Essay PreviewMore ↓
A company’s network is intertwined with every employee’s private computer. Even in instances where the company has instituted security policies. Employees will undoubtedly carry work home or bring disks from home or use thumb drives; additionally, personal email will very often have attachments that could endanger the company network.
Lets say for example that the company network is protected by Norton antivirus, but the employees personal computers are not, and they are continually taking work home and swapping storage devices between secure and unsecure devices that may carry viruses that may not be detected and become a threat to the company network. One of the largest user of technology is the military and they use corporate software system, they began offering free downloads of antivirus software to any member of the DOD. They military saw the need for protecting the secure networks from people who work at home and may accidentally infect it.
Vamosi suggests that antivirus companies will still make money by selling their antivirus to their corporate clients while they let the home users download for free. If every large corporation paid for the license agreement allowing their employees to use them and shared with their home computers, the cost to the end user would not be as exorbitant. Another point is that he advocates that these giants introduce its products for a trial period in order to let the end user know the advantages of the software and the functionality of having their system protected to allow the consumer to test-drive the product. Either way, whether the client ends up buying the software or reverting back to a stripped down version of it, these actions as mention by Vamosi will only benefit the antivirus corporation. Personally, my computer is protected by the license agreement that the military has with Symantec for Norton antivirus; therefore, I do not feel the need to purchase antivirus software, which I would really need because I use my personal computer on a daily base at work because the company computers are obsolete and the software needs to be upgraded making it more susceptible to viruses than a better maintained network.
Network security is more than just antivirus; it involves systems in places to provide for the authentication of the users. This will be most likely a username and a password. Other measures will include firewalls; which enforces access policies put in place by management (i.
How to Cite this Page
"Antivirus Protection." 123HelpMe.com. 21 May 2019
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Symantec is a company that specializes in antivirus protection for its customers. It is fair to say that they operate on a global scale due to the fact that their customers and employees are located around the world and the threat of destructive viruses is internet wide. The management of an operation like Symantec takes special consideration due to the scope and scale of the product that they offer. Consequently, the management has to be very versatile in its management style. When considering the impacts of diversity that the external environment creates for this company, it is important to consider all aspects of the external components and how the company overcomes these challenges.... [tags: Antivirus Protection, Computers, Technology]
1109 words (3.2 pages)
- Antivirus programs can have many differences between applications or they can be very similar. There are programs that can be paid for or programs that can be acquired for free. Because having an antivirus program installed to protect the computer and its user is essential for optimal performance and online safety, a program must be evaluated to make sure it fits the requirements for each user’s need and that the computer meets the software’s requirements for installation. One such antivirus program that provides users with real time protection against viruses and protects the user’s sensitive personal files and information is AVG Antivirus.... [tags: Computers, Technology, descriptive, informative]
976 words (2.8 pages)
- Introduction Computers are becoming more and more important machine and the uses of computer are becoming variety in our life. The reason for using of computer on different purpose, people are looking for computer specifications which they need. To satisfy people’s needs, the computers are developing fast, however as the growth of use of computer, computer is not the only one developing the internet is developing rapidly. The internet is essential in our life now. Over billions of people around world use internet to communicate with each other or get information they need faster without any limitation of time and places.... [tags: Computer Virus Detection]
2425 words (6.9 pages)
- Security is a life-threatening part in an organization or company and with a high virtualization rate, it becomes even more critical and difficult to manage. It is, indeed, really difficult to protect one’s virtual machines and network, and the difficulty keeps rising for a cloud service provider. There are enormous quantity for a cloud computing’s security software out there, such as Panda Cloud protection, Symantec Cloud Security and so on. In this report I have chosen 5Nine Cloud Security for Hyper- V.... [tags: centralized intelligent,antivirus,virtual firewall]
1649 words (4.7 pages)
- Computers used in businesses have become a vital necessity to be able to retrieve, process, and transmit data that contain information of all types at very high speed. In addition, computers can help make workflow more efficient for companies by giving reliable service to clients and exchanging services to promote their business. However, there are a lot of outside and inside threats that are created by malicious users. The creations made by a malicious user are meant to be used to cause harm in a business.... [tags: Windows Server 2008, Operating system, Novell]
1241 words (3.5 pages)
- What is layered security. A method of adding different parts of security in order to either prevent or slow down attackers from entering an information system. Most times layered security is referred to defense in depth. A layered security system have things incorporated such as Firewalls, DMZ, antivirus, and Intrusion Detection Services. The list can be much longer. The purpose of a layered security system is to provide as much protection to the Information system as possible. No one can ever be sure how or when an attacker will attack, but layering the security measures on an information system will help keep it safe.... [tags: information system, firewalls, antivirus]
