StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Virus Detection Software - Research Paper Example

Cite this document
Summary
This is a research paper, which precisely presents appropriate discussions on the issues pertaining to virus detection software from a wide perspective. In terms of discussions, the paper starts by giving a discussion on an architecture of modern computer networks…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94% of users find it useful
Virus Detection Software
Read Text Preview

Extract of sample "Virus Detection Software"

 Virus Detection Software Introduction In definition, viruses refer to specific programs that people deliberately make, to get in the way of system documentation and functionality, therefore, doing away with important information stored in the system for different uses. Virus detection softwares play critical role in enhancing the safety of computer systems and by so doing safeguarding information contained. This is a creative paper, which precisely presents appropriate discussions on the issues pertaining to virus detection software from a wide perspective. In terms of discussions, the paper starts by giving a discussion on architecture of modern computer networks. It then addresses network security, reliability, finally network configuration, and maintenance.  Architecture of Modern Computer Networks A computer network, commonly known as a network, is a compilation of hardware apparatus and computers interconnected by channels of communication that have the same opinion to sharing of information and resources. In that case, one procedure in one device is capable to send or receive data to and from at any rate, and a procedure resides in a remote mechanism, then the two systems are considered to be networked (David, 2006, P.56). In essence, people categorize networks depending on a variety of traits. For instance, the medium employed to transfer the data, protocols of communications used, topology, scale, and organizational scope. Such mechanisms define the architecture of modern computer networks. Network architecture denotes the design of the network, comprising of the software, hardware, communication protocols, connectivity and form of transmission, for example wireless or wired. According to research, categorizations of different forms of networks exist according to the regions covered such as MAN, LAN and WAN (Debashis, 2003, P. 38). There seem to be loads of communication protocols employed in the technology of networking. Consequently, it is considerate to know concerning the modern network architecture as networks play an extremely important position in today's humanity. In other definition, network architecture denotes the structural layout and logic of the network consisting of equipments of transmission, communication protocols, software, and infrastructure broadcast of statistics and connectivity between components. There are four diverse network topologies. These include ring network, star network, mesh network, and bus network. Such diverse topologies occur in different fashion defined as Local Area Network, Metropolitan Area Network and Wide Area Network (Igor, 2010, P. 43). With reference to statistics, the network extends over a LAN by one kilometer where else metropolitan by one hundred kilometers. It is considerate to note that communications protocols describe the regulations and data formats for swapping information in a network of a computer, thus providing the foundation for network programming. The most common known protocols of communication comprise Ethernet and Internet Protocol Suite. Ethernet is a hardware that is ever-present in Local Area Networks (Rob, 2006, P. 37). Internet Protocol Suite on the other hand describes a set of protocols essential for internetworking that is for communication of data between numerous networks. In simple words, computer networking denotes the connection of two or more computers, thereby allowing them to share resources easily. Networking is easily done between computers in a business, a home, across a business, and even globally (Debashis, 2003, P. 49). Architecture of modern computer networks allows the connection of two or more computers comprising printers and other devices. The profits of networking are substantial, even on a network of only three computers. As far as computer networking is concerned, there exists no true statement that this is an incidence of benefits experienced being far better than the sum of the parts. The phrase application in the circumstance of computers is first used to signify a collection, of software instructions and information, functioning as a system, to attain a particular output. Therefore, network application architecture is the symbol of the application's data, software, and output parts (Igor, 2010, P. 51). The word network in the perspective of computers stands to signify a gathering of services and devices, operating as a system to offer communication abilities for group, person, and application users of the network. With this understanding, network architecture is the representation of the network's services, devices, and users, their associations, and the device, service, user, and connection characteristics. One of the major bases to center on styles for network-based applications is because constituent interactions can be the leading issue in shaping performance of user-perception and efficiency of network (David, 2006, P.64). In view of the fact that the architectural approach influences the occurrence of those interactions, assortment of a suitable architectural technique can make the diversity between achievement and malfunction in the operation of a modern computer network. The performance of modern computer networks are bound first by the application requirements, then by the selected interaction method, followed by the accomplished architecture, and lastly by the achievement of each component. In simple words, software cannot keep away from the essential cost of achieving the application requirements. Network performance actions depict some traits of communication. Throughput defines the speed at which information, comprising both communication overhead and application data is move between components (Rob, 2006, P. 46). Overhead exists in two parts, the original arrangement overhead and per-interaction overhead, a peculiarity, which is functional for identifying connectors that can share arrangement overhead across numerous interactions. Methods affect network performance by their pressure on the figure of interactions per user achievement and the granularity of information elements. User-perceived performance varies from network performance in that the performance of an act is calculated in terms of its impact on the user in face of an application to a certain extent than the speed at which the network moves in order (Igor, 2010, P. 64). Architecture is established at numerous levels in software systems. For instance, the most important difference between software architectures and network-based architectures in broad is that communication between mechanisms is limited to message passing or the corresponding of message transmitting if a more competent device can be chosen at run-time based on the position of components. An interesting observation in relation to architecture of modern computer networks is that the most excellent application performance is acquired by not employing the network. This implies that the most competent architectural styles for the modern computers are those that can successfully reduce use of the network in the events when it is promising to do so (Stephen, 2010, P. 49). This is well achieved through recycle of prior interactions, lessening of the incidence of network interactions in correspondence to user proceedings, or by eliminating the requirement for some interactions by shifting the dispensation of information closer to the basis of the data. The impact of a variety of performance issues is related to the extent of sharing for the submission and architecture. The significance of a method under local circumstances may turn out as drawbacks when faced with global situations. Therefore, the properties of a method should be framed corresponding to the communication distance: in a single procedure, across procedures on a solitary host, in a local-area network, or distributed across a wide-area network (Debashis, 2003, P. 59). Extra concerns turn out being apparent when interactions across a wide area network, where a single company is concerned, are compared to interactions across the World Wide Web, comprising of several trust boundaries. Scalability defines the aptitude of the architecture to hold up large records of components, or interactions in the middle of components, in an active configuration. Scalability is improved by making simpler components, by sharing services across numerous components, and by controlling configurations and interactions as a reason of monitoring (David, 2006, P.73). Styles control these factors by shaping the location of request state, the degree of distribution, and the combination between mechanisms. What’s more, scalability is in addition, affected by the incidence of interactions, whether the weight on a constituent is, shared consistently over time or happens in peaks, if an interaction needs a guaranteed liberation or a best effort, if a demand involves asynchronous or synchronous handling, and if the surrounding is controlled or anarchic. The most important ways through which architectural styles persuade simplicity is by applying the code of division of concerns to the portion of operation in components. If functionality can be owned in a way that the individual constituents are considerably less multifaceted, then they will be easier to be aware of and put into practice (Igor, 2010, P. 73). Likewise, this separation eases the chore of analysis regarding the general architecture. Network Security and Reliability All types of technological developments emerge with certain issues, biased on both the positive side and on the negative as well. The subject pertaining to network security and reliability has brought different complications and in that way being able to improve human interaction and business operations (Rob, 2006, P. 62). Nevertheless, the matter of insecurity has also being experienced and which has been in require of hesitant analysis in the direction of curbing all issue of insecurity which comes as a result. The concern of network security and reliability is something that has been given the essential concern and establishment by nations as well as by organizations. Following this kind of development, the network security has been competent to alter the concern of security groups over the past several years. In addition, security groups or functions focus more on threat management and closer alignment with the business, and at times they can focus more on making sure the commoditized controls above function correctly (Stephen, 2010, P. 68). From a broad perspective, it is quite clear that security and reliability are two major word used quite frequently in our organizations. Many people view the two terms as opposing forces. However, it is worth noting that security should be considered a feature of reliability. In the event where a control network is compromised following deprived security policy, the network reliability is decreased. If an invader can execute INL’s favorite assault and launch commands to a PLC that interrupts the grid, the reliability definitely decreases. That is been the case, almost all security threats should be considered as threats to the systems reliability (Igor, 2010, P. 81). A practical step in the direction of risk management calls for a comprehensive move toward that considers various factors: network infrastructure and kind of business and operating environment. The subject of network security and reliability has turned out to a new type of development, which has been capable of effectively altering the concern of security in most of firms today. Technically speaking, network security and reliability have great impacts on any given association and that is the reason the same should be adequately addressed. That is been the case, security groups have been approved whose job is in checking any type of intrusions and which in one way or the other might end up compromising the business performance and putting the operations of such a business or organization at risk (Horton, 2003, P. 54). For the past few years, the security blueprint has been capable to alter so that the concern does as well slot in the network security and reliability provision. With reference to that, this has turned out as the new security provision through which technological acquaintance and tools have to be involved and therefore been competent to change the form of performance. In any given business, there are several operations which are carried out through connected networks and in that way requiring security and reliability (David, 2006, P.97). By enhancing improved security and reliability, it becomes easy for the entire organization to be safe from losing important files or information stored in the systems. As more breakthroughs that are technical go on with being invented, comparable infiltrations shall be predictable and the motive the security blueprint that was largely more of physical security has been on the alteration. This has consequently been capable of incorporating the use of commoditized controls that should function properly other engaging in other types of risks management systems. Over the years, the in progress subject of network security and reliability has been competent to incorporate innovative modalities in the nature of providing security that is predictable (Debashis, 2003, P. 71). For these years, the greatest concern has been in management of risk operations, which are caused by accidents and physical intrusions among other occurrences that should be effectively analyzed and monitored as time goes by thus being competent to maintain them at bay. Presently, the innovative form of security and management has been emphasized and aligned closely in ensuring that there has been the sufficient provision of security with the networks. This has been the key player in the operations of business, and as a result, there has been the call for having comparable