logo

CHAPTER FIVE 4 Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Ant

   

Added on  2021-05-31

14 Pages2481 Words157 Views
INFORMATION SECURITYNameCourseDate of Submission1

Table of ContentsCHAPTER FOUR...........................................................................................................................4Introduction..................................................................................................................................4Antiviruses...................................................................................................................................4Windows Defender......................................................................................................................4Bid-defender.................................................................................................................................4Smadav.........................................................................................................................................4Norton antivirus..........................................................................................................................4Antiviruses Features and Comparison.........................................................................................5Recommendation.............................................................................................................................5CHAPTER FIVE.............................................................................................................................6HASH ALGORITHMS................................................................................................................6Introduction..................................................................................................................................6Message Digest............................................................................................................................6Secure hash algorithm..................................................................................................................6Whirpool......................................................................................................................................6RIMED ........................................................................................................................................6Comparison between Hashcodes.................................................................................................7CHAPTER SIX................................................................................................................................8Key management life cycle..........................................................................................................8Creation....................................................................................................................................9Deployment..............................................................................................................................9Monitoring..............................................................................................................................10CHAPTER SEVEN.......................................................................................................................11LOAD BALANCING ALGORITHMS.....................................................................................11References......................................................................................................................................142

3

CHAPTER FOUR Introduction.Antiviruses are the software’s that are specifically designed to protect computers against malicious software or codes by detecting them and removing them hence disinfecting the computer. There are many types of viruses that can attack the computer this includes Trojans, worms and droppers each affect computers in different ways. Different antiviruses are designed to remove malwares from computers .Below is a description and comparison of some antivirusesand how they are used to remove some malwares in attacked devices (SERGEEVICH,2015). Antiviruses softwares. This are software that are specifically designed to protect computers from malware attack. Thereare different types of viruses each with different types of features. Some antiviruses are free products from companies while others are commercialized. Windows defender is free product from Microsoft windows while others like Kaspersky, smadav, Notan and bid-defender are commercialized. Each different type of this have different functioning hence differing in their characteristics. The following outlines the comparison and the description of the above mentioned antiviruses (ZHENG, 2010). Windows Defender. This is a malware software that is in-built in Microsoft operating system. It runs in the background of the operating system. It a notifies the user if there is any malware attack and quick scan the system if prompted to do the same to remove some attacks. This is mostly used bymany computers since it comes with the windows operating system as a background application (Hayash, 2013).Bid-defenderThis is multi-layer commercialized software that defends computers against ransomware attack .It uses threat detection technique to protect attacks.SmadavSpecialized in protecting flash disks from attacks.Norton antivirus. This protects our pc from internet malwares. There some malwares that are installed to our computers when we are accessing the internet Norton detects them and remove them.4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Textbook Module #5 Quiz
|14
|1332
|83