Maker of antivirus software

Assignment Help Basic Computer Science
Reference no: EM133043360

Part 1

If the maker of antivirus software wants to be successful, the software has to be as close to bulletproof as the maker can possibly make it. Nothing is perfect; we certainly should understand at this point that no software can be proven bug free and that no security posture is 100% risk-free. Based on this statement, what do you think it could be better to improve the antivirus software? How safe do you feel to use antivirus software in your organization, and what other precautions do you use to prevent virus, malware, etc.?

Part 2

Since it is so dangerous, why would designers install software into the kernel at all (or make use of kernel software)? If you were an antivirus designer or maker, what other methods do you utilize to prevent virus?

Reference no: EM133043360

Questions Cloud

Discuss the financial benefits of chatbots : Discuss the financial benefits of chatbots. Some people say that chatbots are inferior for chatting. Others disagree. Discuss.
Compare tcp and udp : Compare and contrast TCP and UDP. Use detail to describe both and include their similarities and differences.
Challenges of maintaining information security : Discuss the challenges of maintaining information security at a remote recovery location.
Difficulties of performing backups in organizations : Discuss the difficulties of performing backups in organizations that have a 24/7 business processing day. What options are available?
Maker of antivirus software : If the maker of antivirus software wants to be successful, the software has to be as close to bulletproof as the maker can possibly make it.
The protections from the security software : The protections from the security software must continue when the device is taken off the network, such as when it is off-grid, or in airplane mode and similar.
Project management and software development : Conduct a preliminary evaluation of internal IT processes, focusing primarily on project management and software development.
Concept of false discovery in data : We focus on the concept of false discovery in data. Can a false discovery rate be completely avoided? Explain.
Security of business uses of internet : What can be done to improve the security of business uses of the Internet? Give specific examples of security measures and technologies you would use?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Intrusion detection systems

Originally we used intrusion detection systems (IDS) to detect security policy violations in networks. There are several concerns to keep in mind

  Term paper-managing organizational risk

No longer than a decade ago, IT security professionals had to work hard to persuade organizational leaders about the importance of developing effective risk management plans. Nowadays, due to the plethora of cautionary tales that organizations his..

  Importance of training and support after software

Write a three page that explains the importance of training and support after software is implemented.

  Examine two specific window server disk storage technologies

Examine at least two specific Windows Server 2012 disk storage technologies for their capability to overcome these deficits. Provide support for your response.

  Multidimensional database for european marketing

What identifier and variable dimensions would you select?

  Explain why the it architecture is important

List and explain three criteria that the IT Steering Committee should use to select and prioritize their projects.  Explain why the IT architecture is important to the IT Steering Committee and how they could use it

  What is the probability that heads came up on both flips

On the third occasion, you are not present; a so-called friend teases you with the following information, that heads came up at least once in the two flips. What is the probability that heads came up on both flips?

  Conduct own social engineering experiments

While at a restaurant, convenience store, bank, place of business, or any shopping location, ask you waiter or waitress, bartender, server, sales clerk,

  Government does that fall under fiscal policy

Define fiscal policy and list the two things the government does that fall under fiscal policy.

  Create a php script

Create a PHP script allows me to remain on IRCCloud without disconnecting. The script should have a $user / $password which we can edit with our username/pw. Then I can run it on a VPS and it will be basically make my IRCCloud IRC client remain ac..

  Attribution theory

How does culture impact leadership and can culture be seen as a constraint on leadership?

  Discuss the benefit of penetration testing

Discuss the benefit of penetration testing. Explain what that would entail in the organization and what the team could learn from the testing.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd