Tuesday, April 16, 2019

Firewalls and Anti-Virus Programs Essay Example for Free

Firewalls and Anti-Virus Programs Essayelectronic Computers argon machines that ar designed to make the jobs of macrocosm easier. The rise of industrialization made it inevitable for military personnel to develop such a mechanical object which whitethorn lighten tasks that consume a can of clock time and thus, need painstaking c atomic number 18. Humans have been successful in this undertaking, but unfortunately, as humans are susceptible to errors, so do are these machines (Copplin). Computers no matter how mechanical they are, have limitations.some times these limitations are made apparent by humans unintentionally, but thither are overly times when humans design things that are meant to rival the advantage of their own work. As they have created useful programs, they besides made non only inutile but also utterly destructive programs. They created viruses or worms that partake electronic computers, in a delegacy that a disease might affect a person. The solution for computer illnesses comes in the form of firewalls and anti-virus software. These are programs that are created to counter turn of events the effects of viruses. They serve to both shield and resist the entry and artillery unit of measurement when a breach has taken place.This shield function involves filtering of all files coming into the computer while the artillery may include quarantine activities to avoid the spread of any acquired virus (Barrios). As viruses are programs that are meant to reproduce and damage the computer system through and through multiplication, anti-virus programs are designed to act like healers. They are programs that actively search and destroy viruses or malicious programs in champions computer. They scan newly downloaded files to assure that there is no entry of infection in the system. Anti-virus programs may be updated as often as the computer owner wishes.This update will enable the program to familiarize itself to developments of new viruses that are spreading or improvement of old ones thus, the gage of the system is continuously familiarized and improved to better suit the need of the system (Barrios). there are many available anti-virus programs in the market. any(prenominal) are installed through CD and other(a)s are downloadable without fee from the lucre. Two of the most famous anti-virus programs are the Norton anti-virus program and the Mcafee anti-virus program. They were proven by numerous computer users as very effective softwares.They are also affordable and convenient as they offer regular upgrades for the programs on the internet. Like any other programs, there are also disadvantages of anti-virus programs. Anti-virus programs are reactive programs that are designed to respond to the newly developed viruses or threats. This may be considered as a benefit for an immediate cure may be devised and administered right away as response, but there are also facts that point that this nature of anti-virus programs may actually be considered a drawback. Because of this nature, these openhearteds of programs are prone to false positive results.Since the upgrades are automated, there is a high probability for mistakes. There are anti-virus softwares that take a while before detecting new threats on the net. The shortest time that an anti-virus program may track a threat is three days after it was released on the net. at presents researchers are still in the process of improving this and gradually reducing it to a littler number (Hruska) With such a loophole, computer users may resort to another security option. Other than anti-virus programs, they may also opt to install firewalls in their one-on-one or collective networks.The anti-virus programs serve as the artillery while the firewalls are the shield that re put up in defense of the important files salvage in the computer hardware. Firewalls are programs designed to protect private networks from unauthorized entry. It prevents other users to access and call down files or study without permission from a main source that is connected to the internet. Huge companies who consider not permitted extraction of information as a cause for concern may utilize firewalls to secure their files (Ranum). Some firewalls are designed to do one or two things.Some installed firewalls protect a ain or a companys ingrained network from unwanted interchange from public internet. There are also some that may limit the access from the hosts of the corporate network to public function available on the internet. Still, there are other firewall setup that may support the use of private IP addresses for corporate or internal networks while at the same time share one conjunction to the public internet (Barbish). As according to the above-mentioned functions, there are many advantages in installing a firewall in ones computer especially within a corporate network.However, like the anti-virus software, firewalls also have disadva ntages. Since there are some firewalls that cannot function as the other does, it makes it unsurmountable to have all the necessary security measures by installing only a firewall. It is not also probable to install more than two firewall programs in ones computer. In addition, firewalls do not function the way anti-virus softwares do (Caruso) Given that, firewalls are known to work best with an anti-virus software. Where the firewall fails, the anti-virus software continues to work.They are mutually necessary for each other in order to have a tight security for ones personal computer. Anything that passes the firewall may easily be traced by the anti-virus program the moment it does internal scanning of files in the hard drive. While anti-virus programs are designed to protect a single unit of hard drive, the firewall works well as a barrier from malicious programs and hackers for networked computers (Ranum n,p). It also acts as a screen that keeps the private network safe from ma licious users in the internet. Some users get confused on what should be applied to their computers.While it is already quite depressing for single unit users, large corporations are boggled by this dilemma. If in any miscue the threat gets past both the anti-virus program and the firewall, all information that is classified goes out to the public. This is why some large corporations would rather have no internet connection than risk their security (Ranum). Researchers suggested that since one of the two security programs cannot function as the other, it may be effective to use them together. First is to install a firewall that will keep all threats out.Second is to put in an effective anti-virus program which can trace new viruses on the net the fastest among all other anti-virus software. Then install another firewall program for better measures in case both initial programs were breached. This way, the offend users in the public internet may be kept out as well as the malicious programs that may destroy the whole system of the computer (Cheswick 90). It may then be cerebrate that the desire of man to make work lighter have lead to the advent of computers and other proficient advancements.However, due to the unquenched desire to improve things, man has also created things that can damage or destroy what has been created. This way man can once again build something that may respond to the destruction that has been invented. In the case of computers, the things that destroy are the viruses designed by some programmers, while the things that respond to the damages are the anti-virus programs and firewalls. The firewall protects a personal or corporate network from any breach by unauthorized person who has internet access.It protects classified information from spreading without permission and also prevents spread of malicious programs that may enter through the public network. On the other hand, the anti-virus acts as support in cases where the threat has a lready entered the system. The other is the precaution while the other is the cleaner. These two computer innovations compliment each other in keeping the files and the inbuilt personal or corporate computer system safe and well guarded from any kind of malicious threats. Works Cited Barbish, Joseph J. Firewalls. 2009. FreeBSD.26 January 2009 http//www. freebsd. org/doc/en/books/handbook/firewalls. htmlFIREWALLS-INTRO. Barrios, Barclay. Antivirus Programs. 2008. Rutgers Writing Program. 26 January 2009 http//66. 102. 1. 104/ scholarly person? hl=tllr=q=cache_zUTrdU13U8Jgetit. rutgers. edu/tutorials/viruses/media/virus. doc+meaning+of+anti+virus+programs. Caruso, Ronald D. MD. Personal Computer Security. 2003. intercommunicate Graphics. 26 January 2009 http//radiographics. rsnajnls. org/cgi/content/full/23/5/1329. Cheswick, William R. Internet Security. Massachusetts Addison-Wesley, 1996. Copplin, John.An Illustrated History of Computers. 2002. Computer light Lab. 26 January 200 9 http//www. computersciencelab. com/ComputerHistory/History. htm. Hruska, Joel. Antivirus Programs Unreliable During Critical Coverage Gap. 30 November 2008. Ars Techinica. 26 January 2009 http//arstechnica. com/news. ars/post/20081130-av-programs-unreliable-during- critical-coverage-gap. html. Ranum, Marcus J. Thinking almost Firewalls. 1993. Trusted Information Systems, Inc. 26 January 2009 http//www. vtcif. telstra. com. au/pub/docs/security/ThinkingFirewalls/ThinkingFirewalls. html.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.