one who has access to the school
premises, in order to get into the school campus one has to have an
identification card, if not state reasons why he is at the place.

4
2. Individual security: In this case, at school restriction is set of who has
access to what inside the school premises.
3. Network Access Points: It is not everybody who has access to the network
equipment at school, moreover in the IT admin access is granted to only the
IT specialists.
4. Server Computers: There are people who are given access to temper with
the server computers it is not just anybody.

5. Workstation computers: ensuring that everybody access the workstations


that he\she has a right to?

Question 6
Table with the list of some vulnerabilities that are likely to affect Limkokwing
systems. Beaver (2014) states the list of vulnerabilities as follows:
High level
vulnerability Brief description of the vulnerability Example (if applicable)
class
Physical Unlocked doors n/a
Software Deliberately placed weaknesses Vendor backdoors for
management or system
recovery
Social Manipulating users to reveal Threatening a user to
confidential information reveal his/her passwords
Networks Unprotected network communications Easy connection to the
or poor network strength enterprise network for the
hackers or cyber
delinquents as a result
increase risk. The network
strength for students is
actually poor especially
between the hour of
0900hrs to 1800hrs
Technologies Rapid Technology changes n/a
Student Student access to data. Student portal.
Wrong usage of multimedia labs. The IT students Bypass the
blocked sites by the
department of IT through
the use of proxy-sites on
portable browsers or VPNs.

Software Multimedia software are not activated The software like CS6 still
require product key to use.
Windows OS is not

5
activated hence some
functionalities are not
supported

CONCLUSION
In computer security non-technical people do not know procedures of cleaning virus
without using the anti-virus software and lack the understanding of differentiating the
attacks that attacked their computer. On the other hand they found it friendly and
easier to use antivirus. Malware is a virus; it will attempt to target a carrier object
(also known as a host) to infect it. The number and type of targeted carrier objects
varies widely among different forms of malware. Furthermore there is variety of
threats existing that are not considered malware because they are not computer
programs written with malicious intent. However, these threats can still have both
security and financial implications for midsize businesses.

Viruses, worms, Trojan horses, Ransomware, Spyware, Rootkits, and Spam should
be considered and understood when developing a comprehensive security strategy.
Balancing risk management and business needs: Investing in a risk management
process helps prepare midsize businesses to articulate priorities, plan to mitigate
threats, and address the next threat or vulnerability to the business. Budget
constraints may dictate IT security spending but a well-structured risk management
methodology, when used effectively, can help management identify appropriate
controls for providing the mission-essential security capabilities. Midsize business
must weigh the delicate balance between risk management and their business
needs.

6
REFERENCES
1. Beaver, K. (2014). 10 The 10 most common Windows security vulnerabilities.
Available at http://searchenterprisedesktop.techtarget.com.[accessed on
01/12/2017 at 08:20hrs].
2. Fisher, T. (2017). How to Open, Edit & Convert EXE Files. Available at
https://www.lifewire.com. [accessed on 29/10/2017 at 1420hrs].

Вам также может понравиться