Post an article review (minimum of 200 words) related to system hardening or malicious software.
- Case study
Prepare a two page paper on the following:
What is the best practice to employ to mitigate malware effects on a machine?
You may use the internet for more information. Please double space your papers and cite your sources.
3.Keyterms
Select ten key terms from chapter 14 and ten key terms from chapter 15 and type the definitions of each. Upload into Canvas.
Chapter 14:
• Antispam
• •Antivirus (AV)
• •Application hardening
• •Application vulnerability scanner
• Operating system (OS)
• Heuristic scanning
• •Host vulnerability scanner
• •Hotfix
• •Network operating system (NOS)
• Pop-up blocker
Chapter 15
• Malware
• •Man-in-the-middle attack
• •Null session
• •Pharming
• •Phishing
• •Ransomware
• •Replay attack
• Virus
• •Worm
• •Zombie