27 Sep 2022

245

The Biggest Advancement in Cybersecurity in the Last Decade

Format: APA

Academic level: College

Paper type: Essay (Any Type)

Words: 379

Pages: 1

Downloads: 0

Cybersecurity has changed significantly over the past decade and it increases in sophistication on a daily basis. One of the biggest advancement in cyber security over the past decade has been the advancement of antivirus software. Antivirus software has become increasingly advanced to mitigate against almost every type of security breaches. 

One way which antivirus software has improved is through antivirus scanning tools. Antivirus scanners have become quite advanced and can detect when an individual is doing something that is malicious or even when something malicious is being stored by a legitimate user. The detection of intrusion has moved beyond simply detecting simple malicious activity and is used to protect company data (Grimes, 2016). Companies today store and analyze billions of data on a daily basis. Storage is done through large disk arrays or cloud storage which could have stored the world’s digital content a few years ago. Without the use of antivirus software, storage and protection of data would have been impossible. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

A decade ago, the practice was to shut down networks and email servers in case of an intrusion. Antivirus software have improved and have a hardened administrative computer environment which can be used to manage the network even after a breach. Computer infrastructure and the internet has become integral to businesses such that companies are rarely taken offline even with the biggest threats ( Silnov and Tarakanov, 2015 ). Antivirus software today are advanced and can easily destroy the virus. 

Anti-virus protection used today can guarantee protection of any Information Systems both personal or professional. There has been a large number of antivirus software available in the market. With every launch and every update, there are new features that are used to eradicate and detect the viruses and malware. Microsoft makes use of windows defender that is integrated into the operating system to protect the system from virus. The system updates itself with every update to ensure protection from new security breaches. Microsoft latest operating system Windows 10 has better antivirus protection (Schofield, 2016). There are other antiviruses software from McAfee and Kaspersky that protect privacy and remove infections. Many users have become increasingly aware of the necessity of antivirus and almost every computer both personal and professional has an antivirus software. 

References 

Grimes, R. (2016). 10 years on: 5 big changes to computer security. Retrieved from https://www.csoonline.com/article/2972020/security/10-years-5-big-changes-to-computer-security.html 

Schofield, J. (2016). Why Windows 10 users have better anti-virus protection | ZDNet. Retrieved from https://www.zdnet.com/article/why-windows-10-users-have-better-anti-virus-protection/ 

Silnov, D. S., & Tarakanov, O. V. (2015). Assessing the stability of antivirus software and data protection means against erroneous outcomes.  International Journal of Applied Engineering Research 10 (19), 40342-40349. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). The Biggest Advancement in Cybersecurity in the Last Decade.
https://studybounty.com/the-biggest-advancement-in-cybersecurity-in-the-last-decade-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 87

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 81

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 86

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 127

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration