StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Security Systems - Essay Example

Cite this document
Summary
The essay "Network Security Systems" focuses on the critical analysis of the major issues in network security systems. To cope with the latest and upcoming raised open questions in terms of issues related to security, an antivirus improves performance at regular intervals…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.6% of users find it useful
Network Security Systems
Read Text Preview

Extract of sample "Network Security Systems"

Teacher Contents 0 Introduction 2 2.0 Kaspersky Network Security: 2 3.0 Norton Antivirus: 24.0 Comparison between Kaspersky and Norton 4 4.1 Cloud Technology 4 4.2 Suspicious Websites 5 4.3 Personal Information/ Credit Cards Password 6 4.4 File Real-Time Scanning 7 4.5 Boot Time Scanning 8 4.6 Updates 9 4.7 Exploit/Landscape Prevention 11 4.8 Operating System Requirements 14 4.9 Hardware Requirements 14 5.0 Conclusion 21 References 23 Network Security 1.0 Introduction To cope with the latest and upcoming raised open questions in terms of issues related to security, an antivirus improves the performance on regular intervals. This leads the antivirus up to date for handling the latest security threats. A large number of security concerns regarding cyber attacks that need to be handle properly and accurately are focused. This work is intended to compare the two internet security packages such as Kaspersky and Norton internet securities. 2.0 Kaspersky Network Security According to the survey conducted by Kaspersky Lab, 91% cyber attacks have been faced by the organizations during the period of last 12 months. Many cyber attacks are tackled through the Kaspersky antivirus. The security is dealt from many aspects by Kaspersky antivirus. Some of these aspects are as work regarding stealing of information, process of blocking for infrastructure, the stealing of money, destroying the repute of particular targeted organization. Many other techniques of intrusion are detected and explored for giving the enhanced security protection to the underlying system. (Kaspersky Lab ZAO, 2011). Kaspersky network security is the cloud based antivirus. It gathers data from the millions of its users’ systems around the world. Potential threats and malwares are detected and monitored. They are analyzed to defend the user’s systems from the dangerous actions. Kaspersky internet security 2013, with safe money, secures keyboard and others unique features; deploy new innovative technologies that defend PCs from sophisticated threats and viruses. (Kaspersky Internet Security, 2013) 3.0 Norton Antivirus: Norton antivirus was developed by Symantec Corporation in 1990. Norton internet security is an effective antivirus to deal with cyber attacks and provides best internet security. Dennis technology Labs in the year of 2013 performed a comparison that included the well known tools of internet security. Norton internet security tool is included among many other good security tools. The latest versions of all tools are included for the purpose of comparison. Norton provides protection to computer from the security threats and risks. The blocking process of malicious sites is performed on the basis of the repute of particular website and this is the good approach to handle such situation. Norton is considered among best tools that provide internet security due to the enhanced features it contain (Dennis Technology Labs, 2013). Norton safeguards the computers from viruses that spread from hard disk, floppy disk as well as travel across the network and through email attachments (Symantec Corporation, 2005). It uses the five patented layers technology cloud for protection against virus and security threats. These layers quickly and powerfully detect virus and spywares and eliminate them. Norton antivirus lets freely to download and share without passing through viruses (Norton Advisor, 2013). 4.0 Comparison between Kaspersky and Norton Evaluation Criteria Assessment of Kaspersky against the Criteria Assessment of Norton against the Criteria 4.1 Cloud Technology Through cloud technology, Kaspersky network security gathers data about latest virus and malware attacks. Global Security Rating (GSR) is collected from the cloud for the evaluation process and for many other features required by Kaspersky. The Kaspersky introduced Endpoint security 8 that is for windows environment. The corporate customers are getting benefit from the features provided by Kaspersky security tool. Along with the existing features of Kaspersky security system, improved features are provided to the business through the cloud technology. The cloud assistance gives the technology with protection, which is great feature of Kaspersky. It performs the white listing procedure for identifying threats in applications. The utilization of data from security networks is measured for Kaspersky. The differentiation is made among known and unknown files by Kaspersky; this improves the process for achieving high level of security. The cloud based anti-spam technology is also