Mcafee Company Case Study

Superior Essays
Ly Ngo
ID 41736748
Tutorial for novice
McAfee Company is founded by John McAfee in 1987 and then he resigned the company in 1994. Intel Security Group and TPG Capital (Texas Pacific Group) now own the company. McAfee is an antivirus software that is intended for home users, small business, and big industry. The antivirus helps users protect personal information in computer and mobile devices. For business, McAfee provides the security in web server, emails, and networks; it also prevents the data loss in computer and in cloud server.
There are many different ways that McAfee antivirus uses to detect harmful threats in personal devices like signature based, heuristic based, behavioral based, and sandbox detection. In signature based, McAfee antivirus will check all the EXE file and unknown running file for any sign of virus. It also automatically scan any downloaded executable file because the conflict between programs will be made after installing. Using heuristic based method helps the antivirus detect the new and different forms of
…show more content…
There are four procedures that McAfee uses to maintain the data include classify, track, protect, and monitor. In classify, McAfee will define the location of the content and its text pattern and then match it to classification rules of the users. Track means that McAfee will keep track of the file by applying a tag to the file. Whenever the file is accessed, McAfee will track the data transformation and keep the tag persistently. In protect procedure, users will create a protection rule on the tagged file that determines who allows to access to the file, document properties, and destination of the file. If the file is accessed illegally, the owner will receive a message and the information of the intrusion, which is called monitor. Through all the steps, the sensitive information will be secure, and data will be

Related Documents

  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Describe 3 ways a hacker can try to intrude a system. To protect from unwanted intrusion, viruses or hacking, we should consider the following points: Antivirus protection: This program scans our computer from any miscellaneous files or viruses and delete them or to move to quarantine. There are lot of antivirus available in market. Move rover most of ISPs also provide antivirus.…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Threat Assessment of ‘Important Security Alert From Windows’ Pop-Ups: ‘Important Security Alert From Windows’ Pop-Ups has created havoc among computer users that does not allow them to usually work in the computer. Where this adware has found its own method to attack the targeted system and to make the infected computer almost useless. In order to trouble computer user, it performs several malicious activities to use the security gaps in the system and it leads to freeze the entire running programs of the computer. Firstly, this malware program affect the processing speed of the infected computer to stop the basic functions of the system so that the computer will respond very slowly when user give any instructions.…

    • 425 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    VPN A virtual private network is used by organisations to help secure data on a network. It’s very hard to access these private networks meaning that the data becomes much more secure and it can be used across a large area of a network, including many computers. This isn’t an expensive thing to do anyone can do it by using simple publicly available infrastructures. VPN also makes use of encryption firewalls and authentications services when sending data across the web.…

    • 767 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Also, the correct internet browsing security configuration setting should be implemented on the end users laptop to allow first party cookies, and blocking the third party cookies from other websites to protect from tracking and advertisements. By hardening it means that “Protection is provided in various layers and is often referred to as defense in depth. Protecting in layers means to protect at the host level, the application level, the operating system level, the user level, the physical level and all the sublevels in between” [1]. The best practices recommends that the antivirus program should be scheduled periodically to monitor any…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Logical security : Logical security consists of software safeguards for an organization's systems including user identification and password access, authentication, access rights and authority levels. These measures are to ensure that only authorized users are able to perform actions or access information in a network. Access control mechanism: As part of access control mechanism we are using MAC (mandatory access control mechanism) where users do not enjoy the privileges of deciding who can access their files. Here the operating system is the decision maker overriding the user’s wishes.…

    • 345 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    MISSION AND VISION The mission of the 90th Security Support Squadron [SSPTS] is to “Protect F.E. Warren AFB and defend America with the world’s premier ICBM force” (F.E. Warren Air Force Base Fact Sheet, n.d.). The vision of the 90th SSPTS is “Ready to fight ... Anytime, Anywhere” (F.E. Warren Air Force Base Fact Sheet, n.d.) .…

    • 622 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Managing Threats to Data Common threats to data consist of Botnets, DDoS (Distributed denial of service), Hacking, etc. You can manage and prevent data threats with antivirus/malware/hacking/etc software. By downloading a legitimate program you can protect your computers data. The software will alert you if there is something out of place in your computer before it’s too late, so you can get it removed.…

    • 1963 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    These threats can come in many forms, users can get viruses on their computer or an actual person can hack into the user’s account. A user who wants the best protection will need to keep the choice of operating system in mind.…

    • 635 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    P1 Unit 6 Business

    • 462 Words
    • 2 Pages

    The information security program can use tools to track any changes to any important data, also it can show when the file was last…

    • 462 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Snc's Security Case Study

    • 250 Words
    • 1 Pages

    SNC established security prior to brief. SNC was unable to provide the accurate Azimuth in the allotted time. SNC provided a disjointed and incomplete order. SNC started with a vague Orientation. SNC confused the fire team leaders when he blended the information together and failing to state, "Concept of Operations, Scheme of Maneuver, and Tasks".…

    • 250 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Unit 9 P2

    • 1782 Words
    • 8 Pages

    Task 1 – Introducing e-commerce into an organisation E-commerce is the actions of trading electronically through the internet. E-commerce has been implemented into most businesses in the modern day and there are many impacts when doing business over the internet. The benefits of introducing e-commerce into your organisation There are many significant benefits to the business when introducing e-commerce into it. Some entail:  The business can accumulate customer information …

    • 1782 Words
    • 8 Pages
    Improved Essays
  • Decent Essays

    Cvs Caremark Case Study

    • 373 Words
    • 2 Pages

    I am extremely pleased to find that your company has posted a recruitment opportunity for an opening position for a full-time pharmacist on Purdue myCCO. Seeing that CVS Caremark being ranked as the top 13th on Fortune 500 companies, I am aware that this position will be competitive and very much selective in its recruitment process. Despite that fact, I believe I am able to uphold the skills and qualifications in which you and your company is looking for. As a member of my community, I have always been finding ways to get involve and make a difference.…

    • 373 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The Federal Information Security Management Act also known as FISMA is United States federal law enactment established to ensure government data, operations and resources against regular or man-made dangers are protected. FISMA was created in 2002 Electronic Government Act of 2002 before cybersecurity became such a vast problem. Modifications were made to FISMA law and renamed Federal Information Security Modernization Act of 2014. The cybersecurity market is continuously expanding as the society rely upon the development and utilization of information technology systems. Within recent years, there has been an increase in the number security risks and data breaches.…

    • 240 Words
    • 1 Pages
    Improved Essays
  • Superior Essays

    Code Blue-Where To? This is a review of the case study Code Blue-Where To?, The patient in this case is an 80 year old patient admitted to a psychiatric facility, who ultimately dies. His death is not the fault of the medical staff, but the care he received prior to his death was plagued with system errors and communication breakdowns that could be argued as causing undue patient harm. The errors include problems with staff training, policy and procedures, outdated equipment, and failure to follow protocol.…

    • 1074 Words
    • 4 Pages
    Superior Essays
  • Decent Essays

    Target on Friday confirmed that strongly encrypted PIN data was removed from its system during the security breach that took place between Black Friday and Dec. 15. The breach could impact 40 million shoppers who used credit cards or debit cards at Target's U.S. stores during that period; however, online shoppers have not been affected. The incident has been gathering steam in the media. Along with consumers' growing voices of frustration and anger, attorneys general in several states have pledged to try to help their constituents whose credit card accounts were compromised to deal with the fallout. Sen. Richard Blumenthal (D., Conn.) has asked the Federal Trade Commission to immediately open an investigation into Target's security breach,…

    • 303 Words
    • 2 Pages
    Decent Essays