THIS IS A SAMPLE! Feel free to use or modify it for your own use! Want a Policies and Procedures Wiki like this? Sign up for a Staff.Wiki trial by clicking here.

Malicious Code Protection System Inspection

Frequent spot-checks should be made to ensure that all malicious code protection systems are updated, run on-time and complete their scan. Failure to do so may seriously compromise the security of our computer systems.

Malicious code includes viruses, worms, ransomware, Trojan horses, and spyware. Malicious code can be encoded in various formats, contained within compressed or hidden files, or hidden in files using techniques such as steganography. Malicious code can be inserted into systems in a variety of ways including web accesses, electronic mail, electronic mail attachments, and portable storage devices. Malicious code insertions occur through the exploitation of system vulnerabilities. 

Designated locations include system entry and exit points which may include firewalls, remote access servers, workstations, electronic mail servers, web servers, proxy servers, notebook computers, and mobile devices. 

Malicious code protection mechanisms include anti-virus signature definitions and reputation-based technologies.

Check MCPS is up-to-date

Check MCPS runs as scheduled

Check MCPS completes

Want a Policies & Procedures Wiki like this? Sign up and try Staff.Wiki by clicking here.


Next Topic:
v6.0.0.14103
Up Since 4/23/2025 12:38:55 PM