DIGITAL INFORMATION AND IT ASSETS SECURITY
Security, in information technology (IT), is the defence of digital information and IT assets against internal and external, malicious and accidental threats. This defence includes detection, prevention and response to threats through the use of security policies, software tools and IT services.
There are following software tools and IT services can be used for securing the digital information and the IT assets.
a) Antivirus & Anti-Spyware Engine
It detects and removes viruses, spyware, Trojan horses, worms, bots and more. it provide superior protection.
? Kernel-Level Virus Prevention protects the operating system.
? Scan Modes let you customize your protection.
? Fastest-Updating Signature List detects and stops the most recent viruses
b) Advanced Real-Time Antivirus
Provides access to the up-to-date database of Antivirus signatures to protect against newly emerging threats. Real-Time Cloud Database contains up-to-date reputation of files, web resources and software enhancing traditional Antivirus + Firewall protection.
? Checks files against Real-time Cloud database to ensure that even the latest threats are not missed.
? Contains the latest Antivirus signatures, web resources and software to ensure up-to-date protection.
c) Anti-Phishing
Anti-Phishing is a major feature of the Web Secure Chrome Extension it is used to protect your privacy from online phishing attacks and provides maximum security with great browsing experience. The Anti-Phishing mechanism is a heuristic engine that will scan all websites you reach and examine their characteristics before letting you insert any personal information. It will alert you whether it is a safe website or a phishing attempt.
d) Identity Protection Services
Identity theft can happen to anyone, anywhere Daily Credit Monitoring and Fraud Alerts include daily credit reports with email alerts. You’ll be notified of any changes in your credit reports – which are often an indication of identity theft Victim Recovery Service provides free telephone counselling to guide identity-theft victims through resolution and recovery
e) Anti-Key logger
One of several ways of Extreme Security protects your personal data from becoming compromised on the Internet, and for your identity to be exploited. The Anti-Key logger prevents identity thieves from seeing your passwords and other keystrokes by malicious software.
f) Anti-Ransom ware
Anti-Ransom ware utilizes advanced security engines and algorithms to automatically detect, block and remove the most sophisticated and evasive ransom ware infections. Any data encrypted by a ransom ware attack is restored as part of an automated remediation process. By using behavioural technologies which do not rely on signature updates, the Anti-Ransom ware capability is able to identify and remediate zero-day ransom ware attacks on both online and offline modes.
K.L Ambashtha
Assistant Professor
ISM Patna