Assignment:
1. DISCUSSION QUESTION
Post an article review (minimum of 200 words) related to system hardening or malicious software.
2. Case study
Prepare a two page paper on the following:
What is the best practice to employ to mitigate malware effects on a machine?
You may use the internet for more information. Please double space your papers and cite your sources.
3. Key terms
Select ten key terms from chapter and ten key terms from chapter and type the definitions of each. Upload into Canvas.
Chapter:
• Antispam
• •Antivirus (AV)
• •Application hardening
• •Application vulnerability scanner
• Operating system (OS)
• Heuristic scanning
• •Host vulnerability scanner
• •Hotfix
• •Network operating system (NOS)
• Pop-up blocker
Chapter:
• Malware
• •Man-in-the-middle attack
• •Null session
• •Pharming
• •Phishing
• •Ransomware
• •Replay attack
• Virus
• •Worm
• •Zombie