Question

In: Computer Science

Think about your computer system's security.   Respond to the following in a minimum of 175 words:...

Think about your computer system's security.  

Respond to the following in a minimum of 175 words:

  • What anti-virus software is installed on your computer? What are its capabilities?
  • How you would prevent data breach? Do you think the installed software is the appropriate software for your machine?
  • If you were to change it, what might you change it to?

Solutions

Expert Solution

Who desires Antivirus Software:

These days, everyone desires the antivirus software system.
Computer viruses don’t simply come back from streaming or downloading movies. many folks assume that they will avoid potential threats by ensuring they don’t visit sure websites or transfer sure files.

The truth is laptop viruses will build their approach onto your laptop or the other device in many ways in which. you'll acquire viruses and malware just by checking your email, browsing the online or from swing a USB memory stick into your laptop computer.

Free vs Paid Antivirus software system:
If you're selecting a brand new antivirus software system and will need to undertake a free version, confine mind that there are pros and cons for each paid and free versions. employing a free antivirus software system will price you additional within the end of the day and most consultants recommend that it’s higher to use a paid version. Free versions will be nice to undertake a brand new software system or set of options, however, can ne'er offer an equivalent level of protection - and your service most definitely won’t embody web security software system.

In my system, I'm installed the malware bytes antivirus software system. this software system works this software system on the market in each free and paid versions. The free version, its works however just some specific places will scan, however coming back to paid version works these software system options are:

Extra options:

There square measure several key options that you just ought to look out for once searching for an antivirus software system, and it'll vary betting on your desires.

Online Protection - If you’re on-line, then you most likely need an online security software system with an intrinsic firewall.

Email Protection - If you’re a significant email user then you’ll not get on the lookout for anti-spam, spyware, and phishing.

Parental Controls - oldsters got to search for a software system with easy-to-use parental controls and restrictions.

Gaming Protection - Gamers will forestall to a "gaming mode," that prompts the web security software system to use fewer resources.

Compatibility - you'll need to examine the compatibility of your chosen software system together with your software package, whether or not that be Windows protection, mack OS antivirus and everything in between.



DATA FORESTALL AND BEACH:
A data breach exposes confidential, sensitive, or protected data to associate degree unauthorized persons. The files in an exceedingly knowledge breach square measure viewed and/or shared while not permission.
The assumption is that a knowledge breach is caused by an outdoor hacker, however, that is not perpetually true. a knowledge breach can even occur within the following ways:

An Accidental Insider: associate degree example would be associate degree worker employing a co-worker's laptop and reading files while not having the right authorization permissions.
A Malicious Insider: This person by design accesses and/or shares knowledge with the intent of inflicting hurt to a private or company.
Lost or taken Devices. associate degree unencrypted and unbolted laptop computer or external Winchester drive something that contains sensitive data goes missing.
Malicious Outside Actors: These square measure hackers UN agency uses numerous attack vectors to collect data from a network or a private.
Common attack strategies utilized by malicious actors embody the following:

Stolen Credentials: The overwhelming majority of information breaches square measure caused by taken or weak credentials. If malicious actors have your username and countersign combination, they need associate degree open door into your network. as a result of the majority apply passwords, cybercriminals will gain entrance to email, websites, bank accounts, and different sources of PII or monetary data.
Compromised assets: Various malware attacks square measure wont to negate regular authentication steps that will usually shield a laptop.
Payment Card Fraud: Card skimmers attach to gas pumps or ATMs and steal knowledge whenever a card is swiped.
Third-party access. though you'll do everything attainable to stay your network and knowledge secure, malicious actors might use third-party vendors to create their approach into your system.
Mobile Devices: When staff square measures allowed to bring their own devices (BYOD) into the work, it is simple for insecure devices to transfer malware-laden apps that provide hackers to knowledge keep on the device. that always includes work email and files additionally because of the owner's PII.
Prevention

A few best practices to avoid a knowledge breach embody the following:

1.Patching and change software system as before long as choices square measure on the market ENCRYPTION for sensitive knowledge
2.Upgrading once software system isn't any longer supported by the manufacturer Enforcing security policies
Enforcing study credentials and multi-factor authentication
3.Educating staff on best security practices and ways in which to avoid socially built attacks
4. Common knowledge suggests all organizations might face associate degree attack at some purpose.

5. The goal is to stay attempts turning into a knowledge breach.

6. Understanding however and why knowledge breaches happen is that the initial line of defense.

Application software system:
Application software system is that the commonest program that runs within the foreground of the pc. they incline to perform helpful tasks that don't seem to be related to laptop maintenance, system boot-up, or hardware communication. The application software system is directly dependent on the program to speak to the physical elements of the pc and can't operate while not it.so, these square measure the items regarding the malware bytes and the other software system however it'll be works and the way to forestall, And coming back to malware bytes these software system is nice performance in gift conditions therefore  this can be enough to my laptop and this can be the nice software system to remove the  trozen(junk ) files and virus .

Thank U :)


Related Solutions

Respond to the following in a minimum of 175 words: Think about some of the capital...
Respond to the following in a minimum of 175 words: Think about some of the capital budgeting techniques you might use for some upcoming projects. Discuss at least 2 capital budgeting techniques and how your company can benefit from the use of these tools.
Respond to the following in a minimum of 175 words: It is important to program your...
Respond to the following in a minimum of 175 words: It is important to program your code efficiently. Efficient code manages errors and exceptions and cleans up memory after it ends. The try-except statements are helpful in handling errors that are detected during execution. What are the two categories of errors when debugging code? How can the try-except statements handle errors in Python? Provide a code example that supports your comments.
respond to the following in a minimum of 175 words: What are your feelings on a...
respond to the following in a minimum of 175 words: What are your feelings on a traditional salary structure (many levels) vs. simplified pay bands? Have your thoughts on salary structure changed after this exercise? What are the advantages and disadvantages of using salary bands?
Respond to the following in a minimum of 175 words: Examine computer-assisted tools and techniques for...
Respond to the following in a minimum of 175 words: Examine computer-assisted tools and techniques for the auditing process to examine effective controls. How do these tools help IT managers maintain systems operations? How do the tools and techniques support the internal and external auditing process?
Respond to the following in a minimum of 175 words: What do you think the role...
Respond to the following in a minimum of 175 words: What do you think the role of collaboration is in assessing organizational culture? How do you think collaboration can assist an organization to align its current organizational culture with one that will facilitate positive change? What do you think the role of collaboration is in initiating change? What are some of the strategies you could use to contribute to effective collaboration when initiating change? Describe a behavior you have expressed...
Respond to the following in a minimum of 175 words: Do you think organizations differ from...
Respond to the following in a minimum of 175 words: Do you think organizations differ from each other when placing importance on areas of the SWOT analysis? Describe a real-world example of an organization that would place more importance on one area of the SWOT analysis compared to another area.
Respond to the following in a minimum of 175 words: What is the purpose of an...
Respond to the following in a minimum of 175 words: What is the purpose of an income statement, and who is the audience for this document? What components do income statements typically contain? Why?
Respond to the following in a minimum of 175 words: What is the purpose of a...
Respond to the following in a minimum of 175 words: What is the purpose of a Comprehensive Annual Financial Report, or CAFR? What standards must a CAFR comply with? What statements comprise a CAFR?
Respond to the following in a minimum of 175 words: In the early weeks of this...
Respond to the following in a minimum of 175 words: In the early weeks of this course, you learned some valuable skills for communicating within and improving the performance of teams you might be working with. This week, we will explore two crucial aspects of being on a team. We will learn about leadership and what it takes to be a good leader. We also examine conflict management and learn some ways to navigate through the inevitability of encountering conflict....
Respond to the following in a minimum of 175 words: The flow of a program is...
Respond to the following in a minimum of 175 words: The flow of a program is controlled by different structures. The three basic control structures in computer programs are sequence structures, decision structures (also called selection structures), and repetition structures (also called iteration structures). Discuss the differences between decision structures and repetition structures used in algorithms. Provide examples of when you might use each.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT