Question: Question 3 ( Marks: 2 5 ) Theme End - user security software scans computers for pieces of malicious code, quarantines this code, and then

Question 3(Marks: 25)
Theme End-user security software scans computers for pieces of malicious code,
quarantines this code, and then removes it from the machine. Security
programs can even detect and remove malicious code hidden in Master Boot
Record (MBR) and are designed to encrypt or wipe data from a computers
hard drive. Electronic security protocols also focus on real-time malware
detection. Many use heuristic and behavioral analysis to monitor the behavior
of a program and its code to defend against viruses or Trojans that change their shape with each execution (polymorphic and metamorphic malware). Security
programs can confine potentially malicious programs to a virtual bubble
separate from a user's network to analyze their behavior and learn how to
better detect new infections. Security programs continue to evolve new
defenses as cyber-security professionals identify new threats and new ways to
combat them. To make the most of end-user security software, employees
need to be educated about how to use it. Crucially, keeping it running and
updating it frequently ensures that it can protect users against the latest cyber
threats.
Q.3.1 Explain why is the top-down approach to information security superior to the
bottom-up approach?
(6)
Q.3.2 Explain how has computer security evolved into modern information security? (10)
Q.3.3 What are the three components of the C.I.A. triad? In your answer, also explain
what are these components used for?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!