IT Security and anti-malware technology

GRABMYESSAY.COM OFFERS TO EVALUATE SAMPLES OF VARIOUS TYPES OF PAPERS
Junior (College 3rd year) ・IT & Technology ・APA ・4 Sources

When it comes to IT security, most businesses face the same challenges. Many organizations, including Microsoft, have a Risk Management and Compliance staff in charge of dealing with all system hazards. The tasks of this team at Microsoft include defining, monitoring, and correcting the risk posture of all Microsoft Managed Solutions (MMS) settings. The IT Security tools we will analyze are the result of original ideas combined with two years of expertise operating several Microsoft and third-party products.

When choosing security technology, it was critical to choose one that covered the three basic control types: detective, preventative, and corrective. The technology that also provides auditing and reporting was was needed. The security tools identified were as follows, anti-malware, network anomaly detection and desired configuration management. By taking advantage of these technologies, an IT security team can attain a reasonable balance between cost and efficiency.
This essay will describe the ideal function of each of the three technologies, pointing out some illustrations of their runtime usage.

The anti-malware technology

Malware resistance is important because it helps protect the computer against unexpected threats concealed either in malicious code form or other user actions. Currently, they are two types of software used to protect against malware; these are the antivirus and anti-spyware e.g. Windows Defender. These two softwares prevent, detect and correct diverse types of infection. An effective anti-malware solution requires to both monitor the system from time to time, and occasionally scan it. It should report both identified and unknown malware based on their typical risky behaviours.

Apart from the function mentioned above, anti-malware solutions also provide other services like looking out for legitimate looking emails, URL or electronic fax where this malware is passed as a file. Since preventing the system from malware infections, the system has a mechanism that automatically stops or prevents operations as well as carefully scanning user data to eliminate macro viruses that are hiding in user documents and have not yet caused any infection to the system. The system can be rendered ineffective without consistent updates. To stay in front of the latest threats, it is paramount to keep the system’s signature and removal systems up to date. However, prevention measure can't come at the expense of performance. If performance deteriorates, productivity will also be affected.

Network Anomaly Detection (NAD)

NAD observes common pathways, watches for important signs of suspicious behaviour then reports the information for remediation. A firewall is also included in this category. Wary behaviour can attract traffic or data that matches a particular pattern being sent through e-mail. Large organisation's networks will inevitably encounter an occasional malware incident despite the best efforts of IT management. The tool provides a timely system warning that can help expedite remediation. The NAD has tools that help protect data in regions concerned with regulatory compliance and data leaks. These tools include data monitoring capabilities and its ability to detect and stop sensitive information from being leaked. A good NAD should be able to adjust to the most recent set of threats, and sensitive data forms or else its usefulness will diminish. The NAD system should also catch plenty about the authentic irregularities to reduce the amount of false positive being stated.

Following some tuning, the system should be aware of and monitor for typical traffic usage patterns. This is essential because a change in the usage pattern may reveal new types of malware and other threats. In the overall NAD system, networking equipment plays a significant role; the solutions must process data from routers, switches and firewalls. The correlation engine then handles the NAD alerts. An interesting thing here is that the network anomaly detectors to be built into the host anti-malware software cast a net of preventive measures where all the computers included help watch for and theoretically stop attacks before they spread.

Desired Configuration Management

The major challenge that most IT departments face is keeping system configured appropriately. Keeping the system set has a lot of importance like, it eases management, ensures compliance, and locks down various forms of intrusion and promoting productivity. Many of these factors add to security. An efficient DCM system should perform a wide range of activities including configuring systems, analysing and reporting how close the configurations are to the ideal. The solution should also scan the network automatically to ensure that new regime is installed as required. A complete DCM solution must A DCM setup is a crucial part of a good network access protection (NAP) mechanism. This mechanism is important in that; the system can quickly verify that all connected systems are configured accordingly and block unknown or new systems until validated. Furthermore, DCM can search for weaknesses of configuration so that appropriate action can be taken on time

Conclusion

Anti-malware is essential since it helps to safeguard the systems against multiple daily threats. Network anomaly detection can do more than just detect host invasions and discover data leakage; it can now help to prevent next publicised network breach. Lastly, Desired Configuration Management will soon be a mainstay for monitoring and maintaining configurations. It is prudent that you have at least one for each of these three categories since no single vendor offers a single holistic solution that addresses each of the three areas. It is then important to select a product that will suit your specific needs.

Reference

Hsuan, W. T. (2016). Network Anomaly Detection.New York: McGraw-Hill Press.

John, B. (2016). “Four security technologies Every IT organisation must Have.” TechNet. Microsoft

Meyer, H. (2007). Microsoft establishes security zones. Computers and Security, 16(3): 215

Peter, H. (2004). Emerging Technologies.Practical Internet Security, 453-455.

Get a price
Academic level
Urgency
Pages *275 words
Total price
$ 0 .00
$ 0 .00

Prices that are easy on your wallet

Our experts are ready to do an excellent job starting at $14.99 per page

What Clients Say About Us
Our Customers Rated UsGreat
4.8
Out of 5 Based on 357 Reviews
I experienced difficult times trying to complete huge number of assignments to my university at the same time and you, guys, literally saved me. Everything was done in time and on the highest level! I really appreciate your help.
Edward,
Essay, History, 12 pages, 7 days, Master's
First time when I placed an order with you, I just lacked time to do all the homework and it was a lot going on in my family. But today I’m doing it sometimes just for fun – I really enjoy communicating with your Customer Support members and just letting myself being a bit lazy
Yuong Lo Mui,
Literature review, IT, 17 pages, 4 days, Master's
My GPA is 4.0 and I’ve always been doing everything myself, but there is a class which I was about to fail thus my GPA would decrease first time in so many years. I ordered few assignments to be completed with GrabMyEssay.com and you did a great job! Thanks to you I still remain one of the best students on campus.
Rosalinda,
Essay, Politics, 8 pages, 5 days, Junior
I am not used to such services and I usually write all the papers by myself. But this time I got in a very difficult situation and had to order my paper on this website. To my surprise it appeared to be quite good. Thank you, it is really nice service. Think I'll get back to you soon!
Jeremy,
Thesis, Management, 34 pages, 14 days, Master's
I am on my maternity leave now, so I spend a lot of time at home taking care of my little son. I’ve decided to get one more higher education degree while I’m spending so much time at home and applied for distance learning in one online college. But caring a baby takes even more time then I excepted so I’m the way too busy to write the complicated masters level research works, but GrabMyEssay.com is so-so-so cool! Thank you for that you exist! I don’t know what I would do without you all!
Karen,
Essay, Education, 15 pages, 8 days, Master's
I am studying and working at the same time and it is difficult to cope with university assignments as I am very tired after the work day. You service is a salvation for me as it helps to do everything on time. I am really happy about it. Wish you everything the best! Especially my lovely writer 109!
Desmond,
Coursework, Religion, 11 pages, 7 days, Master's

We at GrabMyEssay.com

work according to the General Data Protection Regulation (GDPR), which means you have the control over your personal data. All payment transactions go through a secure online payment system, thus your Billing information is not stored, saved or available to the Company in any way. Additionally, we guarantee confidentiality and anonymity all throughout your cooperation with our Company.

Try our service with 15% Discount for your first order!   Try our service with 15% Discount for your first order!   Try our service with 15% Discount for your first order!  

Order Now