Essays24.com - Term Papers and Free Essays
Search

Anti-Virus Software

Essay by   •  January 11, 2011  •  986 Words (4 Pages)  •  1,326 Views

Essay Preview: Anti-Virus Software

Report this essay
Page 1 of 4

Introduction

This report will outline that it would be useful for our company to subsidize free distribution of anti-virus software to our home users. There will be analysis of the connection between the company's network and home users and how this will help our company's problems with viruses. I will discuss the other issues besides providing free software to home users that affect the network security of our firm. Additionally, I will describe the roles of top management/non-IT management, IT professionals, and end-users in maintaining network security. Finally, I will bring out the role that Robert Vamosi envisions for corporate customers relative to free antivirus software based on his article, “Antivirus software must be free, Here’s why.”

Analysis

The threat of viruses and other malicious software and the possibility of them getting on our company’s network does not have to originate within the company’s walls. A home/end user may unknowingly introduce this threat into the network. Viruses such as the Netsky (and variants of it) can open up a “backdoor.” A transmission control protocol port (such as port 6789/ TCP SMC-HTTPS or port 80) can leave the backdoor ajar. TCP (the TCP/IP or Internet Protocol) ensures that the message is sent in its entirety. A port is the way in and out of a computer or a network device like a router or switch. Hackers or black hats can scan for open ports and plant malicious program codes like those that can steal passwords and confidential information, such as a user's PIN and credit card numbers when he does Internet banking on that PC. Or, the hacker can turn that PC into a spamming machine. Another malicious virus: The Bagle.j virus which spoofs and spams. It can impersonate your e-mail address and mass spam, sending out unauthorized e-mail on your behalf. The dark side of this multi-havoc virus: It comes with a .zip file that is password-protected. The password sits in the body of the text. People are less suspecting of a .zip file than an .exe attachment. Once they open the e-mail, the virus is set free to cause havoc (Tan, 2004). Preventing and discovering this threat through easily accessible antivirus software can save our network

Besides providing users with antivirus software, there is more we can do in the form of education. Respondents to a 2004 Ernst & Young Global Information Security Survey cited lack of security awareness by end users as the top barrier to achieving the required level of security (Leung, 2004). Security experts say organizations should foster a pervasive security-aware corporate culture. We should decide on the risk level our company is willing to take and instill in the workforce the importance of being security-savvy and of using security technologies to protect against attacks. Training should be given to end users to help them recognize potential security breaches and that in a security culture, regularly changing passwords, not opening suspicious e-mail attachments and other basic precautions are second nature (Leung, 2004). A training program can be as easy as a computer based tutorial with a focus on how to prevent and what they should do once threats have been discovered.

Security of our network is not just the responsibility of the IT department. It takes the vigilance of everyone within the firm and out based on the threat mentioned above. Each of us at every level must make the appropriate steps; top management has to lead the charge with direction, IT professionals have to inform and keep informed themselves on preventing and detecting, end users must be armed with the information and adopt a good “security” lifestyle. If we don’t, the cost can be tremendous. According to the 2004 DTI Information Security Breaches Survey done in the UK, the following

...

...

Download as:   txt (6.1 Kb)   pdf (91.2 Kb)   docx (10.8 Kb)  
Continue for 3 more pages »
Only available on Essays24.com