Malicious Mobile Code Defense Plan
This part of the chapter will discuss how to create a
Malicious Mobile Code Defense Plan
and the steps
and processes that it should contain. This plan should be part of the
organization’s larger Computer Security Defense
Plan
, along with Acceptable
Use
and Physical
Security
policies and procedures.
How to Create a Malicious Mobile Code Defense Plan
Here are the steps to create a malicious mobile code defense plan.
Get management to buy in
Whatever the outcome of the malicious mobile code defense plan, it will take time, money, and people to implement it. Make sure you have management buy in before you head down this road. Nothing hurts worse than building a good plan, but being denied the money and resources to make it happen. Some important justifications for a good defense plan are
Overall decreased costs
Protects company credibility
Increases end users’ computer confidence
Increases customer confidence in IT staff
Decreases risk of data corruption
Decreases risk of stolen information
You need a management champion to help things go smoothly. A good way to get that is to quantify the potential losses in relation to the estimated costs of a good approach to defense.
Pick a plan team
Pick the people you will need to create and implement a defense plan. You will need someone on the team to spearhead the whole effort operationally. Include folks from the help desk, people who assist with laptop and remote connectivity issues, programmers, network technicians, ...
Get Malicious Mobile Code now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.