1220 words (3.5 pages)
- intoduction Network security is a set of different measures which are designed to protect networks from attacks and unauthorised access. Network protection is provided in two type software and hardware. Treats to huge corporation networks nowadays are constantly growing, they spreading in increasing speed, and their destructive capabilities are increasing every day. If we look on the list of threads what may harm the corporate network, it becomes clear that nowadays trend is multifunctional devices used to protect from most of the corporate treats (viruses, worms, Trojans, DOS-attacks, spam, data leaks, and etc.) In this assignment I going to choose two network security software tools expl... [tags: Snort, Honeyd]
1339 words (3.8 pages)
- Every organization have sensitive information that need protection from hackers. Many organizations use peer-to-peer sharing application that can increase the risk of data theft. They are many risks related with software security. On this paper, we will be discussing and providing a risk assessment that is related with unauthorized installation of file-sharing software on company computers, including servers, desktops and laptops. This kind of risk can result in the loss of system integrity. Moreover, we will evaluate three technology-based solution that will provide effective protection measures.... [tags: File sharing, Peer-to-peer, Computer security]
905 words (2.6 pages)
- At the Aim Higher College there have been recently discovered malware on the campus systems that are due to many recent attacks. I used an Anti-virus protection software called AVG on the computer systems on campus and ran a whole computer scan. The results came back very quick of numbers of malware being high and medium priorities that these should not be taken lightly. Furthermore, the scan found many viruses, Trojans, and malicious software and applications. The first finding was a medium priority that was a cryptcat.exe file this program can potentially be used to remote access the program.... [tags: Computer virus, Malware, Trojan horse]
726 words (2.1 pages)
- Free Antivirus Software Makes Cents This paper will outline some key points of my strategic vision for our network security plan to protect our systems from cyber attack. There are three main areas that are most important for our network to remain secure and operational. First, we must have a sound management policy on how are network will be used and accessed. Our management policy should be understood by all and enforced. Second, we must have a plan for the utilization of antivirus software within our organization and those who access the network remotely.... [tags: Virus Protection Security ]
1406 words (4 pages)
We all contribute to this big nuisance, some to a greater extent than others. By definition, spam is the abuse of the electronic messaging systems by indiscriminately sending unsolicited bulk messages. There is not a day that I do not get a (spam) message from a friend, and they do not realize that they are sending spam, but a look at the subject will give me an inkling of what I am about to open [i.e., unless I could really trust the source, I would not open anything that has a few (fw:fw:fw) in front of whatever alluring subject may be]. My mother in law got her first computer a few months ago, and she will not reveal her age, but I believe she is in her upper 60’s, well she sent me an email and later on called me and was surprised that I did not got it. I have a rule, if I do not know the source, I do not open the email and if the subject line comes with something like ( it’s me) and the email is a bunch of numbers which I do not recognize, it’s going to get deleted. In spite of having anti-spam software, I still get quite a bit of spam not only from friends but from unscrupulous individuals; this is a daily nuisance that I have to deal with every morning, having to clean up my email before I get down to business.
According to Gaudin, there is a dissension between IT and the end users when it comes to the repercussions of spam and the seriousness of the issue. I believe that the difference is in the volume that ends up in your inbox. Some end users only see their small share of spam while the majority sees it as a nuisance. The IT administrators deal with the entire network issues such as bandwidth usage, storage, viruses, and hours wasted cleaning it up.
In today technological world, each company, regardless of size, needs to institute a security policy. I am one of those veterans that got a letter last year when a laptop with confidential information of about 26.5 million veterans was stolen from the residence of a contractor with the Department of Veterans Affairs who was not authorized to take the equipment home. According to the InfoWorld survey, 42% of the companies reported that their organizations had no security policy in place and those who had it did not follow through to make sure their employees were aware of it and comply with it. Companies are calling possible employee security problems internal threats and to some extent, public and private sectors are taking steps to alleviate these problems. For example, I did a paper on employee rights in the Clarksville-Montgomery County School System and the code of conduct that regulates the use of the network email accounts on the school system property and reserves the right to monitor the network and the employee accounts.
In today’s world of more sophisticated networks attacks, it is a fact that all members within an organization have to take measures to protect their network, whether they are simple end user or IT professionals. The responsibility has to be shouldered by all because it’s not only important for measures to be in place, but they have to be complied with and that requires the cooperation of all end users within the network.
Bridging the digital divide, Retrieved August 12, 2008 from: http://news.bbc.co.uk/1/hi/special_report/1999/10/99/information_rich_information_poor/466651.stm
Gaudin, S. (2004).IT and End Users Differ on Spam Severity, Retrieved August 11, 2008 from: http://www.enterpriseitplanet.com/security/news/article.php/3370591
Vamosi, R. (2004). Antivirus software must be free. Here's why, Retrieved August 10, 2008 from: http://reviews-zdnet.com.com/4520-7297-5123825.html
2006 InfoWorld Security Survey: IT's confidence crisis, Retrieved August 06, 2008 from: http://www.infoworld.com/article/06/10/30/44FEsecsurvey_1.html
Gaudin, S. (2004).IT and End Users Differ on Spam Severity, Retrieved August 07, 2008 from: http://www.enterpriseitplanet.com/security/news/article.php/3370591