logo

Malicious Software Protection Policy

   

Added on  2023-06-03

6 Pages1728 Words181 Views
Malicious Software Protection Policy

Introduction
Malicious is a kind of malware software which is very harmful to human-computer
systems. There are many forms of a malware attack, for example, viruses, spyware,
rootkits, worms, and adware. In the last few years the rate of malicious attacks is
increasing very fast because many consumers use wireless networks which are very
less secure and hackers use malware software to block computer systems. The main
purpose of this research report is to investigate different types of malicious software
and prevention methods to avoid this type of security threats. Any malicious software
first collects personal information of computer networks like IP address, data links and
type of networks after that they produce unwanted traffic signals and transfer into
consumer private networks. This report is explaining the different types of policies, and
strategies to protect personal data from malicious software.
Damshenas, M., Dehghantanha, A. and Mahmoud, R., (2013) A survey of malware
propagation, analysis, and detection. International Journal of Cyber-Security and
Digital Forensics (IJCSDF), 2(4), pp.10-29.
The title of this journal paper is a survey on malware propagation, analysis, and
detection that was transcribed by Damshenas, M., Dehghantanha, A. and Mahmoud, R.
According to the author, malware is a kind of security threat that produced unauthentic
signals by using malicious software and encrypts human computer networks. There are
many organizations and consumers which are facing this type of problem and users can
lose their personal information. The main objective of this article is to analyze the
fundamental concept of malicious software and security policies to protect data from
this attack. The author provided an overview of malicious attack and their types in
order to reduce malware attacks. In which malware first detect the location of computer
networks and after that the send spam emails to consumers and block their peripheral
devices. According to this article in some cases, the malicious software will not
completely harmful to the system but they reduce the overall performance and
efficiency of devices.
In this article, the author used a mixed method which is a combination of both
quantitative and qualitative data. Qualitative data provide theoretical information about

the malicious attack and quantitative process produce data and statistics regarding the
research topic. The researcher used a secondary method to collect data from various
resources like journals, books, and online websites. To reduce the security threats of
malicious software information technology developed, for example, Anomaly-Based
technique, Honeypots, Sandboxing, Direct Simulation Model, and other security plans.
Therefore, with the help of these security policies, people can save their private details
and information. This paper is based on the malicious attack and impact of this security
threat on human-computer systems. The author analyzed malware and malicious
software and they also produced detection techniques like data mining.
Patil, B.V. and Jadhav, R.J., (2018) Computer Virus and Antivirus Software–A Brief
Review. IJAME, 12(1), pp. 2-4.
The title of this paper is Computer Virus and Antivirus Software–A Brief Review which
is completed based on malicious software. The main objective of this journal paper is to
identify various types of computer viruses and the impact of malware software on
user’s computer networks. According to an author, a malware is a type of computer
virus which can block human personal accounts and many organizations are facing this
issue in their computer systems. To avoid this problem researcher identified a new
approach which is called antivirus software and it has the ability to detect malicious
networks or unwanted signals from the computer. There are many attackers that
produced a large number of malware viruses and the rate of malicious threat is
increasing very fast in day to day life. According to this article information and
technology established many advanced antivirus software by which people can control
and monitor unauthorized servers and malware virus. This journal article highlights the
fundamental concept of malicious virus and role of antivirus software to reduce this
type of issues. The researcher used a qualitative research design to gather knowledge
regarding malicious protection policies and data is collected with the help of a survey.
To improve the effectiveness of this investigation writer analysis the views of experts
and people and they also used primary and secondary approached to achieve the
objective of this paper. Therefore, antivirus is a very common process for detection of
unwanted signals and malicious and author described the working principle of an
antivirus. This article reduced the drawbacks of previous research and it also collected
data from the literature review and other resources. This article described different

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Methods to Address Cybersecurity Issues in JL Organization
|13
|2416
|109

Malicious Software Protection Policy: Articles Review
|6
|1223
|414

Securing Enterprise Infrastructure
|7
|1553
|24

Cyber Security Assignment PDF
|9
|2867
|2114

Malware Detection of Cloud Computing in Business Field
|9
|1375
|192

Smartphones Security Issues and Mitigation Tools
|10
|706
|305