Custom Writing Help For You!

Special Discounts Offers! 20-30% Off!

Posted: February 5th, 2019

Kaspersky Research Paper Assignment

Research Paper: KASPERSKY

The purpose of the Research Project is to develop an in-depth understanding the of intrusion detection and/or prevention technology and the way in which such technology is used to protect specific computing environments against specific threats. To arrive at this understanding, your project may choose to follow either one of two analytical approaches:

1. Analysis of a tool or technique including functional applicability and limitations

2. Analysis of environmental security requirements and technologies to meet those requirements

Tool-centric Research: Projects of the first type will focus on a specific tool, technique, or method used in intrusion detection or intrusion prevention. Choosing a topic for this type of project will mean selecting the tool you want to research and analyze and developing a research question or thesis statement that your research is intended to answer. The analysis for a tool-centric research project should emphasize the use and application of the tool, technique, or method rather than a simple explanation of its features. If you choose a product or tool with a broad set of capabilities, you may choose to provide an analysis of one or more aspects of the tool. The paper distills fundamental issues, focuses on one available solution, and provides a detailed analysis of both the functional applicability and the limitations of the available solution. In other words, you should explain in your paper the functional purposes and/or security goals the chosen tool is well-suited to address, and also things for which it is not a good choice. You are welcome to choose any type of IDS tool, including network-based, host-based, or wireless products.

choose to focus on a specific organization (like a company or agency) or on a class of organization (e.g., based on relative size, industry, business model, etc.). It is important that you be able to specify security requirements for the organization or operating environment that you choose for your project.

– Sample Answer Solution, Paper Writing Guide, Free Essay Assignment
====

Kaspersky Research Paper

Student’s Name
Institutional Affiliation
Course
Professor’s Name
Date

Kaspersky Research Paper
Introduction
Antivirus protection is one of the measures that companies take to improve the safety of the records. Cyber-attacks are on the rise in various parts of the world. The attacks occur in huge and small organizations across different sectors such as health, finance, social security, agriculture, and government. Kaspersky is one of the leading companies providing quality assurance of detecting and preventing various types of attacks. The functionality of the antivirus utilizes IDS and IPS to promote the security of a site against hackers (Soomro et al., 2016). Previously, the company has been embroiled in a saga indicating its close association with hackers. Consequently, the government of the USA has banned it from all government facilities and stores. The case is an indicator that the antivirus has various limitations that expose clients to hackers. Kaspersky should improve their features to improve the security systems and the ability to detect and prevent all forms of attacks or hacking.
Analysis of Kaspersky
Kaspersky is an anti-malware tool that protects the web traffic flowing through gateways. It provides secure network access by removing malicious programs. The antivirus tool provides companies with a peace of mind that they can work productively without any fear of attack (Martinelli et al., 2017). It is one of the best antivirus software that institutions install in their systems to prevent attacks. The system is designed to protect computers running on Microsoft, Linux, and macOS (Ali et al., 2017). It provides real-time protection, detection, and removal of adware, worms, Trojans, viruses, and spyware, auto-dialers, malicious tools, rootkits, and keyloggers (Ali et al., 2017). Automatic update of the antivirus from the Kaspersky Security Network provides security against new types of risks.
Kaspersky is compatible with both large and small businesses since they are all at risk of attacks. Businesses prioritize the protection of data against phishing attempts. If data is stolen, organizations can lose an important asset that secures their competitiveness in the market (Nazarenko et al., 2019). The antivirus tool is also essential in scanning the removable disks for any threats that can compromise the integrity of a computer. Kaspersky also blocks spam sites and ads that intend to steal information from the computer and infringe on privacy (Kabir et al., 2018). The tool is also important in the financial world since it helps prevent fraud or identity theft that can lead to loss of money.
Kaspersky has various strengths and limitations similar to other antivirus tools in the market. The company attempts to continually improve the system to handle various challenges. According to Alves et al. (2018), high-end security features protect computer systems from known and new attacks. Therefore, companies can comfortably embrace the tool without fear that their data or security will be at risk. For example, in 2019, the antivirus stopped approximately 1billion attacks in computer systems for individuals and corporations (Nazarenko et al., 2019). It can also be trusted since it provides a constant update of the system to provide better security features. Corporations also embrace the system and recommend it for companies that are looking for advanced protection.
Functional Application
The functionality of Kaspersky enables the antivirus tool to provide various benefits to organizations. Alves et al. (2018), also points out that the features enhance simple interface and navigation, the possibility of recovering damaged files, protection against zero threats daily, and accurate and reliable protection. It comprises of a core system that blocks malware and system watcher to prevent against zero-day threats. According to Martinelli et al. (), 2017, it provides several layers of protection to secure systems from phishing schemes, attacks, and harmful emails. Other features include privacy cleaner, rescue disk, browser configuration risk, windows troubleshooting wizard, vulnerability scan, and on-screen keyboard (Wang, 2017). All the various features have been tested in the lab and the results are impressive.
The functionality of the antivirus also involves data encryption. The system comprises of capabilities that enable companies to encrypt and store data safely. Healthcare systems can utilize the applications to enhance the security of their data (Särelä et al., 2017). Additionally, the applications enable users to customize web policies. The options available include data collection, soft restrictions, and hard restrictions. A business owner thus has the liberty to set their own rules based on the threats they are exposed to and the model of the business (Särelä et al., 2017). Companies that are transacting funds online can also benefit from safe transactions through the ultra-secure browser. Hern (2017), indicates that protection provides freedom against the worry that the transactions will be hacked or the card details will be used against an organization’s wish. The various applications of Kaspersky provide companies with the peace of mind that their data is secure and their reputation is guaranteed.
IDS/IPS Tools
The role of Intrusion Detection Systems (IDS) is analyzing network traffic to identify signatures similar to known cyberattacks. They monitor the network traffic to identify signs of attack or data infiltration. For example, according to Periroth and Shane (2017), it can identify traffic that violates policies or attempts to steal data from a system. Identifying the threats is an important step in preventing them from interfering with the performance of a system. On the other hand, Intrusion Prevention Systems (IPS) analyze packets and stop them from launching an attack. IDS and IPS are essential tools in the network infrastructure to safeguard computer systems (Hern, 2017). Their role is to deny traffic based on the security profile of a security threat. The two systems collaborate to identify and eliminate possible attacks by reading and comparing threats to known databases and blocking them.
IDS and IPS are essential in the security of a company. One of the benefits is providing automation that provides the peace of mind necessary in handling network traffics. Companies can also rejoice in creating a hands-off task that will involve a regular scan to identify and stop threats (Hern, 2017). Several network breaches cost companies billions of dollars due to loss of crucial data and negative reputation in public. For example, hospitals record a high rate of data breaches since hackers are targeting data comprising contacts, bank details, and social security numbers (Harris et al., 2017). Therefore, investing in an automatic system will enhance the quality of security always.
Companies are required to comply with various regulations that protect their data against hacking. Harris (2017), also indicates that compliance is easy with the IDS and IPS systems since they automatically check off the boxes and address CIS security controls. During auditing, companies require security compliance to adhere to the set standards. Virus protection is an essential policy that ensures companies are protecting the public data they hold in their systems (Zhao & Yang, 2016). It encourages small businesses to also ensure they install antivirus protection systems. Additionally, tools are important in enforcing various policies and activities. For example, a computer can block other VPNs to enhance network security (Zhao & Yang, 2016). Therefore, companies should aspire to install Kaspersky since it provides IDS and IPS systems necessary for enhancing protection.
