Antivirus Designer Issues

Since  it is so dangerous, why would designers install software into the kernel at all (or make use of kernel software)? If you were an antivirus  designer or maker, what other methods do you utilize to prevent virus?
Answer  the questions with an APA-formatted paper (Title page, body and  references only), in-text citation.  Response should have a minimum of 500 words. A minimum of two references are required.

 

Don't use plagiarized sources. Get Your Custom Essay on
Antivirus Designer Issues
Just from $13/Page
Order Essay

SafeAssign Originality Report Fall 2021 – Security Architectu… • Chapter #8 Assignment

%16Total Score: Medium risk

Lakshmi Narayana Pothakamuri

Submission UUID: bba2db1e-04c7-9c30-4822-fa0d6b474c8a

Total Num …

1 Highest M …

16 % Week 3 Chapt…

Average M …

16 % Submitted …

11/2… 08:09 PM CST

Average W …

609 Highest: Wee…

View Originality Report – Old Design

Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c…

1 of 5 11/20/2021, 8:21 PM

 

 

%15

%1

%16Attachment 1

Global database  (1)

S…

Internet  (1)

v…

Top sources  (2)

Excluded sources  (0)

Word Count: 609

Week 3 Chapter 8 Assignment.docx

1

2

1 S…

2 v…

Running Head: System Security 1

System Security 4

Security Architecture & Design

ISOL-536-B05

Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c…

2 of 5 11/20/2021, 8:21 PM

 

 

Chapter#8 Assignment

Submitted to

Adjunct Professor Dr. Charles DeSassure

University of Cumberlands

Lakshmi Narayana Pothakamuri

11/20/2021

Designers should install software into the kernel because it is the basic operational unit of a computer and operating system as a whole. On top of that, the kernel has full access to computer re- sources, and this provides developers with unrestricted access to all resources hence installing software into the kernel enhances flexibility (Perla & Oldani, 2017). The kernel keeps track of the

various pieces of software running, it is in charge of keeping track of what memory is available and handing off bits of free memory to programs when they ask for it. The kernel manages all of the hardware devices and brokers interaction between the hardware devices and programs that are running. The kernel can look at the raw data on a disk and determine how it is laid out as files and present those files and the disks as places where programs can read and write data. The kernel also handles the flow of data through networks and between programs, managing connections, sending data where it is supposed to go, notifying the programs that data is available or that it’s waiting. As with any computer op- erating system, it provides support for all the other software you run on your computer by providing hardware drivers and various system services like memory management, process management, and more. Viruses don’t invade programs. They invade a computer by becoming executable within the operating system. One route is by fooling people into installing them. You can’t fix stupid. Some viruses indeed get a foothold by exploiting a bug in some program. Sadly, we have never succeeded in eliminating all possibilities of

1

Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c…

3 of 5 11/20/2021, 8:21 PM

 

 

bugs. Some modern programming languages make it more diffi- cult to write programs with bugs, but it may still be possible, and we cannot always use those more robust languages. Developers should make it next to impossible for users to install programs by restricting their antivirus to only accept some applications. The only way one can get a program to run on a Juniper router, for in- stance, is for it to be digitally signed by Juniper. Even if you have administrative and physical access. Most people are not prepared to live with that level of security. They want to install third-party software, for instance, and not be limited to only authorized ven- dors. Most viruses now are installed and run deliberately, by users. Not because they want to but because they were tricked by social engineering in an email or on web pages. One of the challenges antivirus developers face while developing an antivirus is the fact software particularly operating systems are very complex. All it takes to create a vulnerability is for one programmer to misunder- stand the purpose or secondary effects of what some other pro- grammer has done (Yehoshua & Kosayev, 2021). This has nothing to do with the intelligence of the developer. If a vulnerability exists someone will find it. They don’t have to be smarter than the devel- oper. To ensure that the antivirus provides the needed protection, a developer must ensure that the program provides room for in- teraction with the users as that’s the only way to get some feed-

back that can help on enhancing the program’s security.

References

Alpay, D. (2019). Reproducing kernel spaces and applications. Springer Science & Business Media. Perla, E., & Oldani, M. (2017).

A guide to kernel exploitation: Attacking the core. Elsevier.

Yehoshua, N., & Kosayev, U. (2021). Antivirus bypass techniques: Learn practical techniques and tactics to combat, bypass, and evade antivirus software. Packt Publishing.

2

Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c…

4 of 5 11/20/2021, 8:21 PM

 

 

Source Matches (2)

Student paper 87%

vumyvivyfo 91%

1

Student paper

The kernel keeps track of the various pieces of software running, it is in charge of keeping track of what mem- ory is available and handing off bits of free memory to programs when they ask for it. The kernel manages all of the hardware devices and brokers in- teraction between the hardware de- vices and programs that are running. The kernel can look at the raw data on a disk and determine how it is laid out as files and present those files and the disks as places where programs can read and write data. The kernel also handles the flow of data through net- works and between programs, manag- ing connections, sending data where it is supposed to go, notifying the pro- grams that data is available or that it’s waiting.

Original source

Q.2.2 The kernel keep tracks of vari- ous pieces of software running , it is in charge of keeping track of what mem- ory is available and handing off bits of free memory to programs when they ask for it -The kernel manages all of the hardware devices and brokers in- teraction between the hardware de- vices and interaction between the hardware devices and programs that are running – The kernel has the ability to look at the raw data on a disk and determine how it is laid out as files , and present those files and the disk as places where programs can read and write data -The kernel also handles the flow data through networks and between programs ,managing connec- tions , sending data where its sup- posed to go, notifying the programs that data is available or that is waiting , etc (Quora,2017) Q.2.3

2

Student paper

A guide to kernel exploitation: Attacking the core.

Original source

A Guide to Kernel Exploitation Attacking the Core book

Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c…

Essay Writing Pros
Calculate your paper price
Pages (550 words)
Approximate price: -

Why Work with Us

Top Quality and Well-Researched Papers

Our writers have been trained on how to handle papers placed by our clients. The writer must read and understand before embarking on writing the papers. In case of any issue that needs clarification, writers are encouraged to ask the client or support.

Professional and Experienced Academic Writers

Our team comprises of the best writers and editors. We do thorough vetting during recruitment to make sure that our writers have the knowledge and experience we aspire in the team.

Free Unlimited Revisions

Our aim is to give the client the best outcome. If for some reason you are not satisfied with the wok done, you can ask the paper to be revised or rewritten. This will be done to your satisfaction with no extra charges.

Prompt Delivery and 100% Money-Back-Guarantee

We have writers who work round the clock. This helps in making sure that all our clients’ papers are delivered on time. If we have issues with the deadline, we will ask for extension. If its not possible, the money is fully refunded.

Original & Confidential

Our clients’ confidentiality is highly respected. We can never disclose our clients’ details to third parties. In the same regard, we strive to give our clients 100% original papers. We do not tolerate plagiarism from our writers.

24/7 Customer Support

Clients can reach us any time of the day, and any day of the week. There is a live chat, email or phone numbers to help in ease of communication.

Try it now!

Calculate the price of your order

Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

You should never be worried about your papers even in the middle of the night. Our team will work round the clock to deliver.

Essays

Essay Writing Service

We have an able team that can deliver your work in the shortest time possible. The academic level or the type of work should never be a hindrance. Our highly competent support team is always around (24/7) to give you any assistance you may need.

Admissions

Admission Essays & Business Writing Help

Do you need to be admitted in your dream institution but find it challenging to write an admission essay? Our team is in a position to write the best letter that will guarantee you an admission. We do as well write the best business proposals and reports.

Reviews

Editing Support

Writing can be fun and enjoyable when everything has been done right. Writing is not just enough without proper editing and proofreading. We have a team of editors that ensure everything falls in place, whether its issues to do with grammar or referencing styles.

Reviews

Revision Support

Once the paper has been done and submitted, that is not the end of it. You can always ask for amendment or improvement if you feel something has not been done right. Our team of writers and editors will gladly assist you to your satisfaction. Revision is free of charge.