Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

There are many different forms of malware that have been released on the interne

ID: 3598029 • Letter: T

Question

There are many different forms of malware that have been released on the internet. There are Viruses, Worms, Spyware, Root Kits, and other maladies that can infect computers and mobile devices. Every day there seems to more news about another threat to computer security. Because of the complexity of these infections, a single product from a vendor is rarely the best at catching all the potential malware. For this assignment, please research at least one product in each of the following distinct categories:

Antivirus software

Anti-spyware software

Root-Kit removal software.

Present your findings in a 2-3 page report addressing the following questions:

Describe the malware category. What specific malware does this malware removal software designed to protect against?

Describe the features of the selected software?

What types of computers, mobile devices, and operating systems is this software designed to work with?

What are the advantages of this software over the competition?

What are the disadvantages or specific features that are lacking in this malware removal tool?

The report must include a conclusion summarizing your findings. Do not copy and paste from the internet. Instead, provide APA style references to the original sources.

Explanation / Answer

1)Describe the malware category, what specific malware does this malware removal software designed to protect against?

Ans: Symantec Endpoint Protection combines several protections to proactively secure computer against known and unknown threats and network attacks.

Protect Against

Virus and Spyware Protection    - Managing scans on computer.

Proactive Threat Protection        - Managing SONAR on computer.

Network Threat Protection         - Managing firewall protection.

2) Describe the features of the selected Software (Symantec Endpoint Protection)?

Ans: Scanning Computer

Host integrity checks

Responding to alerts and Notifications

Managing Scan

Managing Firewall and Intrusion Prevention

Managing and troubleshooting clients

Managing network access control.

A) Auto-Protect: Auto-Protect scans files as well as certain types of email and email attachments.

Auto-Protect: File System Auto-Protect

Internet Email Auto-Protect

Microsoft Outlook Auto-Protect

Lotus Notes Auto-Protect

Network Threat Protection

Proactive Threat Protection

Responding to notifications

Early Launch anti-malware

Email Scanning

Acting On a Dection

Managing Detections: Auto-Protect includes the examines of files that you try to download through web browsers, text messaging clients, and other portals. Auto-Protect must be enabled for Download Insight to function.

Supported portals include Internet Explorer, Firefox, Microsoft Outlook, Outlook

Reputation Data: Symantec collects information about files from its global community of millions of users and its Global Intelligence Network. The collected information forms a reputation database that Symantec hosts. Symantec products leverage the information to protect client computers from new, targeted, and mutating threats. The data is sometimes referred to as being in the cloud since it does not reside on the client computer. The client computer must request or query the reputation database.

Symantec uses a technology it calls Insight to determine each file's level of risk or security rating.

Insight determines a file's security rating by examining the following characteristics of the file and its context:

B) Viruses and security risks

Symantec Endpoint Protection scans for both viruses and for security risks. Security risks include spyware, adware, rootkits, and other files that can put a computer or a network at risk.

C)Bloodhound

Bloodhound isolates and locates the logical regions of a file to detect a high percentage of unknown viruses. Bloodhound then analyses the program logic for virus-like behaviour.

D) Intrusion prevention works: Intrusion prevention is part of Network Threat Protection.

Intrusion prevention automatically detects and blocks network attacks and attacks on browsers. Intrusion prevention is the second layer of defence after the firewall to protect client computers. Intrusion prevention is sometimes called the intrusion prevention system (IPS).

3) What types of computers mobile devices and operating systems is this software designed to work with?

Ans:  Mobile Devices: All types of mobiles with Android OS Version and iOS supported Mobiles

Operating Systems: Windows XP 32-Bit, Windows Vista, Windows 7, Windows 8 and, Windows 10 Pro, Home or Enterprise.

Mac OS

Android

iOS

Computers: All types of Hardwares.

4)What are the Advantages of the software over the Competition?

Ans: 1) More Than Antivirus: Provide End-to-End Protection of laptops, desktops, Servers, Mobile devices and Web Infrastructures with more than traditional antivirus and anti-spyware.

2) Effective and Accurate antispam protection

3) Fast Protrction at the Web Gate Way

4) Rapid and Reliable Recovery

5) Increased Saving

6) Fast and Easy protection

7) Safeguard intellectual Property

8)Ensured Compliance.

5) What are the disadvantages or specific features that are lacking in tis malware removal tool?

Ans: 1) Symantec gives for its good-not great scores in some tests.

2) Not easy to apply policies for various components.

3) For the corrupted files, Scan disabled two infested test systems and requires a tech support intervention.

4) Failed the banking Trojan tests.

5) Active Directory:

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote