Preview

Anti-Virus Software

Better Essays
Open Document
Open Document
974 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Anti-Virus Software
Introduction
This report will outline that it would be useful for our company to subsidize free distribution of anti-virus software to our home users. There will be analysis of the connection between the company 's network and home users and how this will help our company 's problems with viruses. I will discuss the other issues besides providing free software to home users that affect the network security of our firm. Additionally, I will describe the roles of top management/non-IT management, IT professionals, and end-users in maintaining network security. Finally, I will bring out the role that Robert Vamosi envisions for corporate customers relative to free antivirus software based on his article, “Antivirus software must be free, Here’s why.”
Analysis
The threat of viruses and other malicious software and the possibility of them getting on our company’s network does not have to originate within the company’s walls. A home/end user may unknowingly introduce this threat into the network. Viruses such as the Netsky (and variants of it) can open up a “backdoor.” A transmission control protocol port (such as port 6789/ TCP SMC-HTTPS or port 80) can leave the backdoor ajar. TCP (the TCP/IP or Internet Protocol) ensures that the message is sent in its entirety. A port is the way in and out of a computer or a network device like a router or switch. Hackers or black hats can scan for open ports and plant malicious program codes like those that can steal passwords and confidential information, such as a user 's PIN and credit card numbers when he does Internet banking on that PC. Or, the hacker can turn that PC into a spamming machine. Another malicious virus: The Bagle.j virus which spoofs and spams. It can impersonate your e-mail address and mass spam, sending out unauthorized e-mail on your behalf. The dark side of this multi-havoc virus: It comes with a .zip file that is password-protected. The password sits in the body of the text. People are



References: Vamosi, Robert, March 1, 2004-“Antivirus software must be free, Here’s why.” ZDNet Tan, Hellen, (April 21, 2004) “Virus war: Arm the end-user!” Computer Times Leung, Linda, (November 10, 2004) “Security: End users are your first line of defense” Computerworld DTI Information Security Breaches Survey, 2006, Price Waterhouse Coopers

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Olzak, T. & Bunter, B. (2010, May 07). Security basics - components of security policies. Bright…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    References: 1. (2010). Principles of Computer Security: CompTIA Security+ and Beyond (2nd ed.). : McGraw-Hill.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Robert Jones Unit 8 Discussion: John Motorcycle Parts 8/5/2014 IS3110 Mr. Jackson Risk Assessment Plan Performed for John Motorcycle Parts Co. Risks: 1. Identify risks and problems with security plan 2. 5 things to go wrong without Biz Continuity Plan Disaster Recovery Plan. 3. List five risks to be addressed I. Identification of risks and problems:…

    • 186 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    After reviewing the new network design, we have seen several threats and came up with countermeasures to prevent these attacks. The first threat is the connection between the internet and the company’s router and connection between the wireless router and switch. Hackers, viruses, and malware can easily get in through this connection and infect the network. The countermeasure for this is a firewall or intrusion detection system. This equipment will help detect any unwanted guests the get onto the network. You can control what traffic comes in and out of your network. Next would be the wireless router being unsecured. If this router is left open and SSID board casting, any within its range can access the company’s network. A countermeasure for this is password encryption and stealth id. Hiding the id of the router will allow it to be hidden from anyone scanning for wireless routers to use. Encryption password puts a lock on the router to where only people with the key can access the router. The last threat would be the workstations and laptops. Users make the most mistakes on these machines. They download and go to places they shouldn’t which causes the risk of viruses and hackers. Countermeasures are Anti Viruses, patches, and teaching. Anti-viruses will help protect against viruses and malware that can allow hackers to enter the system and still information. It’s important to keep the definitions up to date so the AV can protect against the latest viruses. Updating OS with patches can also prevent security threats. Teaching users the dos and don’ts of security issues can help them be aware of the threats and what they should do to help prevent risks from occurring.…

    • 292 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    References: Clifford, M. (2004). Identifying and Exploring Security Essentials. Upper Saddle River, NJ: Pearson Prentice-Hall…

    • 705 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-301) (3rd ed.). New York, NY: McGraw-Hill Company.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Final: Security and Network

    • 3275 Words
    • 11 Pages

    This examination is worth 20 percent of your total grade. There are five questions, and the maximum point values are included with each question.…

    • 3275 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    LESMA204

    • 2205 Words
    • 7 Pages

    References: The Open University of Hong Kong. LESM A204 Security Practices and Management (Unit2). Hong Kong: OUHK…

    • 2205 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    * All PC's are to be configured such that they schedule regular updates from the Network Services centralized anti-virus servers.…

    • 1030 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Quarterly profit-and-loss report that shows a breakdown of revenue and cost for each separate activity…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A computer security career is a highly diverse and important position, where you could work anywhere from a College Campus to a Hospital Administration building, all the way up to the Government Agencies all over the world. With so many new businesses’ opening daily, worldwide, the job market will be forever expanding. Whenever a business’s computer system acts up it’s the job of their computer security specialist to carefully take all the required steps to identify and resolve the specific issue, combining many people into one, saving the company lots of money. These specialists have and exceptional and advanced overall knowledge of all things computer.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 4 Assignment 2

    • 1005 Words
    • 5 Pages

    Internet use creates the possibility of virus attacks or allowing any unauthorized people to get into our system with the potential of accessing company’s confidential information.…

    • 1005 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    The day after you got married, the doctors realize you have a terminal illness. Your hair starts to fall out, followed with unbearable pain almost everyday, and you’re looking weaker and weaker by the minute. You think, It would be much easier to just let go than go through this pain everyday. Well, a solution would be asking your local doctor/s about assisted suicide. Assisted suicide is the suicide of a patient suffering from an incurable disease, affected by the taking of lethal drugs provided by a doctor for this purpose. In some states, like California, Colorado, Montana, Oregon, Vermont and Washington. Although a patient has to have six or less months to live to be qualified for assisted suicide, it would be better to end the suffering…

    • 955 Words
    • 4 Pages
    Good Essays