What av or malware software do you use

Assignment Help Software Engineering
Reference no: EM13860567

Because of the recent DDoS attack on Rutgers computers - taking down their internet, I thought it might be a good idea to discuss safety and security online.

What is a DDoS attack?

DDoS is the common abbreviation for a Distributed Denial of Service attack which is what probably happened at Rutgers. Think of it like what happened during SuperStorm Sandy and nobody could get through on their cell phones or for the people that get stuck every day in traffic trying to get through the Lincoln Tunnel. There are too many people trying to access the same thing at the same time.
Here is a short video that explains it further:

https://youtu.be/OhA9PAfkJ10

What happened at Rutgers?

If you aren't up on the story, here is a good summary:

https://www.northjersey.com/news/colleges-in-a-cyber-war-with-hackers-open-networks-vulnerable-to-attacks-1.1321617

What should you be aware of?

The US government has a website called "OnGuard Online" with some useful tips and videos for protecting yourself online. Here is the main website page:

https://www.onguardonline.gov/

Chances are unless you are running a business, you probably won't be a target of a DDoS attack. However, if you don't update your computer, run anti-virus and mal-ware programs, you might become part of the botnet without you knowing it.

What can you do?

Run and update anti-virus programs on your computers, tablets and cell phones. yes, there are FREE ones that are pretty good.

Run a mal-ware detector. Malware Bytes is the FREE one that I use

Never, never share passwords and make sure your password is STRONG.

Update/patch the software on your computer regularly.

This list is not comprehensive, but it's just to get you thinking about it.

Discussion Board Assignment

Please watch the video and review the article.

Please take a look at the OnGuard Online website.

Q1. What AV or Malware software do you use? Please include what type of device or OS (Windows, Mac, Android)

Q2. Share with us three tips you have for protecting yourself online. Use examples to illustrate your tip, if possible.

Please provide a reference/source (formatted in MLA style) that supports at least one of your tips.

No duplicates allowed. For example, I already mentioned Malware Bytes. You can mention that you use it, but that can't be the only one you mention. You can comment/reply to your peers agreeing or disagreeing with their tip, but first one to post, gets the credit for the "original".

Reference no: EM13860567

Questions Cloud

Use technology and information resources to research issues : Use technology and information resources to research issues in American History to 1865
Drawing the logic diagram : sing two 2-bit comparator modules and some extra gates, design a 5-bit comparator comparing X = (X4X3X2X1X0) and Y = (y4y3y2y1y0). Show your design by drawing the logic diagram containing all three outputs, f(X>Y), f(X = Y), and f(X
Design the digital filter using the bilinear transformation : Design the digital filter using the bilinear transformation and show that the transfer function of the resulting filter may be approximately expressed as:
Where was the massive slaughterhouse known as union stock : Where was the massive slaughterhouse known as Union Stock Yards located?
What av or malware software do you use : What AV or Malware software do you use? Please include what type of device or OS (Windows, Mac, Android). Share with us three tips you have for protecting yourself online. Use examples to illustrate your tip, if possible.
How did states emerge in the nineteenth century? : How did states emerge in the nineteenth century?
American colonists concerning the standing presence : The proper response by American colonists concerning the standing presence of British officials and soldiers
What is effect of singlebit transmission error in ciphertext : What is the effect of a single-bit (transmission) error in the ciphertext when using the ECB and CBC modes of operation?
The desired customer outcomes : Question- Assume you have captured the Desired Customer Outcomes (DCO's) in a formal House of Quality structure.Outline how you would convert these DCO's into formal requirements. (You can use software requirements here if you wish!) How would you us..

Reviews

Write a Review

Software Engineering Questions & Answers

  What is penetration testing

What is penetration testing? Why is it performed? When should it be performed and what is static analysis, and how does it fit into a penetration testing scenario?

  Research on popular simulation modeling software application

Use the internet to conduct research on popular simulation modeling software applications. Find two applications to compare by examining the costs, features, and training requirements

  What do you think of these arguments

Some systems analysts argue, "Give users what they ask for. If they want lots of reports and reams of data, then that is what you should provide. Otherwise, they will feel that you are trying to tell them how to do their jobs." Others say, "Systems a..

  Create the system architecture models

Use CASE tool Model to create an application class model that includes entity classes, user interface classes, boundary, and controller classes - Use CASE tool Model to create the System Architecture models

  Develop the boston consulting group bcg matrix for your

develop the boston consulting group bcg matrix for your selected organization. hospitality outline the products and

  Create a z schema that adequately describes the wtc system

Prepare the solution as per the required criteria mentioned in the document, if you need any material please let me know - You are to create a Z schema that adequately describes the WTC system.

  Web authoring application

Compare the drawbacks and benefits of using a Web authoring application, an HTML editor and a text editor for developing websites.

  Software development practices

Agile Development is a blanket term that covers a wide variety of software development practices many of which have been codified and documented.

  What is a final security review

What is a final security review and why is this review so important - What are some of the outcomes resulting from this review and how are these outcomes addressed?

  Software as a service

From the e-Activity, describe two requirements of the software as service and the subscription economy as outlined in the Forbes article. Explain how your selected requirements affect the subscription business model.

  Summarizing a functional requirement of the system

A list of at least 20 use cases, each one summarizing a functional requirement of the system in a sentence or two. This is also a good place to indicate possible security threats. You can specify security threats and/or system constraints either w..

  The security problem in software development life cycle

The Security Problem in Software Development Life Cycle, From the e-Activity, contemplate the main reasons why you believe the Francophoned attacks were successful, and explore the key factors that made the social engineering aspect of the attacks ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd