Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 3 ( Marks: 2 5 ) Theme End - user security software scans computers for pieces of malicious code, quarantines this code, and then

Question 3(Marks: 25)
Theme End-user security software scans computers for pieces of malicious code,
quarantines this code, and then removes it from the machine. Security
programs can even detect and remove malicious code hidden in Master Boot
Record (MBR) and are designed to encrypt or wipe data from a computers
hard drive. Electronic security protocols also focus on real-time malware
detection. Many use heuristic and behavioral analysis to monitor the behavior
of a program and its code to defend against viruses or Trojans that change their shape with each execution (polymorphic and metamorphic malware). Security
programs can confine potentially malicious programs to a virtual bubble
separate from a user's network to analyze their behavior and learn how to
better detect new infections. Security programs continue to evolve new
defenses as cyber-security professionals identify new threats and new ways to
combat them. To make the most of end-user security software, employees
need to be educated about how to use it. Crucially, keeping it running and
updating it frequently ensures that it can protect users against the latest cyber
threats.
Q.3.1 Explain why is the top-down approach to information security superior to the
bottom-up approach?
(6)
Q.3.2 Explain how has computer security evolved into modern information security? (10)
Q.3.3 What are the three components of the C.I.A. triad? In your answer, also explain
what are these components used for?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Advances In Databases And Information Systems Uropean Conference Adbis 2020 Lyon France August 25 27 2020 Proceedings Lncs 12245

Authors: Jerome Darmont ,Boris Novikov ,Robert Wrembel

1st Edition

3030548317, 978-3030548315

More Books

Students also viewed these Databases questions

Question

Does it use a maximum of two typefaces or fonts?

Answered: 1 week ago