Describe the best practice to employ to mitigate malware effects on a machine
Before knowing what to do to mitigate malware effects on a machine, both the users and the network administrators should have a clear understanding of what malware means. Malware is a shorter version for maXXXXXXX XXXXXXXX and it XXXXXXXXX a XXXXXXX or XXXX, designed XX harm the machine by lowering its performance, XXXXXXX XXX tasks, collect sensible XXXX XXXXXXX authorization or XXXX credibility for social XXXXXXXXXXX purposes (XXXXX, XXXXXX Salleh, Firdaus, 2016). Malware XXXXXXXXXXXX XXXXXXX XXX network or XXXXXXXXX system vulnerabilities of the XXXXXXXX machine. While doing that, XXXX XXXXXXX XXXXXXXXXXXX try XX XXXXXXXXX XX other XXXXXXXX, mostly with XXX help XX XXX internet. To XXXXXXX the XXXXXX XXXXXXXXX above, the XXXXXXX administrators or other XXXXXXXX security XXXXXXXXXXX found different XXXX XX mitigate malware XXXXXXX XX the machines. Most ways XXXXXX the same XXXXXXX: Searching XXX malware XXXXXXXXXXXX, XXXXXXXXX them, XXXXXXXXX or XXXXXXXX the XXXXXXXX malware, restoring XXX machine to XXX initial XXXXXXXXXXX XXX take proactive XXXXXXXX XXXXXXXX. The XXXXX XXXX XX XX XXXXXX for XXX XXXXXXX installed XX a machine. This XXX be done in two XXX;, XX XXXXXXXXXX XXX XX XXXXXXXXX with a XXXXXXXX XXXXXXXXXXX application. XXX monitoring XXXXXXX XXXXXXXX of analyzing the applications XXX the XXXX XXXXXXX on the machine XXX on the (XXXXX) network it XX part XX and XXXXXXXX each suspect XXXXXXX XXXX or XXXXXXX (XXXXX, et al, XXXX). This method XXXXX XXX XXXX for detecting unknown malware codes XXX it can be time-XXXXXXXXX. The XXXXXX XXXXXX XX to XXXXXX XXXXXXX XXXX XXXXXXXX malware software solutions. This can XX XXXX XX XXXXXXXXXX specialized antivirus software XXXX XXXX analyze XXX programs XXXXXXX installed on XXX machine XXX compare their code XXXX XXX known malware codes stored in a database. This is a XXXXXX method but it will XXXX XXXXXX the XXXXXXX known malware applications (Razak, et al. XXXX).XXXXX detecting XXX malware XXXXXXXXXXXX, the XXXXXXXX specialists will XXXXXXX the XXXX of malware XXX XXX XXXX they already did and the harm XXXX XXX XXXXXXX of in XXX XXXXXX XX XXX XXXXXXX. XXX third step is to XXXXXX the malware applications or XXXXX XXX affected XXXXXXXX that XXXXXX be removed. This procedure XXX XX done manually or with specialized XXXXXXXX. XXX next XXXX is XX restore XXX machine to its XXXXXXX performance. XXXXXXXXXXX can do that XX reinstalling the XXXXXXXX affected programs, XXXXXXX a XXXXX operating XXXXXX XXXXXXXXXXXX, restore XXX XXXXXXX XX a previous point XX XXXXX a XXXX-XX XXX XXXXXXX feature or XXXXXXXX XXXXXXXXXXX XXX machine. The XXXX and the XXXX important XXXX XXX mitigating malware effects XX a machine are XX XXXXXXX XXX machine XXX XXXXXXX security measures. XXXXX XXX many ways to do XXXX XXXXXXX the XXXXXXX XXX popular XXXX like installing XXXX-XXXXXXX XXXXXXXX. XXXXXXXX XXXXXXXXX a short XXXX with XXXXX ways. The XXXXX XXXXXX is XX XXXXXX the attack surface. XXXX means XXXX XXXXXXXXXX XXXXXXXX or very important XXXX XXX have security XXXXXXXX XXXX XXXX XXXXX XXX number of XXXXXXXXXXXX that XXX run or XXX number XXX type XX XXXXXXX it XXX XXXXXXX XX (XXXXXXXX). The XXXXXX XXXXXXX is to XXXX XXX AutoRun. No XXXXXXX XXXXXX XXX an XXXXXXXXXXX without user XXXXXXXX. XX the same time, XXXXXXX specialists can deactivate the Peer XX XXXX XXXXXXXX. XXXXXXXXX, employees should XXX XX able XX XXXXXXXX XXXXXX their work XXXXXXXX from XXXXX XXXX machines. At XXXX but not XXXXX, every network XXXXXX have a XXXX-XXXXXXXXXX XXXXXXXX. XXX type XXX complexity XX XXX measures XXXXXX a XXX XX the skill XXX creativity XX the XXXXXXXXXX and the type XX threats XXX machines are XXXXXXX XX.
References
XXXXXXXX, Security XXXX Practices, XXXXXXXXX XXXX symantec.XXX/XXXX.XXX?id=XXXXXXXXXXXXXXXX
XXXXX, M. F. A., XXXXX, N. X., XXXXXX, X., &XXX; XXXXXXX, A. (XXXX). XXX rise XX “XXXXXXX”: Bibliometric analysis XX XXXXXXX XXXXX. Journal XX XXXXXXX and XXXXXXXX XXXXXXXXXXXX, XX, 58-76. doi:XX.1016/j.XXXX.XXXX.08.XXX
">