This article reviews various articles related to malicious software protection policy. It discusses the importance of protection policy and suggests ways to secure the system from malware.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
1|P a g e Introduction The purpose of understanding malicious software protection policy is to promote security over the network and assure that no viruses hit the system. There are various threats associated with the system like integrity, availability and confidentiality. The protection policy makes sure that security is maintained. They define standard by building policies so that security could be maintained. There is various type of malware in the system that disrupts the ability of the system. Few articles that are used are discussed in the article. All the articles are related to malicious software protection policy. 1.Bhargava, R. and Reese, D.P., McAfee LLC, 2015.System and method for network level protection against malicious software. U.S. Patent 8,938,800. The article titleSystem and method for network level protection against malicious softwarewritten by bhargava in 2105.The author mainly focused upon malicious Software protection Policy and in this article he focused upon two functionalities that is real time scanning and virus updates. The real time scanning means software that runs in background and checks all the on-going process and checks that no viruses penetrate in the system. Apart from that, author recommended to make sure of virus update so that daily updates could be received. There are various tools that are available to keep track of all the malicious activities. The policy need to be designed so that legitimate users can be identifies and improvement could be done so that it does not harm the system. Malware are viruses that harm and infect the system in several ways. The protection from malware can be through personal vigilance and protective tool. Personal vigilance is a layer that protects the system from malware and make sure that downloads is done through legitimate sites. It reduces the
2|P a g e risk of viruses from additional and unauthorised sites. The malware security protection is a second layer through which network can be protected. Antivirus’s protection software should be used so that viruses could be detected and steps could be taken so that security of data is assured. 2.Carter III, R.B., Lall, P.K., Oitment, G., Maha, D. and Hasan, J., McAfee LLC, 2016.Method and system for protecting against unknown malicious activities by determining a reputation of a link. U.S. Patent 9,317,680. The title of the article disused is “Method and system for protecting against unknown malicious activities by determining a reputation of a link” written byCarter , Lall, Oitment, Maha and Hasan.Author stated that security is an important concern for every organisation. With time, cyber-attacks as well as malicious activities are increasing. Thus it is important to safeguard the system in various ways like making use of spam filters so that infected emails so not enter the system. The infected storage should not be used as destroys the information. Author described that malwares can be in any form it can be viruses, spyware, adware, scare ware and botnets. These malware destroys the software by stealing the password and other personal information. They try to perform illegal activities which may harm valid users. He stated that every organisation needs malware security thus steps need to be taken to secure the data including antiviruses and anti-spyware software. In the article it was concluded that no organisation can survive without antivirus and anti-spyware software. With the emerging new threats it is important to keep the system updated so that it guarantees the system and organisation to protect against all the infection and malware. Malicious code or software affects the normal operations of the system. 3.Niemelä, J., Hyppönen, M. and Kangas, S., F Secure Oyj, 2016.Malware protection. U.S. Patent 9,501,644.
3|P a g e The title of this paper is Malware protection that is written by Niemelä, Hyppönen and Kangas in year 2014.The author described malicious software protection policy, as there are numerous ways in which malware spreads over the network which violates integrity, confidentiality and availability. Attackers are using advanced technology to infect the computers and read all the confidential data. The author stated that it can controlled by enabling criminal tools like making use of secure internet and network. The protection policy from malware states that system should install firewalls so that it could be safeguarded from all the viruses. Firewall plays an important role as it act as a barrier between computer and any unauthorised program that is trying to enter the system. The antivirus software need to be installed so that computer can be protected. It plays an important role in in real time protection. Author suggested that the setting of browser should be checked so that all the movement could be tracked and privacy and security could be improved. The spams should also be avoided as they penetrate in the system and reads all the confidential data. 4.Akhunzada, A., Ahmed, E., Gani, A., Khan, M.K., Imran, M. and Guizani, S., 2015. Securing software defined networks: taxonomy, requirements, and open issues.IEEE Communications Magazine,53(4), pp.36-44. The article that is selected is “Securing software defined networks: taxonomy, requirements, and open issues” written Akhunzada, Ahmed, Gani, Khan, Imran and Guizani, in year 2015.The author in this article states that all the programs should be up to date so that devices secure the system from all the vulnerabilities. The author collected the data from both primary as well as secondary sources. This article states the need of protection policy and it’s important. Some of the basic steps that are stated in the protection policy is installing firewall, antivirus software, and anti-spyware and making sure that complex and secure passwords is used. In this article it is mentioned that data should be backed up so that in case of failure trusted providers are able to access the data. The operating system and programs
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4|P a g e should be updated frequently so that errors could be resolved. The antivirus software makes sure that all the viruses, worms and spyware protect the system. One of the best methods is backing up the data as it makes sure that files are recovered at time of system failure.
5|P a g e Conclusion In this report, various articles related to malicious software protection policy are discussed. All the articles are related to protection policy that makes sure that system is protected from all the malicious malware. Some author suggested, making use of encryption while other suggested making sure all the software’sis updated. Thus, there are ways through which data and networks should be secured.