Preview

THE INTERNET PROJECT

Powerful Essays
Open Document
Open Document
2052 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
THE INTERNET PROJECT
THE INTERNET PROJECT

Module Code 5N1611

TABLE OF CONTENTS
INTRODUCTION 3
ANTI-VIRUS PROTECTION 3
CONCLUSION 5
AUTHENTICATION 5
ENCRYPTIONS 5
FIREWALLS 6
CONCLUSION 12
BIBLIOGRAPHY 12 INTRODUCTION
Anti-virus protection

Antivirus software is essential protection for any business or home users that is connected to internet. This software needs to be applied not only to single personal computers but to a network as a whole. This should ensure that viruses carried by floppy or zip disks or any other removable media are stopped. Additionally, antivirus software should be able to scan incoming mail.
I used search engine Google to find and choose antivirus program. I found two programs to buy and one for free. The first one I was looked at was Norton™ Internet Security. The main thing what I am looking for was, antivirus program which do not slow computer work, cheap one and most recommended of professionals. The Norton™ Internet Security has:
• Antivirus
• Antispyware
• Browser protection
• 5 patented layers of protection
• Facebook protection
• Parental controls
• Advanced online identity theft protection
An advantage is that Norton is a leader in antivirus software and stops most viruses before they have a chance to harm your computer. Parental control is another advantage which would be suitable to me, as I have children. Norton Antivirus is considered to be practically faultless and provides you with fast, easy-to-use and effective protection without disturbing the other programs that are running on your computer. It is provided with the latest features like the smart proactive detection that has the capability to detect and block most known and emerging dangers and threats within a short period of time.

With the help of this fast and light software, you get to protect your computer and browse the high speed internet without your system getting slowed down because of the scanning process of



Bibliography:  http://www.vodafone.ie/  https://secure.eircom.net/fibre/?gclid=CNubl_6yjLoCFY8q2wodukMAnQ  http://www.cablesurf.com/  https://www.google.ie/?gws_rd=cr&ei=Oa9WUpW3COyh7AbWw4FY#q=sky+broadband  http://buy-static.norton.com/norton/ps/2up_ie_en_nis360_br_nf_nis.html?om_sem_cid=hho_sem_ic:ie:ggl:en:e|kw0000001837|31639862711|c&country=IE  http://windows.microsoft.com/en-IE/windows/security-essentials-download

You May Also Find These Documents Helpful

  • Good Essays

    Mat 540 Quiz

    • 3391 Words
    • 14 Pages

    | Antivirus software can detect and eliminate viruses that are trying to enter your system. Answer…

    • 3391 Words
    • 14 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 33

    • 595 Words
    • 3 Pages

    If you have a more than one computer connects in home. It is important to protect every computer. You should have a hardware firewall (such as router) to protect your network, but you should also use software firewall on each computer to prevent the spread of virus your network.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Anti-virus software is used to prevent, detect and remove a range of malware, including computer viruses, worms, trojan horses, adware and spyware.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Nt1310 Unit 3

    • 541 Words
    • 3 Pages

    A firewall is a network security hardware and/or software program that is used to control the flow of traffic into and out of a network or computer. When a computer has firewall protection the flow of data is monitored and filtered. Also, firewalls are barriers to unauthorized access; for example, when a person or program requests access to a network it must first get authorization and verification from the firewall and user. Furthermore, firewalls help protect networks from hackers, viruses, and other malicious digital security risks. Finally, a firewall ensures that our computers are not sending dangerous data to outside networks.…

    • 541 Words
    • 3 Pages
    Good Essays
  • Better Essays

    McAfee, an Intel company, has been an industry leader for antivirus software to protect personal computers for many years. The company has expanded its services from protecting computers to also protecting cellular browsing as well, the software can be used on the iPhone, and Android phones.…

    • 1587 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Week3 Hacking

    • 391 Words
    • 2 Pages

    Workstation and Desktop devices are prone to viruses, malware, and malicious software, especially if the user surfs the Internet and World Wide Web. Given that users connect to the Internet and World Wide Web, what security countermeasures can organization implement to help mitigate the risk caused from viruses, malware, and malicious software?…

    • 391 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Cis 105 Security Systems

    • 465 Words
    • 2 Pages

    The all-in-one computer security systems are effective in a way that it protects one’s computer from all the threats previously mentioned, spyware, viruses, and identity theft all-in-one package without the user having to worry about anything. An included feature is filter protection for any incoming and outgoing email for any virus and spam threats. Another threat that these all-in-one computer security systems are effective is they help protect one’s computer from hackers, and come with a built-in firewall that helps keeps all these threats away. These security systems are automatically scan for any threats and notify the user of any threats are detected. These all-in-one security systems are automatically updated without the user having to worry whether or not they have the latest information. An included feature that the Norton 360 comes with that are beneficial for individual users is the identify protection that securely keeps login and personal information safe, “guards against…

    • 465 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The information in this paper will investigate the elements involved in computer security. Protecting information today requires more than just locking a door or filing cabinet. With data being stored electronically, it is vital that important information be protected from prying eyes. There are many different methods for protecting information that is stored on computers. These methods include everything from password and usernames to biometric devices. There are also software solutions that are used, including antivirus and anti-malware software along with firewalls. All of this is to accomplish the desired…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    * All computers that are connected to the network must have the standard supported anti-virus software installed and scheduled to run at regular intervals. In addition, the anti-virus software and the virus definition files must be kept up-to-date.…

    • 1030 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Quarterly profit-and-loss report that shows a breakdown of revenue and cost for each separate activity…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Starting with the first action, installing firewalls and anti-virus, the article "Firewalls" goes in-depth about how these are important here "While firewalls filter and limit incoming transmission of data that tries to access the system, anti-virus software looks at how the data affects your system". This shows why it's critical to have both a firewall and anti-virus software installed. If you install only a firewall then as soon as its been breached, whoever invaded your system has access to all of your files and personal info with no anti-virus to stop them. It's the same for firewalls, if you are without one, the virus can access your device much easier than a device with both anti-virus and a firewall installed. It's very important to have both installed for maximum security to deter hackers, scammers, and spy…

    • 601 Words
    • 3 Pages
    Good Essays
  • Best Essays

    It checks for connection speed and static on the line to ascertain the best route for the packet to take to reach its destination. Acting as a gateway between networks, routers make sure that data is delivered to its proper destination. The second purpose of a router is to ensure that data does not go where it is not permitted. By acting as a virtual network traffic cop, routers keep data and specifically large files from being distributed to all machines on a network, which could potentially cripple the network (Hill,…

    • 4393 Words
    • 18 Pages
    Best Essays
  • Good Essays

    Bitdefender Total Security is a new antimalware suite which offers extra security and protection against all kinds of malware. It is an award-winning software, which protects every…

    • 797 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Who doesn’t have a desktop or laptop computer at home? Or at least who haven’t used one at school, work, or library? I believe that about 90% of Americans nowadays know how to use one. The main reason people buys a computer is because they want to have access to internet. We all know internet is a powerful tool to everybody; in it we are able to find almost anything we want to. Another use of the internet is to download files like music, videos, images, documents, games, etc., but sometimes these files are corrupt or have malware attached to them that could harm our computers. Taking the correct steps to download files from the internet could prevent a disaster.…

    • 986 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    I Want to Study

    • 305 Words
    • 2 Pages

    Manage and protect the system, data, and information while working on the Internet including scanning all incoming emails, email attachments, and files downloaded from Web-based sources; firewall,…

    • 305 Words
    • 2 Pages
    Satisfactory Essays