available to perform better protection from spam. (Kaspersky Lab ZAO, 2011) Five layers patented cloud detects the viruses and spywares. Anti spam, Anti-virus, email securities are the main features of Semantic that includes in the cloud technology. The global cloud platform performs much essential functionality like content filtering, anti malware. The email cloud technology is build upon huge intelligence system that protects the email services from threats. The cloud is more useful to provide services for the corporate business. This is also more beneficial for social networking. (Nahorney, 2013) 4.2 Suspicious Websites Kaspersky network security uses the real-time information from the cloud, which proactively detects fraudulent URLs using advanced anti-phishing technologies. (Kaspersky Internet Security, 2013) Improvement in SONER technology and threat live monitoring watch your system for suspicious behaviour. Spyware and viruses are scanned and then removed (Norton Advisor, 2013). 4.3 Personal Information/ Credit Cards Password Kaspersky network security uses Safe Money technology, which has additional layers of security to help you keep safe your personal information and credit card password from the cyber thieves. It checks the website is secure that you are visiting, and also offers a protected mode during online transactions. It also has a Secure Keyboard technology. Whenever you open a shopping or bank payment website and enter password within any page, secure keyboard protects your data from key-loggers because key-logger can access your credit card password or personal information when you enter from your keyboard. (Kespersky Internet Security, 2013). Unsafe websites, which steal personal information and can send spam emails by taking over your system; are blocked by browser protection. Norton antivirus also eliminates the online threats before they can harm your computer. 4.4 File Real-Time Scanning For real time protection of system Kaspersky works as guard. Real time scanning of files prevents the system from infections. It resides itself in RAM so that a real time protection is provided. Same process is done for incoming and outgoing emails all these are scanned on real time when the mail action is performed. Another good feature of real time scanning is real time network scanning that improves the protection. The real time threats available within the network are observed through functionality of real time scanning of network, these threats are monitored and preventive techniques are applied that ultimately protects the network. Now Kaspersky provides the real time scanning for the internet traffic through the HTTPS and HTTP etc. This real time scanning features can be turned on or off. (Kaspersky Lab ZAO, 2011) This is a process of real-time scanning of compressed files through Symantec. Symantec uses GRA.DAT for getting the work of real time scanning of files. Some configuration is made for real time scanning. For working with real time file scanning Norton keep up to date to compete with real time detection of viruses. The definition of files needs to be updated after installation that is highly recommended for perfect results (Symantec, 2012). For example, Norton 360 version 4 has all real times scanning of viruses but sometimes identifies the Absoft Pro Fortran as high risk. This incapability of Norton 360 version 4 has been reported. However, this problem has been solved in the configuration of Norton 360. 4.5 Boot Time Scanning The feature of Kaspersky is File Anti-Virus, which get started when system boot is started. The process of boot time scanning is activated along the system boot, so the work of scanning is functioning at the same time. The initial procedure of protection is made that ultimately encourage the enhanced security. It also resides in the RAM and does the function of scanning. The scanning gives the clear picture of systems current situation about threats and viruses. The scanning result provides the base for further actions on the viruses and protects system from huge loss. (Kaspersky Lab ZAO, 2011) The boot time scanning increase the boot time for start up the window. It took little more time to getting start to the widow due to the same time activation of boot time scanning. It works on each start of the system that makes time delay in the start process of system. The feature has positive and negative aspects in this regard. It could manage if the boot time scan is made as quick system scan that takes less time and provide security. It is similar to quick scan that quickly scan for any serious type of threat at the boot time and intimate the system for further action. It quickly provide the protection and prevention from serious effects, after loading the windows full system could scanned for detailed collection of possible threats. (Symantec Corporation, 2012) 4.6 Updates Kaspersky network security has cloud-assisted anti-span technology. It doesn’t require anti-span filter, it only uses information from the Kaspersky Network Security (Raiu and Emm, 2013). But this cloud based anti-span feature