Submitted by: Submitted by maziah94
Views: 10
Words: 3998
Pages: 16
Category: Literature
Date Submitted: 10/06/2015 04:25 PM
UNIVERSITI KUALA LUMPUR BUSINESS SCHOOL
ENABLING TECHNOLOGIES FOR COMPETITIVE SUCCESS
ECB30703
ME20
ANIS HADEENA BT MOHMAD NIZAR.…………………………………..62283113837
FATHIN NABILA BT MOHD AZHAR…………………………………….. 62283113681
MAZIAH BT MOHD SUFIAN……………………………………………… 62283113570
MELISSA SYAHIRAH BT KHAIRI ………………………………………...62283313218
CHE ENGKU EFIESYA NUR BT CHE ENGKU HANAPI……………… 62283313196
FATIN NABILA BT BAHAROM ……………………………………………62283113524
FATIN ILANI BT ZAHARULAIL...............................................................62283313047
HASLINA BT ABDULLAH
6TH AUGUST 2015
INTRODUCTION.................................................................................3
COMPARISON SPECIFICATION.......................................................4
ANALYSIS OF ADVANTAGES AND DISADVANTAGES..................9
MANAGEMENT CHALLENGES.........................................................13
RECOMMENDATIONS......................................................................17
CONCLUSION....................................................................................20
REFERENCES...................................................................................22
INTRODUCTION
Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer worms, and Trojan horses. Antivirus software may also remove or prevent spyware and adware, along with other forms of malicious programs. Free anti virus software generally only searches your computer using signature-based detection which involves looking for patterns of data that are known to be related to already-identified malware. Paid antivirus software will usually also include heuristics to catch new, or zero-day threats, by either using genetic signatures to identify new variants of existing virus code or by running the file in a virtual environment (also called a sandbox), and watching what it does to see if it has malicious intent.
Virus designers, however,...