Page 1228 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1228

to send them is that they continue to fool some users.



                  Education, Policy, and Tools



                  Malicious software is a constant challenge within any organization
                  using IT resources. Consider Kim, who forwarded a seemingly
                  harmless interoffice joke through email to Larry’s account. Larry
                  opened the document, which actually contained active code
                  segments that performed harmful actions on his system. Larry

                  then reported a host of “performance issues” and “stability
                  problems” with his workstation, which he’d never complained
                  about before.

                  In this scenario, Kim and Larry don’t recognize the harm caused by
                  their apparently innocuous activities. After all, sharing anecdotes
                  and jokes through company email is a common way to bond and
                  socialize. What’s the harm in that, right? The real question is how

                  can you educate Kim, Larry, and all your other users to be more
                  discreet and discerning in handling shared documents and
                  executables?

                  The key is a combination of education, policy, and tools. Education
                  should inform Kim that forwarding nonwork materials on the
                  company network is counter to policy and good behavior. Likewise,
                  Larry should learn that opening attachments unrelated to specific

                  work tasks can lead to all kinds of problems (including those he fell
                  prey to here). Policies should clearly identify acceptable use of IT
                  resources and the dangers of circulating unauthorized materials.
                  Tools such as anti-malware software should be employed to
                  prevent and detect any type of malware within the environment.




               Whitelisting and Blacklisting

               Whitelisting and blacklisting applications can be an effective
               preventive measure that blocks users from running unauthorized
               applications. They can also help prevent malware infections.

               Whitelisting identifies a list of applications authorized to run on a
               system, and blacklisting identifies a list of applications that are not
   1223   1224   1225   1226   1227   1228   1229   1230   1231   1232   1233