Question

In: Computer Science

Imagine the following scenario at a company where you are the computer specialist: Your company recently...

Imagine the following scenario at a company where you are the computer specialist: Your company recently installed high-speed Internet access at the office where you work. There are 50 workstations connected to the network and the Internet. Within a week, half the computers in the office were down because of a virus that was contracted by a screen saver. In addition, network personnel from a university in England contacted the company, claiming that your computer systems were being used as a part of a DDoS attack on their Web site. By the time the damage was repaired, your company had lost about 500 work hours when employees could not use their computers. The company also lost approximately $10,000 in potential revenue by not being able to respond to purchase requests, and narrowly averted a lawsuit from the university. Take steps to prevent this from happening again: • Research the price of at least three antivirus and firewall packages on the Internet and determine the most cost-effective package for the company to implement on 50 workstations. • Draft a memo to the CEO with your recommendations. Include the following in your memo: o A list of the antivirus and firewall packages you researched. You should research and list at least three different antivirus and firewall packages. o The antivirus and firewall package you recommend and your reasons for recommending it over the other two packages. o An explanation of how the antivirus and firewall products that you recommend would prevent future problems with viruses and with DDoS attacks from your computers on web sites belonging to other organizations. o If you need help with creating a memo, please click How to Create a Memo to download the instructions. • Compile a list strategies for avoiding virus infections and incorporate this list into a document to be sent to all employees. • Use the Networks and Security thread in the Experts Exchange class forum if you need some help, or if you are knowledgeable about computer security and can help others identify antivirus and firewall software.

Solutions

Expert Solution

Answer:

Here, the following description are given as

The list of products listed below that gives major features.

1. McAfee: This Company provides solutions for most of the features listed above. They have many products to support the same. One such product is McAfee Total Protection.
  
They charge $90 per year per computer. It will Blocks viruses, malware, ransomware, spyware, unwanted programs, and more on your PC. Warns you about risky websites and helps prevent dangerous downloads and phishing attacks.
  
Recognizes your face or fingerprint, secures your passwords, and instantly logs you in to your websites and apps across your device. Helps keep your personal files private by storing them on your PC with a combination of password protection and encryption.
  

A unique feature is - Virus Protection Pledge provides you with the confidence that in the event
your PC gets a virus, a McAfee expert will remotely access your computer to remove it. If not, they will offer a refund.
  
2. Avast Email Server Security: This product is charged $250 for one server for one year. This software provides High-performance mailbox server protection which integrates perfectly with most popular operating systems, such as Windows Exchange 2003, 2007, 2010 and 2013 Server.

Antispam for Microsoft Exchange servers 2007/2010/2013 with the latest Service Pack keeps the mailbox free of SPAM and phishing scams.
  
   Scanning engine protects against viruses, spyware, and other malicious agents, based on machine learning.
  
3. Malbytes Antimalware: This provides Anti-malware, Anti-ransomware, Anti-exploit and Malicious website protection. Detects and removes malware in real-time with advanced anti-malware, anti-spyware, and anti-rootkit technology.

It scans for the newest and most dangerous threats automatically, so it will protect with full supportive.

It will stop the unknown and known ransomware with proprietary next-gen technology that works proactively to shield your files. It may charge $45 year for per computer.


Related Solutions

1. Imagine a scenario where you are planning to open your ‘mom and pop’ café near...
1. Imagine a scenario where you are planning to open your ‘mom and pop’ café near Kean University union campus for the very first time. What are the five promotional elements you would use to design an integrated marketing communications program for your café? How would you design each element of the promotional mix? Discuss with the help of examples. 2. How does government regulations assure occupational safety and health? How does the law limit of employers’ duty in order...
imagine a scenario where you are the owner of a medium sized business(150 employees) where the...
imagine a scenario where you are the owner of a medium sized business(150 employees) where the employees have expressed their displeasure regarding working conditions, long hours, retirement benefits, wages, and poor management. Identify at least 5 strategies you could implement to address the concerns of your employees and describe how these strategies would be implemented and by whom.
Imagine the following scenario where you need to decide which MUTUALLY-EXCLUSIVE project to pursue: You are...
Imagine the following scenario where you need to decide which MUTUALLY-EXCLUSIVE project to pursue: You are given $50,000 to invest in one of the following two projects (you CANNOT invest in both). 200-500 words Project A: A highly respectable local entrepreneur reaches out to you for a short-term loan of $10,000 guaranteeing a return of $16,000 in 15 days ($6,000 of profit). The situation is unusual as her customers lost their financing source and will need about 2 weeks to...
Scenario: Imagine you are in a strange country where people talk to you, but you do...
Scenario: Imagine you are in a strange country where people talk to you, but you do not understand what they are saying. They use strange tools to eat, and you cannot figure out how to use them. They try to feed you food you do not recognize. Sometimes these people seem friendly and caring, but at other times they become angry because you are not doing what they ask you to do. When they try to remove your clothes and...
Imagine that you have recently finished your MBA and have a company that has entered the...
Imagine that you have recently finished your MBA and have a company that has entered the arena of Project Management. During your interview, you are told that project management is not something that the company has always done. In fact, the company began as a retail software design company. As the company grew from small to medium-sized, it became apparent that they needed to employ Project Managers to help their clients rollout the use of their software and not leave...
Imagine a scenario where the operations of a copper mining company, NOCOP, creates negative externalities on...
Imagine a scenario where the operations of a copper mining company, NOCOP, creates negative externalities on the neighbouring farming community. NOCOP dumps the waste associated with its exploration activities and the processing of the ores on the lands surrounding the pits it operates. Land contamination by the mining waste leads to reduced crop output in the farming community, among other adverse impacts. Faced with this situation, the government employs an economist who proposes a Coasian bargaining to take place between...
Imagine the following scenario: You are taking the evidence-based practice course and one of your classmates...
Imagine the following scenario: You are taking the evidence-based practice course and one of your classmates shares an EBP project draft with you. You notice that some of the research has not been cited correctly or even at all. When you approach your classmate, the response is that "no one will notice and it is not a big deal anyway." What are your next steps in speaking with your classmate? Consider how this could reflect on the credibility and integrity...
Imagine a scenario where you decide to start a firm in a specific industry. Please detail...
Imagine a scenario where you decide to start a firm in a specific industry. Please detail how your firm will evolve from creation towards the long run. Do so in the context of the 4 time frames we learned about in this class. You can use hypothetical numbers to illustrate any points you wish. Also, it would help to be specific about the type of industry you are in and think about the evolution of your firm within that specific...
For this submission, you will write a response to the following scenario: Imagine that you have...
For this submission, you will write a response to the following scenario: Imagine that you have completed an internship in the finance division of a technology corporation. Your boss, the financial manager, is considering hiring you for a full-time job. He first wants to evaluate your financial knowledge and has provided you with a short examination. When composing your answers to this employment examination, ensure that they are cohesive and read like a short essay.  Analyze the roles and...
For this submission, you will write a response to the following scenario: Imagine that you have...
For this submission, you will write a response to the following scenario: Imagine that you have completed an internship in the finance division of a technology corporation. Your boss, the financial manager, is considering hiring you for a full-time job. He first wants to evaluate your financial knowledge and has provided you with a short examination. When composing your answers to this employment examination, ensure that they are cohesive and read like a short essay.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT