Research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses and other related forms of intentionally created deviant code.
Scenario: You are a Security professional hired by NextGard Technologies in Phoenix, AZ to provide a Windows security implementation model for their organization. NextGard specializes in network consulting services for US companies and they want to upgrade and secure their current network. NextGard has 250,000 employees in 5 countries. The Phoenix office operates as the … Read more