Malicious Software Protection Policy

Verified

Added on  2023/06/03

|6
|1728
|181
AI Summary
This report investigates different types of malicious software and prevention methods to avoid security threats. It includes a survey of malware propagation, analysis, and detection, a brief review of computer viruses and antivirus software, cyber attacks awareness and prevention methods for home users, and malware detection using data mining techniques. The report highlights the fundamental concept of malicious software and the role of various protection techniques and policies to protect personal data from malicious attacks.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Malicious Software Protection Policy

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Introduction
Malicious is a kind of malware software which is very harmful to human-computer
systems. There are many forms of a malware attack, for example, viruses, spyware,
rootkits, worms, and adware. In the last few years the rate of malicious attacks is
increasing very fast because many consumers use wireless networks which are very
less secure and hackers use malware software to block computer systems. The main
purpose of this research report is to investigate different types of malicious software
and prevention methods to avoid this type of security threats. Any malicious software
first collects personal information of computer networks like IP address, data links and
type of networks after that they produce unwanted traffic signals and transfer into
consumer private networks. This report is explaining the different types of policies, and
strategies to protect personal data from malicious software.
Damshenas, M., Dehghantanha, A. and Mahmoud, R., (2013) A survey of malware
propagation, analysis, and detection. International Journal of Cyber-Security and
Digital Forensics (IJCSDF), 2(4), pp.10-29.
The title of this journal paper is a survey on malware propagation, analysis, and
detection that was transcribed by Damshenas, M., Dehghantanha, A. and Mahmoud, R.
According to the author, malware is a kind of security threat that produced unauthentic
signals by using malicious software and encrypts human computer networks. There are
many organizations and consumers which are facing this type of problem and users can
lose their personal information. The main objective of this article is to analyze the
fundamental concept of malicious software and security policies to protect data from
this attack. The author provided an overview of malicious attack and their types in
order to reduce malware attacks. In which malware first detect the location of computer
networks and after that the send spam emails to consumers and block their peripheral
devices. According to this article in some cases, the malicious software will not
completely harmful to the system but they reduce the overall performance and
efficiency of devices.
In this article, the author used a mixed method which is a combination of both
quantitative and qualitative data. Qualitative data provide theoretical information about
Document Page
the malicious attack and quantitative process produce data and statistics regarding the
research topic. The researcher used a secondary method to collect data from various
resources like journals, books, and online websites. To reduce the security threats of
malicious software information technology developed, for example, Anomaly-Based
technique, Honeypots, Sandboxing, Direct Simulation Model, and other security plans.
Therefore, with the help of these security policies, people can save their private details
and information. This paper is based on the malicious attack and impact of this security
threat on human-computer systems. The author analyzed malware and malicious
software and they also produced detection techniques like data mining.
Patil, B.V. and Jadhav, R.J., (2018) Computer Virus and Antivirus Software–A Brief
Review. IJAME, 12(1), pp. 2-4.
The title of this paper is Computer Virus and Antivirus Software–A Brief Review which
is completed based on malicious software. The main objective of this journal paper is to
identify various types of computer viruses and the impact of malware software on
user’s computer networks. According to an author, a malware is a type of computer
virus which can block human personal accounts and many organizations are facing this
issue in their computer systems. To avoid this problem researcher identified a new
approach which is called antivirus software and it has the ability to detect malicious
networks or unwanted signals from the computer. There are many attackers that
produced a large number of malware viruses and the rate of malicious threat is
increasing very fast in day to day life. According to this article information and
technology established many advanced antivirus software by which people can control
and monitor unauthorized servers and malware virus. This journal article highlights the
fundamental concept of malicious virus and role of antivirus software to reduce this
type of issues. The researcher used a qualitative research design to gather knowledge
regarding malicious protection policies and data is collected with the help of a survey.
To improve the effectiveness of this investigation writer analysis the views of experts
and people and they also used primary and secondary approached to achieve the
objective of this paper. Therefore, antivirus is a very common process for detection of
unwanted signals and malicious and author described the working principle of an
