VIRUS INVASION IN WI-FI NETWORKS

Authors

  • Smita Bajpai*, Shalini Gupta

Abstract

Today every house has minimum 2 members who use internet all the time for chatting, e-mailing, browsing, playing games, shopping and more. Therefore it is necessary to protect your system and data from viruses, worms, Trojans, spyware and adware. Plenty of anti-virus software is developed every year that have their own strengths and weaknesses. Security administrators need to decide how much time, money, and effort needs to be spent in order to develop the appropriate security policies and controls. Each organization should analyze its specific needs and determine its resource and scheduling requirements and constraints. Computer systems, environments, and organizational policies are different, making each computer security, services and strategy unique. However, the principles of good security remain the same, and this document focuses on those principles. Although a security strategy can save the organization valuable time and provide important reminders of what needs to be done, security is not a one-time activity. It is an integral part of the system lifecycle. The activities described in this document generally require either periodic updating or appropriate revision. These changes are made when configurations and other conditions and circumstances change significantly or when organizational regulations and policies require changes. This is an iterative process. It is never finished and should be revised and tested periodically.

Article Metrics Graph

Downloads

Published

2013-10-13