Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.
Write a 5 page essay on Policy Paper.In addition, certain malware programs are meant to transfer information regarding website activities to third parties (Vacca, 2013).The security policy addresses a
Write a 5 page essay on Policy Paper.
In addition, certain malware programs are meant to transfer information regarding website activities to third parties (Vacca, 2013).
The security policy addresses antivirus, spyware, and adware in a medium-sized organization. If defines the handling of computer gadgets in the organization including how regularly computer software maintenance is expected to be performed, the manner in which computer updates are conducted, the type of programs to be installed and used on computers. The policy also defines the means by which prevention and removal of malware programs from computers is done (Aycock, 2011). It also denotes the types of files attachments to be blocked at the mail server, anti-virus and anti-spyware programs to be run on the server. The policy also specifies whether the use an anti-spam firewall is acceptable in order to offer additional security measures to the mail server (Aycock, 2011).
It also specifies the manner in which files should be availed to the trusted sites and the examination process to determine unwanted or hostile content. A virus has the ability to replicate and distribute to other programs in the computer (Aycock, 2011). It also causes damage by using up computer memory, reformatting the hard disk and deleting files. A spyware automatically gathers information from a computer and online activities and transfers it to other interested parties. Adware is financially supported or that which offers financial support to a different program through the display of ads when a computer is connected to the internet (Aycock, 2011).
This policy is applicable to all computers and servers that are connected or associated with the organization network through wireless connections, standard network connections, virtual private network connections or modem connections. The policy explicitly includes computers owned by the organization, individuals or sharing the organization’s network. The computer