Antivirus Essay

2075 words - 9 pages

The free distribution of anti-virus software to home users is not useful for our companies to subsidize as the author Robert Vamosi proposed in his article "Antivirus Software Must Be Free. The reason is, in nowadays there are several efficient options to network security as well as the predicament of user prudence and neglect in regards to this matter of using free anti-virus security. Providing this service is not cost effective for our organization and can undoubtedly be aided by our finance department as this is in effect a finance question in regards to the matter of which would cost more; the subsidizing of free distribution of anti-virus software to home users or the cost of similarly ...view middle of the document...

Vamosi goes on to proclaim that "There are currently hundreds of antivirus products, developed by small companies that you can download for free. But you get what you pay for." He answers his own concern with this declaration, "But you get what you pay for". Soon afterward he makes another point where he claims, "I've received many letters from readers who've downloaded a free application only to find out that it didn't protect them from the latest virus or worm" He also said "The big guys are also quicker to provide signature file updates for the latest worms to all of their customers…". There is a rationale why bigger and more successful anti-virus software organizations are capable to rapidly supply solutions and protections against new threats.The rationale behind this is because they are lucrative and can employ their capital to build up new software and protections as well as preserve a skilled staff that can recognize, define, and protect against the latest discovered malware threats on a daily basis. Small anti-virus organizations that provide their product for free forfeit revenue from operations in order to get exposure. This is the reason why they have not found or protected against the most up-to-date coercion in their free applications.Vamosi makes a bold statement in his article where he challenges company clients of anti-virus software organizations. He states that "Since antivirus apps are essentially useless without signature updates and unless you're using the latest version, I say:Let the antivirus companies' corporate clients pay for the software and the annual signature-file subscriptions, and let the home users download both for free." Vamosi has fundamentally asserted business decisions here for capitalist anti-virus software organizations and their corporate customers. Both of these business decisions have elevated potential to be unfavorable to the effectiveness and fabrication of private companies. Anti-virus companies have to function in a proficient and lucrative style like other capitalist organization.They also need profits and funds to continually adapt to the shifting threats of information technology and computer systems. For the organization's clients, subsidizing the free allocation of anti-virus software to home users may cost more than using other methods of network security. At the end of Vamosi's article he asks the question "Would you still pay for antivirus software if a dependable, free option were accessible?" My respond is, of course, not, who would?Connection between company network and home users:Every computer system that can enter our network through an open channel can connect to our organization network. Any system that can find a hole or entrance into our software is an impending trespasser and a threat for viruses. Any home user who accesses our network has the potential to contaminate our network with unsafe malware. By subsidizing the free distribution of anti-virus software to our home...

Other Essays Like Antivirus

How To Make Your Computer Safe

849 words - 4 pages : Antivirus SoftwareIt is vital to keep your antivirus software up to date in order to provide the most complete protectionBackups:The information held on your computer may be irreplaceable. Regularly backing up your data will ensure that you have more than one copy.The RisksGet started ...Hardware failure (for example, hard drive failure is a frequent occurrence).Accidental file deletion.Theft.Fire, flood, accidental damage.Catastrophic virus or spyware

Risk Management Essay

611 words - 3 pages 1. Analyze and explain each of the threat/vulnerability pairs and their likelihood of occurrence: THREAT VULNERABILITY HARMFUL EVENT OR LOSS Fire Lack of fire detection and suppression equipment Can be a total loss to business Hurricane, Earthquake, Tornado Location Can be a total loss to business Malware Lack of antivirus software Outdated definitions Infection (impact of loss determined by payload of malware) Equipment Failure Data not

Security Policy Outline

604 words - 3 pages . Require passwords to meet complexity standards. c) Enable automatic antivirus scans d) Enable content filtering 3. LAN Domain a) Ensure wiring closets and data centers are properly secured, with access being limited to associates and vendors who are required to be in them. b) Enable second-level identity checks for access to sensitive systems and programs c) Define a strict software vulnerability policy requiring quick

Best Ever

1112 words - 5 pages when new materials and changes are to be preceded amongst this company. Scope Salix Pharmaceuticals security policy will keep the company running for years if followed by the procedures. Following the sub policies will lead to a successful company that will be ran smooth and processed like no other company. Antivirus, encryption, passwords, and backups will protect this company like no other before. Purpose Salix purpose for the security

Csit 161 Lab1

688 words - 3 pages Solutions or preventative actions: A. Enable content filtering and antivirus scanning at the entry and exit points of the Internet. Enable workstation auto-scans and auto-quarantine for unknown file types. B. Apply file transfer monitoring, scanning, and alarming for unknown file types and sources. C. Place employee on probation, review acceptable use policy (AUP) and employee manual, and discuss status during performance reviews. D

Accounting Data

2948 words - 12 pages the protection of assets using nonphysical means, such as the use of firewall or Antivirus software. The expenditure of logical security is not as high as the physical security. In summary, both physical security and logical security are important measures to protect people or departments’ information. A single measure could not maintain the security comprehensively. Two measures should bring into effort together, hence information could be under

Deploying An Operation System Within Your Organization

1275 words - 6 pages specialists—are familiar with Windows. However, Windows is wide known for its minuses, one being that many viruses are written for it and second, it is known for many security flaws that are present within it. Thus, Windows is not as secure without an antivirus. Antivirus products provide protection against viruses, Trojan horses and other types of malware, such as spyware. The use and deployment of an antivirus through an organization will cost a

Project Part 1 Nt2580

1207 words - 5 pages make sure that they have the credentials to login and also to provide the information to the system of what level of access they can have. For example, a guest is not going to have access to the same information as a basic employee, but also a basic employee is not going to have access to highly classified information that supervisors and administration have. This is also the domain where antivirus software should be run to protect the network

Mcdonaldization of Society

985 words - 4 pages The McDonaldization of society cannot be generally viewed as a good thing or a bad thing. It depends more on each individual’s perspective of how things work best. A technically oriented person may thing McDonaldization is a good thing. In the technical world, every individual problem has a definitive solution. If your computer gets a virus then you install a antivirus. If your keyboard is broken then you replace it. Most new

Multi-Layer Security Plan

842 words - 4 pages opportunity to use it. Second, while we are constantly working to strengthen the underlying security of computers are also always getting faster. It's possible to guess your password through sheer persistent computer effort. With current technology, this takes months if you have a strong password. If you change your password every six months, any brute force attack that takes longer is ineffective.  Use content filtering and antivirus scanning at

Sec280 Week2

824 words - 4 pages eliminate some of the vulnerabilities that can affect the network. The third step in addressing network vulnerabilities involves layering security systems on the network. The firewall creates a shell around the network and allows specific types of authorized traffic to pass through as it identifies and blocks unauthorized traffic. However, a firewall can only protect against known issues, we have added an antivirus program which scans information

Related Papers

Botnet Zombies Essay

644 words - 3 pages . Having antivirus or other security software on your computer can help reduce the risk of being compromised by botnets but hackers are constantly developing new ways to circumvent these measures. Updating antivirus software regularly is one way to minimize the likelihood that computers can be used for malicious purposes (“What are Bots, Botnets and Zombies?” n.d.). The impact of botnets on business functions can be profound. Not only can computers

Defining And Designing A Network Essay

614 words - 3 pages no other options), create a diagram of your network, showing the physical layout of the system. 3. Create a hardware and software inventory. Your instructor has blank forms you can use, or you can create or find your own. Your inventory should include at least the following: * Operating systems * Server operating systems * Office applications * Antivirus software * Computers, servers, and peripherals * Network connectivity

Death Penalty Essay

1373 words - 6 pages naming schemes for other rogue applications. Charles Coley IS4560 Project Part 6: Defense Plan to Prevent Attacks To begin, Install an antivirus program. Installing an antivirus program and keeping it up-to-date can help defend your computer against viruses. Antivirus programs scan for viruses trying to get into your email, operating system, or files. New viruses can appear daily, so check the antivirus manufacturer's website

Lab 3 Assessment Questions Is3350 Essay

665 words - 3 pages regularly update antivirus software. 8. What was the end result of the attack and security breach to CardSystems and its valuation? • The FTC presented a decision order on CardSystems Solutions and its predecessors as a result of negligent and violation of the FTC Act 15, U.S.C. 41-58. 9. What are the possible consequences associated with the data loss? • Identity theft, credit/debit card info stolen, and loss of funds. 10. Who do you