Defensive computing: Difference between revisions

Content deleted Content added
No edit summary
Line 14:
=== Anti-malware software ===
A basic strategy for all defensive computer users is to install and use anti-[[malware]] software.
Firewalls may not completely protect a computer. Malicious software may be able to get through a firewall and onto a system. Anti-Malware such as anti-virus, anti-phishing and email filtering software offer some protection against harmful software that reside within a computer. The amount of malicious software available over the Internet is steadily increasing.<ref name="three">[https://www.washingtonpost.com/wp{{Cite news |last=Krebs |first=Brian |date=2008-dyn/content/article/2008/03/-19/AR2008031901439.html https|title=Anti-Virus Firms Scrambling to Keep Up |language=en-US |url=http://www.washingtonpost.com/wp-dyn/content/article/2008/03/19/AR2008031901439.html], Antivirus|access-date=2023-04-26 Firms Scrambling to Keep Up|issn=0190-8286}}</ref> It is important for defensive users to use to anti-malware that is both effective and easily updated in order to combat new strains of malicious software that are developed.<ref name="two"/>
 
The other side of anti malware is that it contains serious vulnerabilities itself.<ref name="eight">[https://googleprojectzero.blogspot.com/2016/06/how-to-compromise-enterprise-endpoint.html https://googleprojectzero.blogspot.com/2016/06/how-to-compromise-enterprise-endpoint.html] Security Products Contain Critical Vulnerabilities</ref> A malware could use vulnerabilities of anti-malware to launch malicious code.