is only in some countries due to region and language-dependent. Because of usage of Kaspersky internet security at millions of computers around the world, globally the new and latest malware and viruses are detected. Real time monitored malwares track original threats from the user’s computers. Then they are blocked in their “in-the-wild” environment immediately after attacks. (Kaspersky Labs ZAO, 2009) This continuous monitoring and proactive reporting from the suspect systems adds the definition of latest viruses and malwares. So this updates the antivirus database and application module. Users can download updates manually or can set them automatically. (Kaspersky Labs ZAO, 2009). Norton antivirus has LiveUpdate™ which is separate software that can be installed with Symantec products. LiveUpdate™ runs in an interactive mode or express mode. Interactive mode users can decide which update to download and copy while express mode automatically download all updates and apply all the applicable and compatible updates.(The Norton Update Centre) . New definition files are retrieved by this LiveUpdate™ from the Symantec site. These new definition files are replaced by the old definition files in the antivirus directory. To update the antivirus, a modem or internet connection is always required. 4.7 Exploit/Landscape Prevention Technically exploits are not malwares. They can be a data, source of code use vulnerability in software and then bring about some intended behaviour. This intended behaviour is used to execute and download the payload which is a malware. The vulnerabilities are utilized by the exploits in a range of software and applications. Abode Acrobat Reader, Java, the Windows OS itself and Adobe Flash are the most targeted applications from the exploits. Now a day’s exploits are the primary method to getting malwares into computers. Kaspersky 2013 has an innovative Automatic Exploit Prevention (AEP) technology. Automatic Exploits Prevention (AEP) is an umbrella technology. It includes several behaviour based sub-technologies. Technologies’ effectiveness is that they block all unknown exploits as well as provide protection from zero-day vulnerabilities (Bilge and Dumitras, 2012). AEP has significant step toward more proactive maximum protection, in a combination of the multilayered security model of Kaspersky Lap. That’s why; these behaviour based technologies currently have patent-pending status and are unique to Kaspersky Lab (MRG Effitas, 2012). Kaspersky Network Security has 92% protection for exploits. (Abrams et al., 2013). Several organizations face a threat called landscape, which has a very harm, stealthy, targeted; financially attacks. It causes exploit vulnerabilities in systems (Symantec Corporation, 2007). Norton uses the Endpoint incorporates firewall, which is a rule-based firewall as well as an anti-malware technique. This firewall is based on a technology, which was developed by Sygate Technologies, who were purchased by Symantec Corporations. Symantec called it “Generic Exploit Blocking”. This technology has a proactively blocked-action at malwares from exploited un-patched vulnerabilities. (Symantec Corporation, 2011). Endpoint incorporations use the Symantec’s TrueScan technologies for analyzing the both “safe” and “negative” behaviour of the applications and detecting the unknown malwares within the applications (Ray, 2007). Symantec’s Deep sight honey pot sensors are also integrated. These sensors provide the threats advisories and to warn of the emerging threats and exploits (Norton Advisor, 2013). Symantec Endpoint Protection Technology delivers antispyware signature-based protection against threats, spywares and zero-day attacks more than world class. It has turnkey technologies to automatically analyze the behaviour of applications and block the suspicious unknown applications via network communication. It also includes administrative control features, which permits the administrators to deny high risk applications and devices. (Symantec Corporation, 2007). Symantec® Norton Antivirus provides 91% prevention against exploits and spywares. (Abram et al., 2013). 4.8 Operating System Requirements Microsoft® Windows XP Microsoft® Windows Vista Microsoft® Windows 7 Microsoft® Windows 8 Microsoft® Windows XP Microsoft® Windows Vista Microsoft® Windows 7 Microsoft® Windows 8, 8.1 4.9 Hardware Requirements Windows® XP - 800 MH Windows® Vista/7/8 - 1 GH 1 GB of available RAM Minimum 420 MB of available hard disk space Windows® XP - 300 MH Windows® Vista/7/8 - 1 GH 256 of available RAM 300 MB of available hard disk space Table 1: Comparison table between Kaspersky and Norton internet security Fig 1. Total accuracy rating (Dennis Technology Labs, 2013). Fig. 2 shows the working status of Norton Antivirus (boot time scanning). Fig.3 Symantec Endpoint Protection to the underlying system. Fig. 4: The Exploit Protection Rating (Abrams et al., 2013) Fig 5: Real Time Scanning of Norton Figure 6: Real time protection options for Kaspersky users Figure 7: Kaspersky Internet Security (boot time scanning) 5.0 Conclusion and Recommendation: