• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24

Business options

Extracts from this document...

Introduction

Contents page Aim..........................................................................2 Objectives .................................................................2 Introduction ...............................................................2-3 What is internet security ...............................................3-4 Mcafee internet security 2009..........................................4 Mcafee Pros and Cons...................................................5 Norton internet security 2009 ..........................................5-6 Norton Pros and Cons...................................................6 Zone Alarm ................................................................6 Zone Alarm Pros and Cons...............................................6 Conclusion....................................................................7 Plan of work................................................................8-9 Appendices..................................................................10 Bibliography................................................................23 Aim The aim of this presentation is to look and research a variety of different internet security packages and give an informative evaluation of each. I will be looking at the advantages and disadvantages of each, how user friendly they are, price, what users think of the software and how well they protect computers. I will also be interviewing a professional who works day to day with security programs. From this interview I will try to gain an understanding of how internet security is used in a professional environment. Objectives 1- Research internet security packages and find out how effective each is. I will do this by reading online reviews of the different internet security packages and using some of my own knowledge and experience 2- Show my findings in a clear and understandable format which is direct and informative to the reader. I will do this by presenting my research as a report and a conclusion which shows what I have found and I will give my personal view. 3. To show a clear comparison of the two applications and to show the positives and negatives of the applications. What is internet security? Internet security is the process of preventing unauthorised users gaining access to your personal computer. Internet security programs help prevent access and detect files which may be malicious to your computer. Internet security is very important. There are many examples which can be used to show this. If you purchase items off of the internet then your banking details will be stored on the system. If somebody gained unauthorised access to your personal computer then they could also have access to your personal banking details. ...read more.

Middle

This is seen in test run by individuals. These test show that without internet security you are guaranteed to contract a digital virus on your computer. Without internet security computer networks and the internet will cease to exist. Plan of work Evaluation Date Plan Was it complete? Sticking to the timetable was easy because I had clear dates for when certain task would be completed and the research was not difficult. There were some occasions when I had completed the research and could move onto another piece of the research. I choose to research Mcafee internet security 2009, Norton internet security 2009 and Zone alarm. I chose these three products because they are all popular and used by many different industries. I chose to do an interview because I felt that I could gain a lot more knowledge from a face to face interview with a professional who works in the industry rather than a general questionnaire. My interview was direct and to the point and I only asked questions which I felt were relevant to my research. However the original interview date had to be changed because on the actual day the person who I was going to interview was not available. This was not a major issue as we rescheduled a date which was convenient for both of us. The most difficult part of the project was completing my conclusion. This was difficult because all of the different software's claimed to do the same thing. So when I was giving my final thoughts I had to compile all three and show an overall understanding of how and why internet security is available and so important. I feel that this research project was very interesting and I learned many new facts about internet security which I did not previously know. Also I feel that if someone were to read my research they would receive a lot of useful information which could help them make an informed decision about the security package which they choose to purchase. ...read more.

Conclusion

We like the transparency, and think the presentation here is better than the line graphs used in some other security applications. Should you want line graphs, an icon will reveal how the system and Norton CPU usage has been since the system was last rebooted. Features Norton has, in the recent past, included some sophisticated technology from its enterprise products, which is good because it's cutting-edge, but it's also bad, because it doesn't necessarily integrate with the product, nor is it necessary. In Norton Internet Security 2009, they seem to have found the right balance. Whitelisting, the buzzword of security products for 2009, is included within the new suite, and by marrying it with other technologies, Symantec makes it more suited for the user. Files on a whitelist are deemed trusted, and thus do not need to be scanned as often. Not all "safe files" make it onto the whitelist. For those, Norton uses a community process, called Insight, similar to that used by other security products such as Haute Secure. The thinking is that if thousands of other people are using this suspicious file, chances are it's not a new piece of malware but a new application. On the other hand if only a few are using it, then maybe it's worth it to take another look to see if it's malware. Norton enhances its home network monitor, giving you a system administrator's perspective on the relative health and security of all the computers within your home. And Norton Internet Security 2009 brings back the concept of the Recovery Disk once popular in the early 1990s, but declines to include a backup solution (you'll have to buy another Symantec product for that). Gone is the awful LiveUpdate component of past Norton products. With 2009 products, Symantec is providing antimalware definition signatures every few minutes or so. On the interface you'll see a notice indicating how many minutes since the last update. We didn't see definitions older than four minutes in our testing. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level ICT in Business section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level ICT in Business essays

  1. Marked by a teacher

    business online

    4 star(s)

    These are the most likely customers to be attracted shopping online, there could be other customers under different categories but from the information I've gathered these are the target audience from companies that are solely based on online shopping. B)

  2. UNIT4: PRESENTING BUSINESS INFORMATION

    This is where the pie chart and table was formed. Now the information is ready to be read and summarised. FINANCIAL CALENDER 2005: Financial dates. 2005 Annual General Meeting (FY 2004/05) 25-Nov Capital return: Future redemption dates and B share dividend 23-Nov Capital return: Future redemption dates and B share

  1. For my business report I am investigating the Co-op erative society supermarket.

    retails has to prepare its accounts for tax and Inland Revenue purposes this is important because it is the businesses legal requirement Co-op s accounting department has a team of qualified certified accountants who carry out the task of preparing the companies accounts and balancing its books this is vital

  2. The business I am going to set up is a snooker club,

    Production Budget The production budget predicts the production costs for the business. The budget has a stock budget and below this it has production budget where it states the cost of producing a product. The layout is same as the sales budget.

  1. Business Aims and Objectives.

    As there are a lot of supermarkets, there would be a lot of competition against each other. Therefore Tesco should provide an excellent standard of customer service and offer a wide range of goods and services to satisfy the customer's needs.

  2. The process of electroplating and how it is used to protect products.

    Thus the nickel metal dissolves as Ni++ into the solution. Research piece 2, secondary information http://www.hmq.com/newfiles/electroplating.html Electroplating Electroplating is the electrochemical process of depositing a metallic coating on the base material of an object when it is immersed in a plating solution in such a manner that a suitable low

  1. Advantages and Disadvantages of Waitrose Technology - Handy Scan (quick Check) - Introduced 1995

    Although the store would benefit from customers being in the store for one hour, Waitrose are placing the customers needs first, which a lot of supermarkets don't do. Waitrose are mostly interested in the customer efficiency and the store efficiency to make shopping for the customer as less painful as possible.

  2. This coursework that I intend on completing will be based around setting up a ...

    In this chapter I have included the results from my market research. These include information obtained from the questionnaires that I have sent out. This chapter is also a collection of secondary research in reference to the questions that I asked in the previous section.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work