antivirus. This article reduced the drawbacks of previous research and it also collected
data from the literature review and other resources. This article described different
Document Page
types of malicious viruses and users ensure that their antiviruses are working properly
and use only authorized servers by which they can avoid this type of issue.
Teymourlouei, H., (2015) Quick Reference: Cyber Attacks Awareness and
Prevention Method for Home Users. World Academy of Science, Engineering and
Technology, International Journal of Computer, Electrical, Automation, Control and
Information Engineering, 9(3), pp.678-684.
The title of this paper is Quick Reference: Cyber Attacks Awareness and Prevention
Method for Home Users which was written by Teymourlouei. According to the
researcher, it is very important to secure user personal information because hackers
produce a large amount of traffic signal and transfer to consumers private networks and
malicious software block their personal data. The main purpose of this journal paper is
to discuss different types of cyber-attacks and prevention methods to avoid the problem
of malicious. Cyber-attacks are very dangers and they can easily encrypt authorized
servers with the help of malware and malicious software. The author identified few
technologies and steps to avoid the problem of malware, for example, install firewall
and antivirus software, keep software up to date, ensure that all consumers are using
only authorized networks and use data encryption method. Patil, B.V., described only
one prevention methods of malicious software but Teymourlouei produced numbers of
steps and technologies to improve the security of users’ data. In this journal researcher
used both quantitative and qualitative data methods to analyze the theoretical and
statistical data about malicious software. Encryption and firewall both are very common
methods which are used by many organizations to detect and remove malicious and
malware attacks. In malicious software, attackers transfer fraud emails and messages to
consumers and they communicate with users from various social media websites and
hacked personal information of users. This research paper evaluated different types of
protection technologies and policies to avoid the issue of malware and malicious
attacks. Therefore, people should adopt modern security software and antivirus by
which they can save their private details.
Najari, I.L.S., and Lotfi, I., (2014) Malware detection using data mining
techniques. International Journal of Intelligent Information Systems, 3(6-1), pp.33-
37.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
The title of this article is Malware detection using data mining techniques which are
based on data mining technology and it was written by Najari, I.L.S., and Lotfi, I.
According to Nahari, in this modern generation, malicious software and their attacks are
a very complex problem in the field of the information system. Due to which many
consumers and online communities lost their security and the rate of malicious attack is
increased by 30% in the last four years. The main objective of this paper is to
investigate malicious attacks and the role of data mining technology in the field of
security or protection. The author also highlights various kinds of malicious cyber-
crimes and their impacts on human-computer devices. In which the researcher, used a
mixed research method to investigate malicious and theoretical information is recorded
by previous research and books. In this paper, Najari, I.L.S., and Lotfi, I. Both writers
defined two hidden technologies to detect the malicious attack, for example,
identification methods based on signature and detection technique based on behavior.
Both these methods are explained in this paper with their significance. Teymourlouei
illustrated tradition technologies and methods to reduce the problem of malicious
attack but Najari provided a modern approach by which consumers can detect and
control malicious software. There are few advantages of this article such as it produced
a platform to understand the concept of data mining technology; readers can analyze
the significance of cryptography and other detection techniques, and author gathered
relevant information from other journals articles and books. However, this paper
explained types of malicious attacks and analyzed the importance of cryptography and
data mining technologies. The author also evaluated many techniques for detection of
unauthorized signals and malware from computer networks.
Conclusion
Malicious is a very serious problem for an organization and it is a part of malware
attacks that affecting human-computer systems. Hackers produce a large number of
traffic signals from malicious software and they attack the user's personal networks by
transferring unwanted signals. This report explained the key principle of malicious
software and the impact of this cyber-crime on consumer’s private data. Information
technologies developed various types of protection techniques and policies such as
encryption, cryptography, firewall, antivirus and more which are described in this
report. Moreover, this kind of problem can be resolved by adopting security
Document Page
programmes and antivirus and users should adopt a password-based system to protect
data from malicious. In this report, there are four articles to be reviewed and it is
identified that the data mining technique is very modern security step to reduce
malware and malicious attacks from computer devices.
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]