0% found this document useful (0 votes)
15 views1 page

Protecting The Workstation

This document provides guidelines for hardening computer configurations and protecting workstations against malware attacks. It recommends regularly updating operating systems and applications, configuring personal firewalls and access controls, using antivirus software, and educating users on safe computing practices like avoiding suspicious email attachments.

Uploaded by

lavanya.puri14
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views1 page

Protecting The Workstation

This document provides guidelines for hardening computer configurations and protecting workstations against malware attacks. It recommends regularly updating operating systems and applications, configuring personal firewalls and access controls, using antivirus software, and educating users on safe computing practices like avoiding suspicious email attachments.

Uploaded by

lavanya.puri14
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Harden system to resist

attacks

Manage OS updates

Protect against buffer


overflows

Configure OS
protections
Computer
Configuration Antivirus and anti-
Guidelines spyware applications
Remove unnecessary
services, applications

Hardening computer
Malware Protection
Implement access configuration
control

User training and


Configure personal awareness
firewall

Protecting the Install on every


Workstation computer
Limit user rights Specific precautions:

Disable file extension Keep current with


hiding antivirus signatures

Many malware schemes Antivirus Software 1. Download new


rely on social signatures
engineering

2. Test antivirus
Prevent automatic downloads
download of graphics User Training Four key steps in
and audio in email deploying updated
signatures: 3. Deploy new
signatures, ensure
Don't open email proper distribution
Good practices for
attachments from
users:
strangers
4. Continue to monitor
periodaclly
Accept, open only
expected email
attachments

You might also like