SlideShare a Scribd company logo
Project Part 3: Malware Protection Procedure Guide
Scenario
Always Fresh allows external users, such as vendors and
business partners, to access the Always Fresh Windows
environment. You have noticed a marked increase in malware
activity in the test environment that seems to originate from
external users. After researching the likely source of new
malware, you conclude that allowing external users to connect
to your environment using compromised computers exposes
Always Fresh to malware vulnerabilities.
After consulting with your manager, you are asked to create a
policy that will ensure all external computers that connect to
Always Fresh environment are malware free. You create the
following policy:
“To protect the Always Fresh computing environment from the
introduction of malware of any type from external sources, all
external computers and devices must demonstrate that they are
malware free prior to establishing a connection to any Always
Fresh resource.”
Consider the following questions:
1. What does “malware free” mean?
2. How can a user demonstrate that their computer or device is
malware free?
3. What are the steps necessary to establish a malware-free
computer or device?
4. How should Always Fresh verify that a client computer or
device is compliant?
Tasks
Create a malware protection procedure guide that includes steps
for installing and running anti-malware software. Fill in the
following details to develop your procedure guide:
1. Provide a list of approved anti-malware software solutions—
include at least three leading antivirus and two anti-spyware
products. You may include Microsoft products and third-party
products. Instruct users to select one antivirus and one anti-
spyware product and install them on their computer.
2. Describe the process of:
a. Ensuring anti-malware software and data is up to date.
Mandate daily updates.
b. Running regular malware scans. Mandate that automatic
scans occur whenever the computer is idle. If that setting is
unavailable, mandate daily fast scans and biweekly complete
scans.
3. Provide steps to follow any time malware is detected.
a. Immediate reaction—what to do with current work, leave the
computer on or turn it off
b. Who to contact
c. What information to collect
The procedure guide may be used by company security
professionals in the future. Hence, all steps listed should be
clear and self-explanatory.
Required Resources
· Internet access
· Course textbook
Submission Requirements
· Format: Microsoft Word (or compatible)
· Font: Arial, size 12, double-space
· Citation Style: Follow your school’s preferred style guide
· Length: 2 to 4 pages
Self-Assessment Checklist
· I created a procedure guide that provides clear instructions
that anyone with a basic technical knowledge base can follow.
· I created a well-developed and formatted procedure guide with
proper grammar, spelling, and punctuation.
· I followed the submission guidelines.
Project 1 – CSE 4344
Building a Simple Web Client and a Multithreaded Web Server
Objectives
· To understand client-server communication via sockets.
· To gain exposure to the basic operations of a Web server and
client.
· To explore basic structures of HTTP messages.
Due: March 14, 2020 11:59pm
Project Description
In this project, you will be developing a multithreaded Web
server and a simple web client. The Web server and Web client
communicate using a text-based protocol called HTTP
(Hypertext Transfer Protocol).
Requirements for the Web server
· The server is able to handle multiple requests concurrently.
This means the implementation is multithreaded. In the main
thread, the server listens to a specified port, e.g., 8080. Upon
receiving an HTTP request, the server sets up a TCP connection
to the requesting client and serves the request in a separate
thread. After sending the response back to the client, it closes
the connection.
· The server is assumed to work with HTTP GET messages. If
the requested file exists, the server responds with “HTTP/1.1
200 OK” together with the requested page to the client,
otherwise it sends a corresponding error message, e.g.,
“HTTP/1.1 404 Not Found” or “HTTP/1.1 400 Bad Request”.
· If running the server program using command line, the syntax
should be:
server_code_name [<port_number>]
where the optional <port_number> is the port on which the
server is listening to connections from clients. If the port
number is not entered, the default port 8080 is used.
· You can test your Web server implementation on your local
machine using a Web browser, e.g., Internet Explorer, Firefox,
or Chrome. You need to specify the used port number within the
URL, for example,
http://localhost:8080/index.htm
If omitting the port number portion, i.e., 8080, the browser will
use the default port 80.
· The server should response with a default page when users do
not enter a specific page in the URL, for example,
http://localhost:8080/
It should also work when the request includes a path to the
requested file, for example,
http://localhost:8080/path/to/file/example.htm
· You should display/log the request and header lines of request
messages on the server for the purpose of debugging.
Requirements for the simple Web client
· The client is able to connect to the server via a socket and to
request a page on the server.
· Upon receipt of the response message from the server, the
client extracts and displays/logs the message status, and then
retrieves the page content from the message body.
· If running the client program using command line, the syntax
should be:
client_code_name <server_IPaddress/name> [<port_number>]
[<requested_file_name>]
where the <server_IPaddress/name> is the IP address or name of
the Web server, e.g., 127.0.0.1 or localhost for the server
running on the local machine. The optional <port_number> is
the port on which the server is listening to connections from
clients. If the port number is not entered, the default port 8080
is used. The optional <requested_file_name> is the name of the
requested file, which may include the path to the file. If the file
name is not entered, the default file “index.htm” is used.
Notes:
· This is an individual project.
· You can use the programming language of your choice. (You
may get more help with Java or Python.)
· You may use the skeleton code for the server provided in the
textbook’s companion website for reference. You may also want
to refer to the textbook, chapter 2, section 2.2.3, for more
details on HTTP message format and section 2.7, for socket
programming.
· The source codes should be well documented to make it easier
for the TA to follow.
Submission Guidelines
· Submit a single zipped file with the naming convention
<your_UTA_id>_<your_name>.zip which consists of:
· Source codes of the Web server and client,
· Any additional files required to run your codes,
· A readme file with instructions on how to compile and run
your codes. You must mention the IDE as well as any packages
that are required to run the codes.
· Do NOT include any runnable executable (binary) program.
· Make sure your name and your UTA ID are also listed in the
readme file and in comments at the beginning of your source
files.
· Upload the zipped file via Canvas. Please strictly follow the
naming convention of the zipped file and the subject title.
· Late submission will be accepted with a 10-point deduction
for each extra day.
Additional Requirements/Instructions
· Complete documentation and instructions for running the
codes are recommended, otherwise you may be asked to come
give the TA a demo if he is not able to run your programs from
the instructions provided.
· If you are using any code from some external source or book,
you MUST mention it explicitly in the codes as well as the
readme file. Otherwise, it will be considered plagiarism and
your project will not be evaluated.
· You can discuss with other classmates on steps/algorithms to
implement the project. However, the source codes must be
written yourself.
Grading (100 points)
· The server works correctly with requests from a Web browser
(20 points)
· The server can serve multiple requests at the same time
(multithreaded implementation) (20 points)
· The client sends/receives messages to/from the server
correctly (20 points)
· The client extracts the status and content of messages from the
server correctly (20 points)
· Display/log of proper messages on the server (5 points)
· Display/log of proper messages on the client (5 points)
· Code documentation (5 points)
· Readme file (5 points)
· Late submission: 10-point deduction for each extra day.

