Please see attached file. Thank you

Do you need academic writing help with your homework? Let us write your papers.


Order a Similar Paper Order a Different Paper

Please see attached file.

Thank you

Please see attached file. Thank you
Length: Minimum of 400 words You will be required to create 1 new thread and provide substantive comments on at least 3 threads created by other peers (See below) . Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. If the maker of antivirus software wants to be successful, the software has to be as close to bulletproof as the maker can possibly make it. Nothing is perfect; we certainly should understand at this point that no software can be proven bug free and that no security posture is 100% risk-free. Based on this statement, what do you think it could be better to improve the antivirus software? How safe do you feel to use antivirus software in your organization, and what other precautions do you use to prevent virus, malware, etc.? Peers Response. Santosh Vempaty  COLLAPSE Top of Form Antivirus Software in the Organization Antivirus software was very helpful to the organization. In the organization, they are so many threats with a lot of people so are related to the organization and some are not related to the organization (Ansari, Myr, & Omari, 2017). The main problem that was happens with the software that a particular code was hacked. So others have a chance to change information or do corrections to our information. They are so many organizations that are used in antivirus software because giving protection the information. Anti-virus is the best factor that keeps data safe in the computer systems and it will help you to modify the drawbacks. When we are doing multiple processes at the same time then we are activating the aunty virus it was easily removed from the viruses that are taking place (Pavlov & Karakaneva, 2016). In the market, they are so much anti-virus software is there.  These all are working for the same process like detects the code and continuously cure the malware. They are so many hackers who are using different thoughts to undermine the antivirus software. The main purpose of this was to prevent unknown viruses and attacks from your personal computer. By using this system cant stuck it prevented the wastage of time. When we are considering an example your pc was having valuable information and that was protected with this software (Valdi & al., 2015). It protects information like users’ credit card information, also removes unnecessary icons, and helps to block unauthorized entries. They are using while hacking the information like networking also. Antivirus can protect your crucial information from digging was happening from the hacks. We are not installing the anti-virus of your computers it decreased the life span of your PCs. The viruses will do this thing like the total hard disk was formatted. We are searching for a file, then it was renamed or copy like a different file on your computer. Bottom of Form Anilreddy Gaddam  COLLAPSE Top of Form Antivirus Software As a computer program, the antivirus or anti-malware is determined and it is designed to detect, prevent and remove viruses and malicious software. Antivirus software will detect, remove and prevent the viruses but from malware, hackers, and cyber threats the computer was also protected. Hence, nothing is perfect in this contemporary world. From a certain point of view, it is important to note and to be bug-free no software can prove and for risk-free, no anti-virus is 100 percent (Chen et al., 2012). For computer systems being a pro-active police guard the anti-virus software where the improvements will need to be more significant and regular. By turning on real-time protection in the computer systems of the antivirus software protection can be improved. With the use of Microsoft security essentials, then real-time protections can turn. In a computer, it will involve going to set the section of real-time protection selection and turn it on the Windows Operating System. Just as a free antivirus software I have purchased and that vary in the protection quality. With the use of this antivirus software like Avira, PC tools, Bit defender, and AVG I will always feel secure. In such a case if paid antivirus software is not available then I would like to prefer using Windows Defender especially at the time I am using Windows 10 (Huang et al., 2016). With the use of Windows Defender, the main advantage is that Windows Operating System will come with the updated features which will keep on updating the operating system’s security feature. Furthermore, at the time of using Windows older version then always I feel insecure because when compared to AVG antivirus or Bit Defender will be better than the previous one that too is served. By virus, the process of ensuring the computer systems is not infected and five important precautions were taken by the virus. First, on suspicious or unknown links a computer should not click on because in most cases there will be some sources for the virus. The virus is prevented which able to ensure that the strange avoidance and suspicious links which is necessary (Vilalta, 2012). Secondly, regularly updating Windows will help to reduce the virus infection chances because there will be Windows update and security system update also. At the time of updates, the security release updates of Microsoft will help to patch up the Windows vulnerabilities that have been found in the computer system. For preventing antivirus another precaution is by ensuring that in a computer the internet browser has to be updated regularly. Bottom of Form Chandan Kumar  COLLAPSE Top of Form The current situation of any antivirus is to have continuous updates and repeated program installations and user has to be having a seamless experience and unconvinced. For instance, think that you are working on something and there are three to four software updates daily that require you to stop your work and install the updates to continue which will never be a good user experience. And most of the anti-virus software makers have resolved this issue by allowing the AV engines to update and install the software’s itself as necessary (Schoenfield, 2015). For a successful antivirus engine, the software supposed to restrict almost every malware application to pass through the systems and it is known that no software is defect free and perfect to handle the security posture and to make sure its the total risk free. The antivirus software doesn’t stand alone as it need the support from the endpoints. The rate of change for the malicious software’s and programs has been increased and its requiring the major efforts from companies to defend the systems (Schoenfield, 2015). This auto update model poses some challenges within, as the endpoint software trustworthiness and veracity identification of server is difficult. It has to be validated and establish the connections to identify any tampering for software endpoint integrity as most of the AV providers will not disclose the prevention methods nor the protection process works. Defence is best in case of threat agents doesn’t have enough details on startegies and tactics, it is very important in case of communication between untrusted netwroks and if the requests are coming from the public netwroks (Benton et al., 2018). For the on-premise deployment model, the security decisions are made based on the customers preference and underlying organizations security postures. the AV engine deployment should be handled by the professionals and no matter what the AV maker suggestions or guidance’s, the customers will have to do what is important and convenient for the situation. For example, exposing the management console is far riskier for the customers put the system into greater danger, in many cases the sensitive data management consoles will be placed as internet accessible but it’s a poor security practice (Benton et al., 2018). In a situation that the software developers control the overall infrastructure and must have the complete knowledge on the management and security practices so that the various assumption can be made. For instance, the systems are deployed in a highly restricted networks then there is no need for the extra security enforcements and encryption tunnels as those become just nice to have functions. As much as possible, the security software must be placed in the hands of deployers and software makers may not be able to determine the best settings for every organization and rather the appropriate teams can handle and place the configurations for better security posture (Benton et al., 2018).  Bottom of Form

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

Our team of vetted writers in every subject is waiting to help you pass that class. With keen editors and a friendly customer support team, we guarantee custom-written, original, high-quality papers. Get top grades.


Order a Similar Paper Order a Different Paper