These are the main dangers that threaten users and networks. What happens when they succeed? An effective counterattack plan consists of six steps:
1. Preparation : Develop specialized policies and procedures for harmful software. Control the training and guidance of harmful software orientation to check policies and procedures. Determine whether the procedures work before actually using them.
2. Detection and analysis : Deploy, monitor anti-virus / spyware software. Read harmful software guidelines and warnings provided by antivirus / spyware vendors. Create mobile toolkits that contain updated tools to identify harmful software, test running processes and perform many other analytical activities.
3. Prevent : Ready to shut down the server / workstation or block services (such as e-mail, web browser or Internet access) to prevent the spread of harmful software. Choose who has the right to make a decision to solve the problem based on the activity of harmful software. Early prevention can stop the spread of harmful software and prevent damage to both internal and external networks.
4. Elimination : Ready to use various eradication techniques to remove harmful software from infected systems.
5. Restore : Restoring confidentiality, integrity and availability of data on infected systems and changing containment policies if necessary. This includes reconnecting systems / networks and rebuilding the system that was attacked from previous system backups. The counter-attack plan needs to assess the risks of restoring network services and rely on this assessment to make management decisions about the recovery of services.
6. Report : Collect the experience gained after each attack to prevent similar events in the future. Record changes in security policies, software configuration, and the addition of harmful controls / detection.
End
All methods have only a preventive effect, the most important thing is the user awareness and knowledge. Train users how to identify poisoning and teach users steps to avoid spreading the system.