More Related Content

DOCX
MCIS 6163 Assignment 1MCIS 6163 Assignment 1.pdfAssignmen.docx
DOCX
MCIS 6163 Assignment 1MCIS 6163 Assignment 1.pdfAssignmen
DOC
Computer networking mcis 6163 project
PDF
Programming Assignment 3 CSCE 3530 Introduction to Comput.pdf
PDF
Chat application throught client server project report.pdf
DOCX
Instructions compile the c programs in one of the cse (cse01 – cs
PPTX
Network Programming-Python-13-8-2023.pptx
PDF
CHAT APPLICATION THROUGH CLIENT SERVER MANAGEMENT SYSTEM PROJECT REPORT
MCIS 6163 Assignment 1MCIS 6163 Assignment 1.pdfAssignmen.docx
MCIS 6163 Assignment 1MCIS 6163 Assignment 1.pdfAssignmen
Computer networking mcis 6163 project
Programming Assignment 3 CSCE 3530 Introduction to Comput.pdf
Chat application throught client server project report.pdf
Instructions compile the c programs in one of the cse (cse01 – cs
Network Programming-Python-13-8-2023.pptx
CHAT APPLICATION THROUGH CLIENT SERVER MANAGEMENT SYSTEM PROJECT REPORT

Similar to Project Part 3 Malware Protection Procedure GuideScenarioAl.docx (20)

PDF
Python - User Account System with Token Based Authentication and Encrypted Ne...
DOC
Csce 5580 001_s17_pa2
PDF
Chat application through client server management system project.pdf
PDF
D200011_2024_Dec13 (2).pdf aaaaaaaaaaaaa
PDF
Write in Python please Web Server Python Assignment You will dev.pdf
PPTX
PDF
Web Server Python Assignment You will develop a web server that ha.pdf
PPTX
TCP file upload server client example
PPTX
computernetworkingmodule4vtu5thsemppt.pptx
PPT
Ds
DOCX
Unix commands
DOCX
Application programming interface sockets
PDF
Web server
PDF
Configuring the Apache Web Server
PPSX
Web server
PDF
Application layer jain
PDF
Internet Programming With Python Presentation
PDF
Networking lab
PPT
Web Servers (ppt)
PPT
Webbasics
Python - User Account System with Token Based Authentication and Encrypted Ne...
Csce 5580 001_s17_pa2
Chat application through client server management system project.pdf
D200011_2024_Dec13 (2).pdf aaaaaaaaaaaaa
Write in Python please Web Server Python Assignment You will dev.pdf
Web Server Python Assignment You will develop a web server that ha.pdf
TCP file upload server client example
computernetworkingmodule4vtu5thsemppt.pptx
Ds
Unix commands
Application programming interface sockets
Web server
Configuring the Apache Web Server
Web server
Application layer jain
Internet Programming With Python Presentation
Networking lab
Web Servers (ppt)
Webbasics
Ad

More from woodruffeloisa (20)

DOCX
Your employer is pleased with your desire to further your educatio.docx
DOCX
Your finished project, including both elements of the paper, should .docx
DOCX
Your first task is to find a public budget to analyze. It is suggest.docx
DOCX
Your essay should explain the trip from your personal point of view,.docx
DOCX
Your dilemma is that you have to make a painful medical decision and.docx
DOCX
your definition of moral reasoning. Then, compare two similarities.docx
DOCX
Your company is in the process of updating its networks. In preparat.docx
DOCX
Your company has just announced that a new formal performance evalua.docx
DOCX
Your CLC team should submit the followingA completed priority.docx
DOCX
Your classroom will be made up of diverse children. Research what va.docx
DOCX
Your business plan must include the following1.Introduction o.docx
DOCX
Your assignment is to write a formal response to this work. By caref.docx
DOCX
Your assignment is to write about the ethical theory HedonismYour.docx
DOCX
Your assignment is to write a short position paper (1 to 2 pages dou.docx
DOCX
Your assignment is to report on a cultural experience visit you .docx
DOCX
Your assignment is to create a Visual Timeline” of 12 to 15 images..docx
DOCX
Your annotated bibliography will list a minimum of six items. .docx
DOCX
Your business plan must include the following1.Introduction of .docx
DOCX
you wrote an analysis on a piece of literature. In this task, you wi.docx
DOCX
You work for a small community hospital that has recently updated it.docx
Your employer is pleased with your desire to further your educatio.docx
Your finished project, including both elements of the paper, should .docx
Your first task is to find a public budget to analyze. It is suggest.docx
Your essay should explain the trip from your personal point of view,.docx
Your dilemma is that you have to make a painful medical decision and.docx
your definition of moral reasoning. Then, compare two similarities.docx
Your company is in the process of updating its networks. In preparat.docx
Your company has just announced that a new formal performance evalua.docx
Your CLC team should submit the followingA completed priority.docx
Your classroom will be made up of diverse children. Research what va.docx
Your business plan must include the following1.Introduction o.docx
Your assignment is to write a formal response to this work. By caref.docx
Your assignment is to write about the ethical theory HedonismYour.docx
Your assignment is to write a short position paper (1 to 2 pages dou.docx
Your assignment is to report on a cultural experience visit you .docx
Your assignment is to create a Visual Timeline” of 12 to 15 images..docx
Your annotated bibliography will list a minimum of six items. .docx
Your business plan must include the following1.Introduction of .docx
you wrote an analysis on a piece of literature. In this task, you wi.docx
You work for a small community hospital that has recently updated it.docx
Ad

Recently uploaded (20)

PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
GDM (1) (1).pptx small presentation for students
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Pre independence Education in Inndia.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Basic Mud Logging Guide for educational purpose
PDF
Sports Quiz easy sports quiz sports quiz
PDF
01-Introduction-to-Information-Management.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Abdominal Access Techniques with Prof. Dr. R K Mishra
Module 4: Burden of Disease Tutorial Slides S2 2025
GDM (1) (1).pptx small presentation for students
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Pre independence Education in Inndia.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
human mycosis Human fungal infections are called human mycosis..pptx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Renaissance Architecture: A Journey from Faith to Humanism
VCE English Exam - Section C Student Revision Booklet
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Basic Mud Logging Guide for educational purpose
Sports Quiz easy sports quiz sports quiz
01-Introduction-to-Information-Management.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf

Project Part 3 Malware Protection Procedure GuideScenarioAl.docx

  • 1. Project Part 3: Malware Protection Procedure Guide Scenario Always Fresh allows external users, such as vendors and business partners, to access the Always Fresh Windows environment. You have noticed a marked increase in malware activity in the test environment that seems to originate from external users. After researching the likely source of new malware, you conclude that allowing external users to connect to your environment using compromised computers exposes Always Fresh to malware vulnerabilities. After consulting with your manager, you are asked to create a policy that will ensure all external computers that connect to Always Fresh environment are malware free. You create the following policy: “To protect the Always Fresh computing environment from the introduction of malware of any type from external sources, all external computers and devices must demonstrate that they are malware free prior to establishing a connection to any Always Fresh resource.” Consider the following questions: 1. What does “malware free” mean? 2. How can a user demonstrate that their computer or device is malware free? 3. What are the steps necessary to establish a malware-free computer or device? 4. How should Always Fresh verify that a client computer or device is compliant? Tasks
  • 2. Create a malware protection procedure guide that includes steps for installing and running anti-malware software. Fill in the following details to develop your procedure guide: 1. Provide a list of approved anti-malware software solutions— include at least three leading antivirus and two anti-spyware products. You may include Microsoft products and third-party products. Instruct users to select one antivirus and one anti- spyware product and install them on their computer. 2. Describe the process of: a. Ensuring anti-malware software and data is up to date. Mandate daily updates. b. Running regular malware scans. Mandate that automatic scans occur whenever the computer is idle. If that setting is unavailable, mandate daily fast scans and biweekly complete scans. 3. Provide steps to follow any time malware is detected. a. Immediate reaction—what to do with current work, leave the computer on or turn it off b. Who to contact c. What information to collect The procedure guide may be used by company security professionals in the future. Hence, all steps listed should be clear and self-explanatory. Required Resources · Internet access · Course textbook Submission Requirements · Format: Microsoft Word (or compatible) · Font: Arial, size 12, double-space
  • 3. · Citation Style: Follow your school’s preferred style guide · Length: 2 to 4 pages Self-Assessment Checklist · I created a procedure guide that provides clear instructions that anyone with a basic technical knowledge base can follow. · I created a well-developed and formatted procedure guide with proper grammar, spelling, and punctuation. · I followed the submission guidelines. Project 1 – CSE 4344 Building a Simple Web Client and a Multithreaded Web Server Objectives · To understand client-server communication via sockets. · To gain exposure to the basic operations of a Web server and client. · To explore basic structures of HTTP messages. Due: March 14, 2020 11:59pm Project Description In this project, you will be developing a multithreaded Web server and a simple web client. The Web server and Web client communicate using a text-based protocol called HTTP (Hypertext Transfer Protocol). Requirements for the Web server · The server is able to handle multiple requests concurrently. This means the implementation is multithreaded. In the main thread, the server listens to a specified port, e.g., 8080. Upon receiving an HTTP request, the server sets up a TCP connection to the requesting client and serves the request in a separate thread. After sending the response back to the client, it closes the connection. · The server is assumed to work with HTTP GET messages. If the requested file exists, the server responds with “HTTP/1.1