Both antivirus tools are installed at a computer with specifications; Intel Dual-Core, Microsoft® Windows 7-Professional (32 bit), 2 GB RAM, 850 MB Graphic/Video Card, almost 130 GB contained data in Hard disk. Both provide protection against spywares, viruses, exploits and hackers; safeguard your personal data, information, credit card passwords etc. To some extent, it is right to say that both are perfect. For example, Kaspersky Network Security has Keystroke, SaveMoney and Automatically Exploits Prevention and unique behaviour based technologies etc; as well as Norton Antivirus has SONAR improvement, LiveUpdate™ software and Endpoint’s Generic Exploit Block and TrueScan technologies. These are the some initial findings come from this comparison; further detailed scan could also be applied for getting more understanding about security tools that are monitored. In future, both Norton and Kaspersky need to be used with updated versions for network security. Norton and Kaspersky owner companies must consider the security concerns which networks face today. Kaspersky and Norton antivirus must be updates to block the maximum number of malicious files. References; Abrams R., Ghimire D., and Smith J. (2013). Corporate AV/EPP Comparative Analysis, Exploit Protection, From http://www.mcafee.com/us/resources/reports/rp-nss-labs-corporate-exploit-protection.pdf [Accessed on 4/6/2014]. Bilge A., and Dumitras T. (2012). “An Empirical Study of Zero-Day Attacks in the Real World”, ACM, P.P. 833-844. Dennis Technology Labs. (2013). Home Anti-Virus Protection. Available from: https://www4.symantec.com/mktginfo/whitepaper/GL_WP_07242013_DennisTechLabsReport-HomeAntiVirusProtection-OcttoDec2013_dai308901_ctaNA.pdf [Accessed: 4/6/2014] Kaspersky Lab ZAO (2011), Kaspersky Security Network, Available From http://www.kaspersky.com/images/KES8_Whitepaper_4_KSN.pdf [Accessed on 4/6/2014]. Kaspersky Lab ZAO (2009). Kaspersky Antivirus: For The Windows Workstations, Available From http://www.kaspersky.com/downloads/pdf/kav-win-wks_60r2_eng.pdf [Accessed on 4/6/2014]. Kaspersky Internet Security (2013), Internet security – keeping you safe from all threats, available from http://www.farnell.com/datasheets/1655632.pdf [accessed on 9/11/2016]. Kaspersky Lab ZAO (2013). Kaspersky Anti Virus, Available from http://usa.kaspersky.com/sites/usa.kaspersky.com/files/userguideAVEN.pdf [Accessed on 4/4/2014.]. MRG Effitas (2012). Comparative Assessment of Kaspersky Internet Security 2013, August 2012, available from http://www.mrg-effitas.com/wp-content/uploads/2012/06/MRG-Effitas-Exploit-Prevention-Test1.pdf [Accessed on 9/11/2016]. Norton Advisor (2013). Basic protection for your PC, Available from http://www.nortonadvisor.com/products-norton/norton-antivirus-2013.html [accessed on 4/6/2014]. Nahorney, B. (2013). Symantec Intelligence Report: January 2013. Available from: https://www.symantec.com/content/en/us/enterprise/other_resources/b-intelligence_report_01-2013.en-us.pdf [Accessed on 4/4/2014] Ray R. (2007). How Symantec Is Changing to Better Meet Small Business Needs, from http://www.smallbiztechnology.com/archive/2007/12/how-symantec-is-changing-to-be.html/ [Accessed on 4/6/2014]. Raiu C. and Emm D. (2013). Kaspersky Lab Global Research and Analysis Team (Great). Kaspersky Security Bulletin Available from: http://media.kaspersky.com/pdf/KSB_2013_EN.pdf [Accessed: 4/6/2014] Symantec Corporation. (2012). The Norton Update Center: Symantec Corporation, Available from http://updatecenter.norton.com/ [accessed on 4/6/2014]. Symantec Corporation. (2011). Data Sheet: Endpoint Security, from http://eval.symantec.com/mktginfo/enterprise/fact_sheets/b-endpoint_protection_DS_12836807-7.en-us.pdf [Accessed on 4/6/2014]. Symantec Corporation (2007) A Unified, Proactive Approach To Endpoint Security, from www.federalnewsradio.com/pdfs/EndpointSecurity-White Paper.pdf [Accessed on 4/6/2014]. Symantec Corporation (2005). Symantec™ Client Security Client Guide, Available from ftp://ftp.symantec.com/public/english_us_canada/products/symantec_client_security/3.0/manuals/scsclnt.pdf [accessed on 9/11/2016]. Symantec Corporation. (2012). How to configure scanning of compressed files in Symantec AntiVirus for Linux. Available from: http://www.symantec.com/business/support/index?page=content&id=TECH102882 [Accessed on 4/4/2014] Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network Security Essay Example | Topics and Well Written Essays - 2000 words - 1”, n.d.)
Network Security Essay Example | Topics and Well Written Essays - 2000 words - 1. Retrieved from https://studentshare.org/information-technology/1637444-network-security
(Network Security Essay Example | Topics and Well Written Essays - 2000 Words - 1)
Network Security Essay Example | Topics and Well Written Essays - 2000 Words - 1. https://studentshare.org/information-technology/1637444-network-security.
“Network Security Essay Example | Topics and Well Written Essays - 2000 Words - 1”, n.d. https://studentshare.org/information-technology/1637444-network-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Security Systems

