What av or malware software do you use
Course:- Software Engineering
Reference No.:- EM13860567

Assignment Help
Expertsmind Rated 4.9 / 5 based on 47215 reviews.
Review Site
Assignment Help >> Software Engineering

Because of the recent DDoS attack on Rutgers computers - taking down their internet, I thought it might be a good idea to discuss safety and security online.

What is a DDoS attack?

DDoS is the common abbreviation for a Distributed Denial of Service attack which is what probably happened at Rutgers. Think of it like what happened during SuperStorm Sandy and nobody could get through on their cell phones or for the people that get stuck every day in traffic trying to get through the Lincoln Tunnel. There are too many people trying to access the same thing at the same time.
Here is a short video that explains it further:


What happened at Rutgers?

If you aren't up on the story, here is a good summary:


What should you be aware of?

The US government has a website called "OnGuard Online" with some useful tips and videos for protecting yourself online. Here is the main website page:


Chances are unless you are running a business, you probably won't be a target of a DDoS attack. However, if you don't update your computer, run anti-virus and mal-ware programs, you might become part of the botnet without you knowing it.

What can you do?

Run and update anti-virus programs on your computers, tablets and cell phones. yes, there are FREE ones that are pretty good.

Run a mal-ware detector. Malware Bytes is the FREE one that I use

Never, never share passwords and make sure your password is STRONG.

Update/patch the software on your computer regularly.

This list is not comprehensive, but it's just to get you thinking about it.

Discussion Board Assignment

Please watch the video and review the article.

Please take a look at the OnGuard Online website.

Q1. What AV or Malware software do you use? Please include what type of device or OS (Windows, Mac, Android)

Q2. Share with us three tips you have for protecting yourself online. Use examples to illustrate your tip, if possible.

Please provide a reference/source (formatted in MLA style) that supports at least one of your tips.

No duplicates allowed. For example, I already mentioned Malware Bytes. You can mention that you use it, but that can't be the only one you mention. You can comment/reply to your peers agreeing or disagreeing with their tip, but first one to post, gets the credit for the "original".

Put your comment

Ask Question & Get Answers from Experts
Browse some more (Software Engineering) Materials
CIS5200 Auto-Parts Warehouse - Draw an ERD for Auto-Parts Warehouse indicating the types of relationships between the entities and Suggest ways Auto-Parts Warehouse can use co
Develop in accordance with the SDLC. Describe the integrative functions and activities within the information systems area, including the role of the CIO and technologies man
Define the terms software process and Unified Process. In the software engineering context, what is meant by the term model? What is meant by a phase of the Unified Process?
A videogame development company recently hired you as an Information Security Engineer. After viewing a growing number of reports detailing malicious activity, the CIO reque
Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitt
CISC 685 - Fall 2016 - You have been learning about wireframes and how they are used to design the organization of a web site and the navigation options and discuss how the s
Make a flowchart of the program, using the pseudo code from Unit four Topic two as a guide. For your convinence you can access this pseudo-code through selecting following;
Create a use case diagram that would illustrate the use cases for the following online university registration system: The system should enable the staff members of each aca