  • 4. 200 OK” together with the requested page to the client, otherwise it sends a corresponding error message, e.g., “HTTP/1.1 404 Not Found” or “HTTP/1.1 400 Bad Request”. · If running the server program using command line, the syntax should be: server_code_name [<port_number>] where the optional <port_number> is the port on which the server is listening to connections from clients. If the port number is not entered, the default port 8080 is used. · You can test your Web server implementation on your local machine using a Web browser, e.g., Internet Explorer, Firefox, or Chrome. You need to specify the used port number within the URL, for example, http://localhost:8080/index.htm If omitting the port number portion, i.e., 8080, the browser will use the default port 80. · The server should response with a default page when users do not enter a specific page in the URL, for example, http://localhost:8080/ It should also work when the request includes a path to the requested file, for example, http://localhost:8080/path/to/file/example.htm · You should display/log the request and header lines of request messages on the server for the purpose of debugging. Requirements for the simple Web client · The client is able to connect to the server via a socket and to request a page on the server. · Upon receipt of the response message from the server, the client extracts and displays/logs the message status, and then retrieves the page content from the message body. · If running the client program using command line, the syntax should be: client_code_name <server_IPaddress/name> [<port_number>] [<requested_file_name>] where the <server_IPaddress/name> is the IP address or name of the Web server, e.g., 127.0.0.1 or localhost for the server
  • 5. running on the local machine. The optional <port_number> is the port on which the server is listening to connections from clients. If the port number is not entered, the default port 8080 is used. The optional <requested_file_name> is the name of the requested file, which may include the path to the file. If the file name is not entered, the default file “index.htm” is used. Notes: · This is an individual project. · You can use the programming language of your choice. (You may get more help with Java or Python.) · You may use the skeleton code for the server provided in the textbook’s companion website for reference. You may also want to refer to the textbook, chapter 2, section 2.2.3, for more details on HTTP message format and section 2.7, for socket programming. · The source codes should be well documented to make it easier for the TA to follow. Submission Guidelines · Submit a single zipped file with the naming convention <your_UTA_id>_<your_name>.zip which consists of: · Source codes of the Web server and client, · Any additional files required to run your codes, · A readme file with instructions on how to compile and run your codes. You must mention the IDE as well as any packages that are required to run the codes. · Do NOT include any runnable executable (binary) program. · Make sure your name and your UTA ID are also listed in the readme file and in comments at the beginning of your source files. · Upload the zipped file via Canvas. Please strictly follow the naming convention of the zipped file and the subject title. · Late submission will be accepted with a 10-point deduction for each extra day. Additional Requirements/Instructions · Complete documentation and instructions for running the codes are recommended, otherwise you may be asked to come
  • 6. give the TA a demo if he is not able to run your programs from the instructions provided. · If you are using any code from some external source or book, you MUST mention it explicitly in the codes as well as the readme file. Otherwise, it will be considered plagiarism and your project will not be evaluated. · You can discuss with other classmates on steps/algorithms to implement the project. However, the source codes must be written yourself. Grading (100 points) · The server works correctly with requests from a Web browser (20 points) · The server can serve multiple requests at the same time (multithreaded implementation) (20 points) · The client sends/receives messages to/from the server correctly (20 points) · The client extracts the status and content of messages from the server correctly (20 points) · Display/log of proper messages on the server (5 points) · Display/log of proper messages on the client (5 points) · Code documentation (5 points) · Readme file (5 points) · Late submission: 10-point deduction for each extra day.