Home > Free Essays > Tech & Engineering > Computer Science > Evaluating Security Software
Cite this

Evaluating Security Software Research Paper


Introduction

The best security software’s meets all user requirements. The antivirus, firewall, and antispyware play a crucial role in securing the computer system. Choosing security software depends on the computer system attack.

Antivirus software

Viruses are malicious pieces of software that infect computers in many different ways. They are just similar to viruses that affect human beings. The viruses infect the computer by attacking legitimate files, hence making the computer system not to operate normally.

This is because the viruses spread from one computer to another, infecting files just the same way the viruses in human beings spread throughout the body, hence lowering body immunity. Once the computers get infected by the viruses they require antivirus software to clean and disinfect the computer system, thus making sure that they operate normally again.

At times, the damage may be so spread, that even the antivirus may not solve the problem, thus leading to reinstalling and reformatting (Laudon & Laudon, 2009). Antiviruses get mainly suited for small business and medium sized businesses which are under threat of virus attack on the computer networks. Some of the examples of antivirus include McAfee antivirus and Kaspersky antivirus.

Firewall software

Firewall is a device which is part of the network which prevents unauthorized access. This gets done through denying, permitting, decrypting, and encrypting network traffic within a security domain following set criteria and rules.

Firewall denies unauthorized internet users access to any of private networks over the internet. The firewall blocks all the messages that do not meet the security criteria. Firewall works as, dedicated software which inspects network traffic permitting and denying passage based on the set criteria or rules (Laudon & Laudon, 2009).

The firewall mainly prevents the private network intrusion by unauthorized internet users. Firewall gets suited for medium sized companies and large corporations that hold large customer information and on a network. For the firewall to function, it must be configured properly for its usefulness to be realized. Some of the antispyware software examples include; MacAfee internet security and Kaspersky internet security.

Antispyware software

Spyware program falls under malware. Malware describes a wide range of software written to damage the computer systems or for malicious purposes. They track data, about users, systems, and interfere with the computer settings. The Antispyware software discovers, blocks, or removes malware from the computer system. The antispyware, track data unidentified software, referred to as adware, to damaging software such as keyloggers (Laudon & Laudon, 2009).

For maximum protection of the computer system, the antispyware must be updated regularly. The antispyware get suited to medium-sized companies and the large corporations who operate over the internet or intranet. The antispyware software examples are Webroot secure anywhere antivirus and stozilla.

Costs of Products (Computerguru)

Product Vendor Costs
Antivirus Software McAfee antivirus $30 per year
Kaspersky antivirus $39.95 per year
Firewall Software McAfee internet security $39.99 per year
Kaspersky internet security $79.95 per year
Antispyware Software Webroot secure anywhere antivirus $39.95 per year
StopZilla $39.95 per year

Table 1

Conclusion

In conclusion, choosing the best product depends on many factors i.e. level of protection, installation procedure, usability, updates, and support. Kaspersky antivirus and Kaspersky internet security would be the best product to choose as they meet the requirements of high level protection, easier to install, easier to use, and provide excellent customer support. Many users prefer StopZilla for antispyware for its ease of use and excellent support.

References

Laudon, K., & Laudon, J. (2009). Essentials of management information system (8th ed.).

Computerguru. Computer security guide. Web.

This research paper on Evaluating Security Software was written and submitted by your fellow student. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly.

Need a custom Research Paper sample written from scratch by
professional specifically for you?

Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar

301 certified writers online

GET WRITING HELP
Cite This paper

Select a citation style:

Reference

IvyPanda. (2019, June 18). Evaluating Security Software. Retrieved from https://ivypanda.com/essays/evaluating-security-software/

Work Cited

"Evaluating Security Software." IvyPanda, 18 June 2019, ivypanda.com/essays/evaluating-security-software/.

1. IvyPanda. "Evaluating Security Software." June 18, 2019. https://ivypanda.com/essays/evaluating-security-software/.


Bibliography


IvyPanda. "Evaluating Security Software." June 18, 2019. https://ivypanda.com/essays/evaluating-security-software/.

References

IvyPanda. 2019. "Evaluating Security Software." June 18, 2019. https://ivypanda.com/essays/evaluating-security-software/.

References

IvyPanda. (2019) 'Evaluating Security Software'. 18 June.

More related papers