Protecting Microsoft windows against malware

ABSTRACT

Innovation in technology through computer systems has increased efficiency in information systems as well as in developing programs relevant to computer usage. Software programs are necessary to ensure that computers operate with ease and effectiveness. However, not all software programs are usually to bring about efficiency since some malware directed to attack the network. Others are detrimental when adware and spyware are involved, it can cause havoc on the data under attack since the attacker gains control of the computer.  It is essential to protect networks from malware to avoid loss and damage to computer programs and data.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

INTRODUCTION

Innovation in technology has provided efficiency and effectiveness in accomplishing of tasks through the use of computers systems. The success has not been without challenges which have cost individuals and companies’ monies and loss of vital information. One major contributor is malware which affects the computer windows. Computer malware is a malicious software which damages computer systems and occurs in the form of viruses, Trojans, adware, spyware or worms (Bettany and Halsey, 2017). It instructs unwanted actions to the files of the operating system, installed programs and windows registry on a computer. The paper will cover ways through which Microsoft windows should be protected from malware before critical loss or damage occurs.

Stored data is essential for the organization and very convenient when stored in computer systems. Accessibility of such data in this manner is easy and fast to retrieve especially when old data is involved. Malware that may attack such data may slow down the computer, crash the system, use the computer as a server to broadcast malware or completely wipe out the information if there are no backup systems in place thence leading to the loss. Windows malware attack occurs in various ways which include spam emails/files, infected removable drives such as USB flash drives, and compromised web pages.  It is detrimental for crucial information that regards a national activity or security purpose. When malware protection is in place the risk of losing data is minimal. Also, the risk of further attack is minimal. Therefore, protecting windows from computer malware using a Microsoft antivirus program and firewall software ensures real-time protection as well as detection of threats (Prayudi& Riadi, 2015). Preventing spyware from invading one’s computer is vital in a bid to keeps the computer and information safe.

 

LITERATURE REVIEW

Prayudi& Riadi researched into computer protection against malware whereby, they have classifiedComputer malware and viruses malware into four threats (Prayudi& Riadi, 2015). These include spam, bugs, denial of services and application software. According to Prayudi& Riadi (2015), techniques to wage war against malicious software covers a broad scope which includes threats, viruses, worms, and spyware. Adequate protection can be achieved through detection, detaining and destruction of malware (Prayudi& Riadi, 2015). Important to note that, there is no absolute security against malware from computer windows. When a determined attacker with sufficient resources poises a computer, the malware takes charge to use the computer as a server. In this regard, necessary government information is a target by a spy. These prompts the need to protect computer systems even when absolute security is not guaranteed.

The old fashioned ways are also useful to create relative computer security against malware (Hussein & Khalid,2016). The risk management should go yonder to access the risks one poses in addition to those raised by others. At this point, one may take measures concerning the dangers at hand. On the internet, everybody is your neighbor regardless of their distance, and one may find you to be negligent in terms of computer security on the internet. Therefore, your computer server could be used to attack others on the same site. At a glance, the costs of malware would be accessible according to the number of attacks reported. However, the real prices, according to the research in Computer viruses and malware, are when the computer is reduced to molten slag. The actual time and resources that are sued by technical teams to track malware while they could be productive in other areas are lost productivity.

The survey indicates that the number of competing for malware increases in the wake of innovating antiviruses. Ideally, there is no ideal antivirus for all type threats since not all malware cases are reported. Moreover, different antivirus products employ different techniques while combating malware and threats. Therefore protection requires the use of various antivirus products and installing a firewall in a computer.

Research in an article on What is malware and how can we prevent it? by Symantec indicates that malicious software gains access to a network without the knowledge of the owner (Hussein & Khalid,2016). It is important to note that malware is a type of software; however, with an aim to bring destruction. From the survey, malware used to conduct internet crime is on the rise hence the increased awareness and demand from antivirus products (Hussein & Khalid,2016). Certain aspects make a computer prone to malware attacks which include failure in the operating system, computers on the same internet using a similar OS, or allowing too many permissions. Email attachments are usually the grease threats that contain attachments in the form of malware. Moreover, it is critical to stay away from suspicious sites, installing and maintain a quality antivirus program.

The research conducted by Hussein & Khalid, (2016) provides a clear illustration of how absoluteness about security on computer protection is not guaranteed. Furthermore, protection starts with understanding and choosing to secure the computer first. Malware is software on its aspect; hence each type poses a threat of its kind, therefore, requires firewall and maintaining an antivirus program on a computer. Allowing a large number of permissions on a computer can risk malware attack. Besides, the number of computers using operating systems violates the security of networks. Therefore in protecting the network, the number of machines using one OS and the number of permissions be minimized for security purposes. Knowing the type of malware that has attacked a computer is essential to ensure that the cleaning of files is done with an updated version of the antivirus program. Malware damage costs a lot more than could be accounted for since time and resources are at a loss in the process. The number of reported cases involving malware attack of different kinds is not entirely made hence becomes challenging to combat using antivirus programs.

DISCUSSION

Protection of computers from malware is critical to maintaining information and computer programs. Every computer handler is at risk of facing malware attack when they do not have an antivirus program in place (Hussein & Khalid,2016). With a firewall and antivirus, threats of malware are detected and notifications to take caution indicated on a computer. Therefore, it is essential to protect networks from malicious software. According to a survey from computer viruses and malware, protecting systems from malware is critical. There are different programs which have different techniques in protecting the computer from threats of attack. Hence having an updated and maintained antivirus is essential in ensuring your network is secure. Not all attachments that occur in emails are genuine; hence scrutiny of the latter is vital in ensuring one protects their computers.

Machines are useful in searching for information on the internet whereby some websites and external links are not all genuine. One operator may take a chance on using the computer to create and spread malware; hence, caution is essential. It would lead to significant damage when the external link could be a worm or in other cases ransomware. An individual gets bullied too through malware from links on a computer. Therefore, there is a need to protect networks from malware through the use of firewalls and antiviruses which are up to date and properly maintained (Hussein & Khalid,2016).

CONCLUSION

Protecting computers against malware is an essential aspect of managing computer files and programs. Malware cause damage to computer programs which lead to loss and suffering of the machine at great lengths of destruction.  Antiviruses are essential programs that every individual with a laptop should install, maintain and update with an additional firewall to combat malware. Opening on files should be done cautiously to avoid linking to a malicious site that will become destructive or pose a threat to the computer programs. Understanding how computer malware occurs can help in protecting an individual against opening email files that may contain attachments of malicious software.

It is important to note the vulnerability of using external flash drives without scanning. An automatic scanning technique when using flash drives should be applied to ensure the computer is secure. A computer program handler has to reduce the number of permissions on a laptop. It helps to monitor threats that may occur when an individual operates computers at the same time. When all the above survey is put into consideration, protecting networks from malware will be done adequately although not entirely. The consequences are reduced attacks and detection of threats from malware when antivirus is updated and maintained together with a firewall in place.

 

References

Prayudi, Y., & Riadi, I. (2015). Implementation of malware analysis using static and dynamic      analysis method. International Journal of Computer Applications, 117(6).

Hussein, N. H., & Khalid, A. (2016). A survey of cloud computing security challenges and            solutions. International Journal of Computer Science and Information Security, 14(1), 52.

Bettany, A., & Halsey, M. (2017). Windows virus and malware troubleshooting.

 

Do you need high quality Custom Essay Writing Services?

Custom Essay writing Service