Question

In: Computer Science

Research email virus scanners and compare them to how host-based virus scanners work

Research email virus scanners and compare them to how host-based virus scanners work

Solutions

Expert Solution

As per your question, First I will explain what is the email virus next to the email virus scanners and further, I will compare the email virus scanner to host-based virus scanners in terms of working. So, please bear with me.

Email Virus: The email virus is nothing but malicious code that distributed or sent by the email messages in order to perform malicious activities by penetrating the security mechanisms of your system. These attached malicious codes can be activated by just opening the email or email attachment(s).

Thus, To reduce the risk of this email virus, the cybersecurity experts are introduced to the Email Virus Scanners. So, We can say that every desktop email user should have a trusted reliable antivirus software with extensive dedicated email scanning.

Email Virus Scanner: The Email Virus Scanner is just like a third party software tool which easily integrated into your email software for scanning your email attachments as well as link texts also.

Nowadays, some big market vendors are delivering email software along with their own custom email scanner, for example, Google mail has its own virus scanner.

Now coming to the host-based virus scanner, it is a virus scanner software that detects all of the possibilities of intrusion in a host by scanning all of the running processes as well as services, all stored files in HDD/SSD, and also monitoring the network packets on its network interfaces, a bit similar like the network-based intrusion detection system (NIDS) operates.

In general, the host-based virus scanner uses HIDS. that interacts with the database of the system object for which it is monitoring(in most cases file system objects). The HIDS is also capable to check and validate the appropriate regions of memory are modified or not - for example, the system call table for Unix-based operating system and multiple important vtable structures in Microsoft Windows.

I hope, now you have a brief overview about the Email Virus, Email Virus Scanner, and the host-based virus scanner.

Please don't forget to like it...

Thank You...


Related Solutions

Research the methods attackers are using to bypass virus scanners to get users to run malicious...
Research the methods attackers are using to bypass virus scanners to get users to run malicious code. Theorize some mitigation methods
In innate immune response, a) How is the virus recognized by the host? Explain and name...
In innate immune response, a) How is the virus recognized by the host? Explain and name the cells/receptors involved b) What signaling pathways are triggered? Name and explain the major pathways needed to mount an antiviral response.
how long does the flu virus survive outside of the human host?
how long does the flu virus survive outside of the human host?
Compare and contrast the use of research for academic work and the use of research in...
Compare and contrast the use of research for academic work and the use of research in a marketing plan.
Compare and contrast the use of research for academic work and the use of research in...
Compare and contrast the use of research for academic work and the use of research in a marketing plan and relate it to primary and secondary research.
Discuss the principles of research and evidence-based practice and how to effectively implement them for advanced...
Discuss the principles of research and evidence-based practice and how to effectively implement them for advanced practice nurses.
How does T4 virus release or exit from the bacterial host cells and which step of...
How does T4 virus release or exit from the bacterial host cells and which step of viral replication is not required for this virus
   Briefly describe how to present bad news positively in an email in a corpoate work...
   Briefly describe how to present bad news positively in an email in a corpoate work setting? Briefly describe the guidelines and considerations for apologies in a refused request for a work setting?
Describe the steps of the evidence-based research process and the importance of using them. In the...
Describe the steps of the evidence-based research process and the importance of using them. In the initial stages of an EBP project, where do nurses in your specialty go to locate sources of information that help them to determine whether or not a practice problem is appropriate for an evidence-based practice change proposal. Include two specific sources on information in your discussion.
Describe the steps of the evidence-based research process and the importance of using them. In the...
Describe the steps of the evidence-based research process and the importance of using them. In the initial stages of an EBP project, where do nurses in your specialty go to locate sources of information that help them to determine whether or not a practice problem is appropriate for an evidence-based practice change proposal. Include two specific sources on information in your discussion.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT