Introduction Malware is commonly described as viruses

Introduction
Malware is commonly described as viruses, worms, Trojan horses, backdoors, keystroke loggers, rootkits or spyware. They affect everyone. It has become an increasingly a shared concern for governments, businesses and individuals all around the world since governments rely on the Internet to provide services for citizens, they face multifaceted challenges in securing.
information systems and networks from any attacks such identity thief or stealing citizens data or money or even denying users access to essential resources. Knowingly, the malware can disrupt the functioning of large information systems; modify the integrity of data and to attack major information systems.
Detention of Antimalware software:
“Malware is a software designed to damage computers operation, collect sensitive data, and gain unauthorized access to computers system” (Williamson and Varakantham2012).

According to Rutkowska malware has two categories one which will modify the resources such as memory, BIOS code, and PCI devices expansion; also, there is malware that doesn’t modify any sources but target resources which are dynamic by nature like data (2006).

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

Functions of Antimalware
Different sources labeled the usage of anti-malware into six primary roles, firstly assist the clienteles a concept on the way malware impacts and spread thru devices or systems, secondly can provide protection against any threats found on a laptop or device by scanning, detecting, hindering any risk and eliminating malware.; additionally, the anti-malware software can prevent clienteles from surfing websites that could include malware.

Evolution of Antimalware:
The evolution of antimalware is linked to the evolution of malware. The increased use of computers and the internet has increased the number of cyber-attacks on PC mainly through browser-based weaknesses ,Patnaik introduced the majority of computer users to viruses included Brain (1986), Lehigh, Stoned, Jerusalem (1987), the Morris worm (1988), Michelangelo (1991) ,CIH (aka Chernobyl) in 1998 and Kak, the first and one of the email viruses. Worms such as Morris Worm, Loveletter, The CodeRed worm and Trojans (Patnaik,2015, life wire website )
Therefore there was a need to find a solution that could help prevent those attacks that’s when anti-malware software’s were developed as a means to provide security to the users then several different vendors developed soft wears designed to clean, scan, detect, prevent and protect computers that had been infected with malware. For example, during the late 80s most anti- malwar’programs were simple, limited distribution and less focused purpose, unique malwar Antimalware software evolved it’s not only used in PC but also in laptops, telephone devices such iPhones (ISO) and Samsung (Android ) .mobile malware infection methods are different from the PC malware infection which include: attacking the mobile browser or free WiFi hotspot has been a concern which made this infection much more common , infection via application a typical technique to infect consumer’s mobile devices- mainly with fraud-focused malicious applications. Third way infects a mobile with malware are through physical compromise, for example, connecting the device through a USB cable.

According to a Kaspersky security report (2016), 884,774 new malware was introduced in 2015, three times more compared to 2014. Symantec also reported that one zero-day attack per week on average was discovered in 2015 (2016)

According to Sen mobile devices have certain power limitations, anti-malware solutions in the market rely on static analysis techniques. However, these techniques could be more open to new attacks or even new variants of known attacks than dynamic analysis techniques. Therefore, these techniques need to be evaluated against unseen
attacks (2018)

Implementation of Anti-malware

Anti-malware software works automatically as soon as the system starts by checking all the files and data in the system and in case any malware is detected according to Aycock anti-malware can use three strategies to monitor and scan devices or computers either signature-based scanning behavior-based detection and sandboxing after scanning blocking and altering and stopping the data transfer in case of threats .anti malware will help keep your computer safe and operating at high performance. Vendors are providing users and companies with top endpoint protection products that prevent unwanted infections to desktops, laptops, workstations, servers, mobile devices such as McAfee, Symantec, Malwarebytes and Kaspersky Lab.

Usage Statistic

Since will live in the world where we need to have mobiles, tables, Wifi, laptops there is a risk of getting attack by malware that will steal information . forge or misuse, information such as login credentials, credit card password, company information, and trade secrets. Therefore, antimalware software is the answer to our problem since the vendors provided the users with different types of anti-malware software users can select and acquire. The author was capable of finding usage statics of leading anti-malware software used by users and organization using Statista portal.

This statistic shows the market share held by anti-malware vendors that offer applications designed for Windows as of January 2018. At that time, Avast held 19 percent of the anti-malware application market, ESET held 14 percent while Malwarebytes held 12 percent. The statistic also shows the countries with the highest rate of malware
infected computers China, Taiwan, and Turkey, on the other hand, Sweden, Norway, and Japan are among the countries with the lowest rates of malware infection.

Another report was done by Malwarebytes in 2017 states that there is a regional difference in attack methodology and malware used. Unsurprisingly, US- and Europe- targeted attacks were highly differentiated. The United States recorded the most malware detections and leads all countries in the detections of every category charted, except for banking Trojans, where Turkey leads. the report also predicted that distribution through email. Phishing attacks, including malicious attachments, will have a comeback also they predict that exploit kits (RIG specifically) are likely to become the standard for malware distribution again in the very near future.

Advantages of Anti-Malware
Anti-malware detects and removes malware and rootkits; easy to install; stops hackers from accessing personal information; prevents future attacks
detects and shields the system; blocks corrupted websites; lastly scans for any threats and reports to administration or users

Disadvantages of Anti Malware
According to malware risks and mitigation report, some anti-malware software are costly, decrease the memory capacities; users have to update the software manually; slow scanning process; It affects the speed of computer working
and finally anti-Malware Free detects only malware installed on users PC or device, some free version access, and share users data.

Conclusion

Anti-Malware software was created to destroy and prevent dangerous malware threats, it’s easy-to-use and its available for free or the user can buy and download the software. The anti-malware play an important role in detecting and removal of malware infections proactively.

x

Hi!
I'm Delia!

Would you like to get a custom essay? How about receiving a customized one?

Check it out