approaches which center entirely on the type of security, reliability, and integrity which is preserved with the connections of the network (Horton, 2003, P. 59). These commoditized manage is critical and its correct function makes sure the best of presentation with the business organization. Conversely, at the same time as the area of security has been, largely, privileged following the present developments in technology; the other concentration has in addition been maintained with management of risk. These have been applicable to the type of business engaged in by the organization and the likely threats, which might be predictable from either side (Igor, 2010, P. 92). Essentially, the above-discussed practices are vital in making sure there has been the supply of the best of security in any given organization, which has been intended at accomplishing some level of income and business ambitions. Network security and reliability tends to differ with risk management depending on certain modalities, which are incorporated, and how they are operated. In explanation, risks are types of occurrences, which might occur following malfunction of a system, or because of some sort of threat, which is known to be present (Rob, 2006, P. 88). This implies that, any procedure of risk management is a way of ensuring that some predictable occurrences have been solved before happening. For example, smokers within an organization are a true risk, which can in due course cause fire. This is accordingly a suggestion that one can be able to observe a risk that might cause tragedy in the business, and thus organization is the procedural analysis and auditing of such risks after which they result to being solved before they happen to cause losses on the business. On the other hand, network security and reliability is more of integrity in the computer systems within a certain principle in ensuring that everything is in control, and any sort of intrusion is dealt with earlier than it is competent to cause any somewhat damage (Stephen, 2010, P. 92). Network security is maintained all through in ensuring that everything runs in order. Network security is thus a provision, which once has been implemented, should be employed for as long as a business or organization runs. Network Configuration and Maintenance Network configuration management commonly abbreviated as NCM is the procedure of maintaining and organizing information on the subject of all the components of a system network. In the event where a network requires repair, expansion, modification or upgrading, the administrator consults to the network configuration database of management in order to determine the best guiding principle (Debashis, 2003, P. 94). Such database comprises the network addresses and locations of all hardware devices, additionally information concerning the versions, programs and updates installed in network systems. Research justifies that network configuration tools can be either vendor-neutral or vendor-specific. In this case, vendor-neutral tools are specifically intended for networks containing programs and hardware from numerous suppliers. On the other hand, vendor-specific tools more often than not work only with the products of a distinct corporation, and can provide improved performance in networks where that seller controls (Horton, 2003, P. 62). There are several benefits of network configuration and maintenance and this comprise; minimizing downtime, archiving the particulars of every network configuration changes, reducing configuration errors, optimizing security of network, rolling back alterations to a preceding configuration is outcomes are not satisfying, and streamlining the procedures of repair, upgrading, expansion, and maintenance. Network management therefore entails several things such as methods, activities, tools, and procedures that in one way or the other pertain to the administration, operation, maintenance, and supplying of systems which are networked. In this case, operation largely deals with maintaining the network up and ensuring it is running smoothly. Operations comprise monitoring the network with the intention to mark problems with immediate effect, perfectly before users are affected (Igor, 2010, P. 103). Administration largely deals with maintaining track of resources in the network and the manner in which they are assigned. Consequently, it comprises all the housekeeping that is essential to make the network under efficient control. Network maintenance on the other hand is concerned with carrying out repairs and upgrades for instance, the time when equipment should be replaced, the instance when a router requires a patch for an operating system picture, when a switch is added to a network (David, 2006, P.105). In addition, maintenance as well engages preventive and corrective measures in order to manage the run of network for example regulating device configuration parameters. Finally, provisioning entirely focuses on configuring resources in the whole network to support a given service. For instance, this might comprise developing a network so that a new client can take delivery of voice service. Conclusion With reference to the above discussions, any piece of technological improvement comes in useful and therefore being competent to support performance of organizations. The aspect of technological developments has enabled different organizations to accept new techniques and materials, which have as well led to an upgrading in the sort of security being provided. That is been the case, any particular business organization should be competent to take on such technologies and be relevant to means of security and risk management operations. These applications are imperative in ensuring that beneficial business involvement has been accomplished and eventually leading to business growth and expansion. Bibliography David, S 2006, Foundations of computer security, Washington DC, USA: DIANE Publishing. Debashis, S 2003, networking infrustructure for pervasive computing: enabling technologies, New Jersey: Prentice Hall. Igor, K 2010, computer network security, New York: New Press. Rob, W 2006, computer systems architecture: a networking approach, New Jersey: Prentice Hall Stephen, D, 2010, Systems architecture, New York: John Wiley and Sons. Horton, M, & 2003, Network security portable reference. Oxford: Oxford University Press. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Virus Detection Software Research Paper Example | Topics and Well Written Essays - 3500 words”, n.d.)
Virus Detection Software Research Paper Example | Topics and Well Written Essays - 3500 words. Retrieved from https://studentshare.org/information-technology/1765119-virus-detection-software
(Virus Detection Software Research Paper Example | Topics and Well Written Essays - 3500 Words)
Virus Detection Software Research Paper Example | Topics and Well Written Essays - 3500 Words. https://studentshare.org/information-technology/1765119-virus-detection-software.
“Virus Detection Software Research Paper Example | Topics and Well Written Essays - 3500 Words”, n.d. https://studentshare.org/information-technology/1765119-virus-detection-software.
  • Cited: 0 times

CHECK THESE SAMPLES OF Virus Detection Software

Spywares as Viruses

A cost in terms of the risk of losing the sensitive data to the hackers… Spyware is the software that transfers the vital information surreptitiously from the user's system to any other intended system.... Even the convenience and hassle free internet banking and online shopping have cost associated with them....
7 Pages (1750 words) Essay

Intrusion Detection System

Other enquiries that will be necessary are that- whether the anti-virus software installed had been updated or contained non-updated virus definitions.... Intrusion detection SystemIntroduction It is very important to keep track of all possible intrusions that a sensitive network might encounter (thesis statement).... This can be done by keeping a strict check on proper configuration, management and monitoring of the firewall settings, intrusion detection system's logs and anti-virus upgrades....
2 Pages (500 words) Assignment

Importance of a PC Security

McAfee Utilities McAfee is devoted to ensure our PC security as well as aimed to offer a variety of free McAfee tools to help us in our software development methodologies.... Conficker detection Tool 1.... onficker detection Tool 1.... Conficker detection Tool 1.... Figure 1Conficker detection Tool, Image Source: http://blog.... For effective tracking and detection of possible issues regarding virus and Trojan Horse attacks High quality and fast detection processI have used for my system security scanning....
3 Pages (750 words) Essay

Data Networks, IP, and the Internet

ifference between firewall and Anti-VirusFirewall can either be hardware or software which prevents connections from malicious users while Anti-Virus finds executable programs such as Trojans which would rather damage files in the computer.... ifference between Firewall and VirusA firewall prevents the computer from network attacks and limits the exposure while a computer Virus is referred as a software program that can cause immense harm to the computer because of its ability of reproducing itself....
3 Pages (750 words) Essay

The Love Bug Virus

Both the computer viruses and worms belong to a category of software called malware.... In this scenario, a Malware or malicious code (malcode) refers to malicious software.... In addition, it is a piece of code or software that is purposely developed or written to harm, break, interrupt, steal, or on the whole mete out some other “terrible” or unlawful act on data, information, hosts, or networks.... Additionally, a computer virus is a kind of malware that can vary in harshness and damaging a system from causing slightly disturbing effects to destructing software programs or data and resulting denial-of-service (DoS) attacks....
2 Pages (500 words) Case Study

Case Project Assignemnt

The basic features of Kaspersky Antivirus that are different from other vendors' products include fast virus detection, high-speed scanning, and proactive defense component.... Kaspersky Antivirus is also the best in terms of preventing threats from Comparing Antivirus Software al affiliation Comparing Antivirus Software The basic features of Kaspersky Antivirus that are differentfrom other vendors' products include fast virus detection, high-speed scanning, and proactive defense component....
2 Pages (500 words) Assignment

Network Analysers Issues

Network analysers do detect not only viral software, but also test anti-malware programs.... After detection of suspicious software, network analysers notify a user through messages that pop up in the screen.... The tool has automatic detection programs that keep history of a network system.... Such messages could be in the form of warnings upon detection of any threats.... Network analysers equally pinpoint vulnerabilities in the anti-virus programs....
1 Pages (250 words) Essay

Flash Wrapper for ServePDF

hellip; Flash wrapper for ServePDF is online software mostly used commercially with offering services in the production of Adobe PDF documents received from the client's data software.... The software hosts the implications of the host client by using a number of technologies like Sun Java and Adobe Flex.... The software is a java iText library porting, as well as a PDF library that is complete for action script allowing for the reading and creation of PDF documents received from any SWF files that are running....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us