Cloud-based antivirus

Assignment Help Basic Computer Science
Reference no: EM133032588

Need a Cloud-based Antivirus which would satisfy the specs mentioned below

1. Must have a local agent/software on the local computer that monitors a directory for new files.

2. Whenever a new file is added to this directory, the local agent must check the file to find if it is in the blacklist or whitelist.

3. If it is in neither, then the local agent must upload it to the cloud.

4. On the cloud side, there must be the following components: multiple virtual machines each with a separate anti virus engine installed, and a central monitor virtual machine that accepts file uploads (or monitors file uploads to S3), and then uses cloud services such as AWS Lambda to provide the file to the virtual machines with anti virus engines. The engines scan the file and sends report back to the monitor which combines the reports and sends the report back to the local engine, telling it if it is a virus/not a virus. Also, the blacklist or whitelist must be updated.

Reference no: EM133032588

Questions Cloud

Prepare e-mail analyzing ethical privacy trends : Prepare an e-mail analyzing ethical privacy trends, confidentiality, and privacy regulations. How do app developers fit into the social media industry?
Structured-semistructured and unstructured data : Compare inheritance in the EER model to inheritance in the OO model. What are the differences between structured, semistructured, and unstructured data?
Creating and forecasting budgets : your responsibilities may include proficiently working with a variety of technologies, conducting meetings with stakeholders, creating and forecasting budgets
Windows historian : Explain how cookies can show that a user has visited a site if that user's history has been deleted.
Cloud-based antivirus : Must have a local agent/software on the local computer that monitors a directory for new files.
Cloud-based home security system : Need to design a Cloud-based Home Security System which should satisfy the below conditions. Must support at least 1 or preferably 2 home security devices
Components of composition in data visualization : Discuss the key components of composition in data visualization. Note why the components are valuable when creating visualizations.
Mobile web development option : People are using their mobile phone browsers more and more every day to find information about businesses, make product decisions
Cybersecurity threat awareness training : Imagine you are the information systems security officer at your company and are tasked with creating a cybersecurity threat awareness training.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Compare and contrast different mobile platforms

Compare and contrast different mobile platforms. Discuss mobile information design. Research and discuss effective use of screen real estate.

  Outline kotter change management

Outline Kotter's change management. How would you think its strengths would work for the young/old generations?

  Compare and contrast a split db with a non split db.

Compare and contrast a split DB with a non split DB.

  A self-introduction among the slides

Using Power Point, create 10 empty slides ready for editing with the following specification: 1- a self-introduction among the slides. 2- Master feature incorporate all of the 10 slides.

  Question regarding the internal rate of return

Define the term "internal rate of return". Assume an investment of $50,000 with an expected return of $15,000 per year for 5 years. What is the approximate internal rate of return?

  Create circuit at gate level to calculate function

Create the circuit at gate level to calculate the following function: if (a=b)y=a; else y=0;.let a,b and y be 16 bit buses. Suppose input and output capacitances are each 10 units.

  Computer and internet security policy for organization

Your job is to develop a computer and internet security policy for the organization that covers the following areas- Computer and email acceptable use policy

  Which control points have the greatest vulnerability

Present your findings in the form of a chart. Which control points have the greatest vulnerability? What recommendations would you make to Mercer Paints? Prepare a written report that summarizes your findings and recommendations.

  Employee becomes disgruntled

After being fired, an employee becomes disgruntled. The managers never disabled his login information, and his best friend still works at the company. The disgruntled employee gives his friend his login information for the company's private networ..

  Best decision using the maximax criterion

(a) What is the best decision using the maximax criterion? What is the payoff for it?

  Measured by the number of instructions processor

Groschs Law states that computer hardware power, as measured by the number of instructions processor can execute in a fixed time interval, increases in proportion to the square of hardware cost. Is the law true and valid at present? Why or why not..

  To represent full color images accurately

To represent full color images accurately what must desktop publishing systems use

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd