Details: Online interactions pose a threat to all servers. Some risks can occur when employees use social networking, web browsing, and email. Playbooks typically cover a section related to threats and defenses of online interactions.
In this next section of your playbook, outline steps to take when an employee reports clicking on a website that appeared in an email that was received.
Describe 2 threats this interaction poses on the company.
Provide step-by-step instructions on how to mitigate each interaction.
Remember, numbered or bulleted steps or guidelines make the document easy for others to follow under potentially stressful situations. Paragraphs can be used to help support the steps or guidelines.
Combine this week’s assignment with your revised assignment from Wk 2 – Apply Malware Attacks sections of your Playbook before you submit (attached document) You will be assessed on the content from both weeks in this week’s Playbook submission.
Cite at least 2 resources to support your assignment.
Format your assignment according to APA guidelines.
Submit your assignment.
Center for Writing Excellence
Reference and Citation Generator
Grammar and Writing Guides
Your malware attack description is clear. The vulnerability and attack vector is on point. Your mitigation steps are on track. The plan of action is ordered and effective. If you get hit by a malware attack the first thing you should do is to disconnect your system from all networks (e.g., Internet). This includes Wi-Fi and any direct connect cables (e.g., Ethernet). Removing your connections is the best, first act to break-off an attack. Paper properly formatted and of sufficient length. References are present.