The Antivirus And Antispyware Software

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

In an organization IT divisions needs many types of controls to protect their IT assets from errors, disasters, computer crimes etc. Specific policies and procedures should be added to the information system at the implementation. An organization uses general controls and application controls to control their computer systems. Application controls are used in computerized applications. Most of payroll and order processing systems uses application controls. General controls influence the design, security and use of computer programs and the security of data files in the organization IT infrastructure.

IT division uses general controls to protect their IT assets. General controls contain software controls, hardware controls, data security controls etc.

Software controls are used avoid the unauthorized access of software programs, system software and computer programs.

Hardware controls checks whether the computer hardware is physically secured and failures of computer equipment’s.

Data Security controls

Data security controls protects organizations private and valuable information or any type of data avoiding unauthorized access to them.

Computer Operations Controls

Computer operations controls ensure that the implemented procedures have added in the storage and processing of data in a correct and a consistent manner.

Implementation Controls

Implementation controls measures the systems development process to find out that the development process is properly managed and controlled.

Administrative Controls

Administrative controls are some formalized rules, standards and procedures that manages the organization application and general controls. This ensures those application and general controls are properly executed and enforced.

To protect the organization IT assets the IT division also uses some application controls. Application controls include Input controls, output controls and Processing controls. These controls include both automated and manual procedures.

Input controls

Checks data for accuracy and completeness. There are specific controls for input authorization, data conversion, data editing and error handling.

Processing controls

Verify data is complete and accurate in updating.

Output controls

Verify the results are accurate, complete and properly distributed.

Organization uses some technologies and tools for protect information resources.

Firewall

Firewall is a combination of hardware and software that is implemented between the organizations local area network (LAN) or any private network and the public network to protect organizations information resources from the access of unauthorized network or traffic

Types of firewalls:

Packet filtering: checks the source and destination of every packet passing through the network.

Application proxy filtering: Act as an intermediate host between external clients and internal servers.

Network Address Translation: Used by most firewalls to shield a private network from public network.

Identity management software

Keep a track of all authorized users and their privileges by protecting company computers from unauthorized users. This will only allow users to use computers that have privileges to use it. Every user may not be able to use all information. Assign privileges to each user according to their work by controlling access.

Authentication

Security systems that to identify users by provided passwords and usernames. Digital signature and digital certificates supports with authentication. Digital signature is used to verify contents of a message by attaching a digital code to the message that transmitted electronically. Digital certificates are used a certified authority to validate a user’s identity and keep protection in online transactions.

Antivirus and antispyware software

Software used to protect and eliminate computers from malwares. This software needs continual updates. Protect organizations valuable information and computer equipment from unknown viruses and a worm, company install and uses antivirus software. Antivirus software checks computer hard drive for viruses, worms and Trojan horse and when it find out these type of malware removes it and fixes threats that found. This software include the feature to auto update and it update the software by profiles of new viruses and keep computer by protecting from new viruses.

Antispyware uses to protect computers from spyware that can be downloaded from the internet and get company information from the computer without your permission and also this type of spyware can gather details about passwords, email addresses and credit card details. Once an antispyware is installed it will find spyware and adware by checking hard drive.

Ref:

http://www.webopedia.com/DidYouKnow/Internet/2008/antivirus_antispyware.asp [14.02.2013]

Encryption

Encryption is a mechanism that scrambling messages in transmitting. It will avoid unauthorized access to read and understand the data. First the message is encrypted by using an encryption key and transmitted as a scramble characters. Authorized party or the receiver needs to provide a decrypt the message using a key. Public key encryption uses a public key to encrypt the data and receiver needs a private key to decrypt the message.

Securing wireless networks

Wireless Local Area Network is a network that is clearly open to the public. It just not like wired local area network. Therefore need to improve the security of the wireless local area network. To improve the security of a wireless network need to change passwords always. For some routers there is an IP address and a password related with its model. As there are more number of users that uses the same router model may have the same password. It can be a threat to the network that anybody can hack the network easily by providing that password.

Enabling encryption such as WEP, WPA is improving the security of the wireless network of the company. This technology is providing security through encryption to avoid unauthorized parties to access to the corporate valuable or private information.

Wireless security is used to increase the security of the company wireless network. Wireless security software monitors the terminals which tried to get access to the wireless network. Also it secures the router. It uses automatic security key for encryption purposes.

To manage wireless LAN equipment and APs maintain security policies and practices for the wireless LAN. The wireless LAN connected with a corporate virtual private network gateway for the security purposes such as to avoid threat of packet sniffing.

Maintaining the Domain Name System and IP Security protocol to support to the VPN. For more secure the network administrators use authorization to enable connections only to the devices that have the unique Network Interface Card address containing in the LAN network of the organization. Every Network Interface Card is coming with a unique address and most APs are support Media Access Control using the authorization tables.

Ref:

http://tips4pc.com/articles/networking%20tips/how_to_improve_your_wireless_sec.htm [14.02.2013]

https://www.symantec.com/avcenter/reference/symantec.wlan.security.pdf [14.02.2013]



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now