Fiber Optic Security Systems

he main research objective is to conduct a case study on the fiber optic Network Security Systems.... he researcher will conduct a case study on the fiber optic Network Security Systems.... The paper "Fiber Optic security systems" discusses that the author will study the different physical intrusions on the fiber optic cable with a view of proposing a hybrid system that can detect and alleviate most of the physical and nonphysical attacks.... FIBER OPTIC security systems College: Table of contents Table of contents 2 Introduction 3 1 Introduction 3 ...
8 Pages (2000 words) Thesis Proposal

Software Development, QA, Anti-Piracy

Even while conceding to the importance of automated, computer-mediated security systems, Todorov (2007) contends that the importance of physically securing sensitive sites within a company cannot be overlooked.... Information constitutes the core asset of any corporate entity and as information is being increasingly stored on digital media, it is imperative that companies institute security.... Referring to both theory and practice, this essay will investigate the strategies companies utilize for the design and implementation of their security policies....
4 Pages (1000 words) Essay

The Business Technology Management of HSBC Bank

ncorporation of high end Network Security Systems with advanced Encrypron software. ... Further additional Network Security Systems could also be installed which could eliminate the risk involved in the online business operations.... This would require more efficient operational systems which include robust security systems to protect the transfer of private information.... security systems to protect the transactions through the internet....
10 Pages (2500 words) Research Paper

Fiber optic is reliable with networking. I mean” how is it been secure”

? However, this method is easily detectable by most Network Security Systems.... In fact, with millions of fiber optic cables stretching worldwide, it has been the backbone of the Internet and telecommunications systems. ... In fact, with millions of fiber optic cables stretching worldwide, it has been the backbone of the Internet and telecommunications systems.... The first of which is the Radio Frequency Testing systems or the RFTS, which checks multiple dark fibers for route integrity before they are lit....
2 Pages (500 words) Essay

Firewalls and Intrusion Detection Systems

Firewall protects Network Security Systems from access from unauthorized sources.... Louis IT Company (2014) is of the assumption that security systems have become a mandatory requirement considering the vulnerable nature of IT systems.... Louis IT Company (2014) is of the assumption that security systems have become a mandatory requirement considering the vulnerable nature of IT systems.... Moreover, companies use the systems to monitor their existing security systems....
2 Pages (500 words) Assignment

Network Security Attack Methodologies

This essay "Network Security Attack Methodologies" is about the current computer Network Security Systems which are faced by numerous attacks, thus creating the need for robust means of protecting the systems against threats and potential attacks.... Traditionally, the attack on Network Security Systems was purely a matter of fun, where the computer systems attackers and hackers were doing it for the fun of enjoying their prowess in managing to tamper and penetrate through established Network Security Systems....
7 Pages (1750 words) Essay

The Training Company CERT

This paper ''The Training Company CERT'' tells that The CERT Company is in the business of training individuals to deal effectively with information systems and Network Security Systems.... The Training Company CERT The CERT Company is in the business of training individuals to deal effectively with information systems and Network Security Systems.... Applying these aspects of systems to CERT, it may be noted that the company offers different training modules, hence each functions as a separate unit, but they are all components of a coordinated whole, because each of these training modules is concerned overall with information and security systems and there could be elements that two or more training modules may have in common with each other. ...
4 Pages (1000 words) Essay

Information Security

Most of the inventions being made in the Network Security Systems are quite advanced and have managed to solve some of the current issues.... This affects the Network Security Systems and has negative impacts. ... Some of the security systems are also unable to detect some levels of intrusions which might be low.... orman, T, 2007, Integrated security systems Design, NY: Butterworth.... ikely direction of network security over the next few years 12 ...
13 Pages (3250 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us