Implementing this control will help the implementing organization in detecting, preventing and recovering from threats borne from malicious code.
Malicious code - viruses, logic bombs, trojan horse, root kits, etc.
This is an example of a control where a technical solution (e.g. anti-virus software) should be augmented by non-technical activities (e.g. user awareness training). Because no matter how expensive your anti-virus software is, if users keep on opening attachments from unknown senders or downloading programs from web, your anti-virus software investment would not be enough.
Tips in implementing this control:
1. installation of anti-virus software and regular update of the virus definition files to regularly scan computers and associated media to includes files received over networks and from the web.
2. establishing regular awareness interventions (e.g. training, email blasts, reminders on the intranet, posters, etc.) to educate users against opening attachments from unknown users, using illegal software and other similar activities which may increase the likelihood of getting malicious code into the network
3. including in the regular reviews and audits; be in particular look-out for the presence of illegal files
4. having an approved policy for the use of authorized software
5. preparing a business continuity plan for recovery efforts from malicious code attacks
6. having an incident management procedure including allocation of roles and responsibilities to responders for malicious code attacks
What other techniques can you think of for the proper and effective implementation of this control? Feel free to share! Good day!
Malicious code - viruses, logic bombs, trojan horse, root kits, etc.
This is an example of a control where a technical solution (e.g. anti-virus software) should be augmented by non-technical activities (e.g. user awareness training). Because no matter how expensive your anti-virus software is, if users keep on opening attachments from unknown senders or downloading programs from web, your anti-virus software investment would not be enough.
Tips in implementing this control:
1. installation of anti-virus software and regular update of the virus definition files to regularly scan computers and associated media to includes files received over networks and from the web.
2. establishing regular awareness interventions (e.g. training, email blasts, reminders on the intranet, posters, etc.) to educate users against opening attachments from unknown users, using illegal software and other similar activities which may increase the likelihood of getting malicious code into the network
3. including in the regular reviews and audits; be in particular look-out for the presence of illegal files
4. having an approved policy for the use of authorized software
5. preparing a business continuity plan for recovery efforts from malicious code attacks
6. having an incident management procedure including allocation of roles and responsibilities to responders for malicious code attacks
What other techniques can you think of for the proper and effective implementation of this control? Feel free to share! Good day!