Review of security suites for mobile computing devices


Anti-Malware: A Review of Security Suites for Mobile Computing Devices

Endpoint computer users need to safeguard data against threats imposed by malicious software. This paper provides a critical review of four anti-malware security suites; Kaspersky, McAfee, BitDefender, and Norton 360, that address the threat of malicious software.

Kaspersky contains an interface with multiple security features including scanning and virus detection. Further, it allows blockage of malicious applications with an option for enabling them later (Friedman & Hoffman, 2008).

McAfee offers applications that may schedule scans .It also offers a privacy vault that protect and back up user files. However, the process of backing up involves manual selection as opposed to multiple marking and selecting of files (Friedman & Hoffman, 2008).

Bitdefender also offers strong antivirus and anti-phishing protection. Also, it has Safepay, an application that offers firewalled protection on public hotspots. Bitdefender offers two layers of firewall protection hence not suitable for protecting multiple devices (Mohata, Dakhane, & Pardhi, 2013).

Norton 360, on the other hand, offers five layers of protection. It has a firewall that provides information on the reputation of an internet protocol address. Further, it offers an automated tool that secures passwords on websites (Cha, Moraru, Jang, Brumley, & Andersen, 2011).

Anti-malware suites combine components to protect a system from malfunctioning. The above suites offer more than one layer of protection thus providing more effective system security of mobile computing devices.

References:

Cha, S. K., Moraru, I., Jang, J., Brumley, D., & Andersen, D. G. (2011). SplitScreen: Enabling efficient, distributed malware detection. Journal of communications and Networks , 13 (2), 187-200.

Friedman, J., & Hoffman, D. V. (2008). Protecting data on mobile devices: A taxonomy of security threats to mobile computing and review of applicable defenses. Information, knowledge, systems management , 7 (1), 159-180.

Mohata, V. B., Dakhane, D. M., & Pardhi, R. L. (2013). Mobile Malware Detection Techniques. International Journal of Computer Science & Engineering Technology , 4 (4), 2

Request for Solution File

Ask an Expert for Answer!!
Basic Computer Science: Review of security suites for mobile computing devices
Reference No:- TGS01427742

Expected delivery within 24 Hours