Evaluating Security Software Research Paper

Exclusively available on Available only on IvyPanda® Made by Human No AI

Introduction

The best security software’s meets all user requirements. The antivirus, firewall, and antispyware play a crucial role in securing the computer system. Choosing security software depends on the computer system attack.

Antivirus software

Viruses are malicious pieces of software that infect computers in many different ways. They are just similar to viruses that affect human beings. The viruses infect the computer by attacking legitimate files, hence making the computer system not to operate normally.

This is because the viruses spread from one computer to another, infecting files just the same way the viruses in human beings spread throughout the body, hence lowering body immunity. Once the computers get infected by the viruses they require antivirus software to clean and disinfect the computer system, thus making sure that they operate normally again.

At times, the damage may be so spread, that even the antivirus may not solve the problem, thus leading to reinstalling and reformatting (Laudon & Laudon, 2009). Antiviruses get mainly suited for small business and medium sized businesses which are under threat of virus attack on the computer networks. Some of the examples of antivirus include McAfee antivirus and Kaspersky antivirus.

Firewall software

Firewall is a device which is part of the network which prevents unauthorized access. This gets done through denying, permitting, decrypting, and encrypting network traffic within a security domain following set criteria and rules.

Firewall denies unauthorized internet users access to any of private networks over the internet. The firewall blocks all the messages that do not meet the security criteria. Firewall works as, dedicated software which inspects network traffic permitting and denying passage based on the set criteria or rules (Laudon & Laudon, 2009).

The firewall mainly prevents the private network intrusion by unauthorized internet users. Firewall gets suited for medium sized companies and large corporations that hold large customer information and on a network. For the firewall to function, it must be configured properly for its usefulness to be realized. Some of the antispyware software examples include; MacAfee internet security and Kaspersky internet security.

Antispyware software

Spyware program falls under malware. Malware describes a wide range of software written to damage the computer systems or for malicious purposes. They track data, about users, systems, and interfere with the computer settings. The Antispyware software discovers, blocks, or removes malware from the computer system. The antispyware, track data unidentified software, referred to as adware, to damaging software such as keyloggers (Laudon & Laudon, 2009).

For maximum protection of the computer system, the antispyware must be updated regularly. The antispyware get suited to medium-sized companies and the large corporations who operate over the internet or intranet. The antispyware software examples are Webroot secure anywhere antivirus and stozilla.

Costs of Products (Computerguru)

ProductVendorCosts
Antivirus SoftwareMcAfee antivirus$30 per year
Kaspersky antivirus$39.95 per year
Firewall SoftwareMcAfee internet security$39.99 per year
Kaspersky internet security$79.95 per year
Antispyware SoftwareWebroot secure anywhere antivirus$39.95 per year
StopZilla$39.95 per year

Table 1

Conclusion

In conclusion, choosing the best product depends on many factors i.e. level of protection, installation procedure, usability, updates, and support. Kaspersky antivirus and Kaspersky internet security would be the best product to choose as they meet the requirements of high level protection, easier to install, easier to use, and provide excellent customer support. Many users prefer StopZilla for antispyware for its ease of use and excellent support.

References

Laudon, K., & Laudon, J. (2009). Essentials of management information system (8th ed.).

Computerguru. Computer security guide. Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2018, December 27). Evaluating Security Software. https://ivypanda.com/essays/evaluating-security-software/

Work Cited

"Evaluating Security Software." IvyPanda, 27 Dec. 2018, ivypanda.com/essays/evaluating-security-software/.

References

IvyPanda. (2018) 'Evaluating Security Software'. 27 December.

References

IvyPanda. 2018. "Evaluating Security Software." December 27, 2018. https://ivypanda.com/essays/evaluating-security-software/.

1. IvyPanda. "Evaluating Security Software." December 27, 2018. https://ivypanda.com/essays/evaluating-security-software/.


Bibliography


IvyPanda. "Evaluating Security Software." December 27, 2018. https://ivypanda.com/essays/evaluating-security-software/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1