Malicious Software Protection Policy: Articles Review

Verified

Added on  2023/06/03

|6
|1223
|414
AI Summary
This article reviews various articles related to malicious software protection policy. It discusses the importance of protection policy and suggests ways to secure the system from malware.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running Head: Malicious software protection policy
Network security
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1 | P a g e
Introduction
The purpose of understanding malicious software protection policy is to promote
security over the network and assure that no viruses hit the system. There are various threats
associated with the system like integrity, availability and confidentiality. The protection
policy makes sure that security is maintained. They define standard by building policies so
that security could be maintained. There is various type of malware in the system that
disrupts the ability of the system. Few articles that are used are discussed in the article. All
the articles are related to malicious software protection policy.
1. Bhargava, R. and Reese, D.P., McAfee LLC, 2015. System and method for network
level protection against malicious software. U.S. Patent 8,938,800.
The article title System and method for network level protection against malicious
software written by bhargava in 2105 .The author mainly focused upon malicious Software
protection Policy and in this article he focused upon two functionalities that is real time
scanning and virus updates. The real time scanning means software that runs in background
and checks all the on-going process and checks that no viruses penetrate in the system. Apart
from that, author recommended to make sure of virus update so that daily updates could be
received. There are various tools that are available to keep track of all the malicious
activities. The policy need to be designed so that legitimate users can be identifies and
improvement could be done so that it does not harm the system. Malware are viruses that
harm and infect the system in several ways. The protection from malware can be through
personal vigilance and protective tool. Personal vigilance is a layer that protects the system
from malware and make sure that downloads is done through legitimate sites. It reduces the
Document Page
2 | P a g e
risk of viruses from additional and unauthorised sites. The malware security protection is a
second layer through which network can be protected. Antivirus’s protection software should
be used so that viruses could be detected and steps could be taken so that security of data is
assured.
2. Carter III, R.B., Lall, P.K., Oitment, G., Maha, D. and Hasan, J., McAfee LLC,
2016. Method and system for protecting against unknown malicious activities by
determining a reputation of a link. U.S. Patent 9,317,680.
The title of the article disused is “Method and system for protecting against unknown
malicious activities by determining a reputation of a link” written by Carter , Lall, Oitment,
Maha and Hasan. Author stated that security is an important concern for every organisation.
With time, cyber-attacks as well as malicious activities are increasing. Thus it is important to
safeguard the system in various ways like making use of spam filters so that infected emails
so not enter the system. The infected storage should not be used as destroys the information.
Author described that malwares can be in any form it can be viruses, spyware, adware, scare
ware and botnets. These malware destroys the software by stealing the password and other
personal information. They try to perform illegal activities which may harm valid users. He
stated that every organisation needs malware security thus steps need to be taken to secure
the data including antiviruses and anti-spyware software. In the article it was concluded that
no organisation can survive without antivirus and anti-spyware software. With the emerging
new threats it is important to keep the system updated so that it guarantees the system and
organisation to protect against all the infection and malware. Malicious code or software
affects the normal operations of the system.
3. Niemelä, J., Hyppönen, M. and Kangas, S., F Secure Oyj, 2016. Malware protection.
U.S. Patent 9,501,644.
Document Page
3 | P a g e
The title of this paper is Malware protection that is written by Niemelä, Hyppönen
and Kangas in year 2014. The author described malicious software protection policy, as there
are numerous ways in which malware spreads over the network which violates integrity,
confidentiality and availability. Attackers are using advanced technology to infect the
computers and read all the confidential data. The author stated that it can controlled by
enabling criminal tools like making use of secure internet and network. The protection policy
from malware states that system should install firewalls so that it could be safeguarded from
all the viruses. Firewall plays an important role as it act as a barrier between computer and
any unauthorised program that is trying to enter the system. The antivirus software need to be
installed so that computer can be protected. It plays an important role in in real time
protection. Author suggested that the setting of browser should be checked so that all the
movement could be tracked and privacy and security could be improved. The spams should
also be avoided as they penetrate in the system and reads all the confidential data.
4. Akhunzada, A., Ahmed, E., Gani, A., Khan, M.K., Imran, M. and Guizani, S., 2015.
Securing software defined networks: taxonomy, requirements, and open issues. IEEE
Communications Magazine, 53(4), pp.36-44.
The article that is selected is “Securing software defined networks: taxonomy,
requirements, and open issues” written Akhunzada, Ahmed, Gani, Khan, Imran and Guizani,
in year 2015. The author in this article states that all the programs should be up to date so that
devices secure the system from all the vulnerabilities. The author collected the data from both
primary as well as secondary sources. This article states the need of protection policy and it’s
important. Some of the basic steps that are stated in the protection policy is installing
firewall, antivirus software, and anti-spyware and making sure that complex and secure
passwords is used. In this article it is mentioned that data should be backed up so that in case
of failure trusted providers are able to access the data. The operating system and programs
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4 | P a g e
should be updated frequently so that errors could be resolved. The antivirus software makes
sure that all the viruses, worms and spyware protect the system. One of the best methods is
backing up the data as it makes sure that files are recovered at time of system failure.
Document Page
5 | P a g e
Conclusion
In this report, various articles related to malicious software protection policy are
discussed. All the articles are related to protection policy that makes sure that system is
protected from all the malicious malware. Some author suggested, making use of encryption
while other suggested making sure all the software’s is updated. Thus, there are ways through
which data and networks should be secured.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]