Limitations
One of the major limitations of Kaspersky is incompatibility with other antiviruses. The challenge is common in other antivirus systems (Soomro et al., 2016). A company cannot install Kaspersky if it has already installed another system. It will be forced to uninstall the system thus foregoing the benefits of the other systems (Soomro et al., 2016). Incompatibility limits the benefits that individuals or organizations can draw from the company.
Installing Kaspersky is not sure proof against all types of viruses and malware. Statistics from lab results indicate that the company can only detect 11 out of 12 viruses, and 7 out of 10 malware, and 8 out of 10 phishing sites (Martinelli et al., 2017). Therefore, a company is still prone to some level of risk. Lab results also indicate that if a keylogger was present before installing, the antivirus cannot detect it. However, after installing and running Kaspersky it is hard to install keyloggers (Martinelli et al., 2017). Additional measures are required to enhance data protection to prevent costly attacks. Other measures may include physical protection of computer systems from access by unauthorized personnel.
Customers also complain that antivirus makes computers slow. One of the common reviews is that after installing the computer started operating less fast. The problem is common especially with old versions of computer systems. Ali et al. (2017) indicate that people with 2.9 Core 2 Duo, 4 G RAM, 1 G GPU can experience a better speed of their computer compared to others with lower versions. Other features that the company should improve include virus detection and the ability to block unwanted content from harmful websites (Ali et al., 2017). Therefore, the company needs to constantly update its features to ensure they are matching with the needs of the customers.
In 2005, the company had major weaknesses that were improved later on. One of the flaws is that it could allow attackers to command systems (Ali et al., 2017). Therefore, it was easy for attackers to comprise the integrity of various computers. The incidence exposed many companies to security breaches. Another major weakness is that the antivirus could allow CHM files to insert malicious codes (Ali et al., 2017). The malicious codes were the root cause of various infidelity issues in computer systems. The ability to insert malicious codes could also compromise the integrity of data and the ability to secure customers from losses.
Kaspersky has other limitations such as poor enforcement of policies. When individuals change their network policies the system is unable to immediately detect and comply (Nazarenko et al., 2019). Companies are also unable to view security events from the endpoint. Viewing live events is essential in taking proactive measures to prevent attacks from occurring. However, Kaspersky only provides results that they were reviewing an event. Additionally, it is not custom for specialized applications (Nazarenko et al., 2019). The weakness results in generating several false positives that can cause unnecessary anxiety in an organization. On the other hand, the administration console is complicated and it is not easy to detect various options. According to Alves et al. (2018), new users struggle to navigate the console to achieve the customization they require. Although the company is striving to address the various features, several issues still expose an organization to security risks.
Reviews and Controversies
Reviews indicate that the antivirus has missing features such as a personal firewall, anti banner, antispam, and poor configuration of the parental controls. The tool thus fails to provide the customers with the relevant security they require against attacks (Nazarenko et al., 2019). Despite the various reviews from clients, the company has done little to improve the prevailing condition. Although it remains one of the best tools in antivirus protection, it is not clear why the company has not updated or added essential features (Nazarenko et al., 2019). The company also takes long before it can make changes yet the world is changing at a fast rate daily. Customers feel the company is not doing enough to protect them against data loss and hacking.
The US government has criticized Kaspersky for its relationship with the Russian Federal Security Service (FSB). Although the company has actively denied the allegations, the government indicated it had strong grounds to prove the case (Särelä et al., 2017). Consequently, the government cited a lack of confidence in the tool and thus banned it from all government stores. The antivirus company should keep off such associations since they can raise suspicion of its integrity in maintaining security (Särelä et al., 2017). The association has been associated with a weakness of the tool that allows hackers to spy on online users. Spying on online users could lead to loss of critical data since the hackers will target companies and hospitals with massive data.
Recommendations
Hern (2017), indicates that over 3,800 data breaches were reported in 2019 putting on notice people who are using various antivirus tools on alert. The question is whether the systems they are using are safe to avert the risk. The data breaches exposed over 4.1 billion records costing organizations billions of dollars to recover or fix the problem (Hern, 2017). The statistics indicate the precautions that organizations should take to avoid the risk of attacks. Consequently, according to Periroth and Shane (2017), the organizations should review the strengths and weaknesses of Kaspersky to ensure they minimize the risk of attack. They should also constantly check the reports to promote the safety of the records.
Kaspersky has been in the market for a long time but it has various weaknesses compared to other antivirus tools such as BitDefender. It has fewer tools to provide clients with maximum security for their records (Zhao & Yang, 2016). However, despite the weaknesses companies need to review the records that are at risk and take the necessary measures. The measures could include changing the Kaspersky package from Internet Security to Total Security to prevent the prevailing attacks (Martinelli et al., 2017). The measures should be taken in full recognition that no antivirus software provides 100 percent protection against cyber-attack.
Conclusion
Kaspersky is one of the leading companies providing antivirus software to companies across various sectors. The security systems are essential to companies and government agencies due to an increase in the number of attacks. Companies have been using antivirus with minimal challenges. One of the strengths is utilizing the IDS and IPS features that are effective in detecting and preventing attacks. It is important, however, for the company to address the complaints from various customers. The government denounced the company after it was disclosed that it had relations with hackers. The complaints by the government echo the voices of companies and individuals who have used Kaspersky in the past with various challenges. Despite the various efforts by Kaspersky to make significant improvements, it should consider the complaints to advance their technology.

References
Ali, M., Shiaeles, S., Clarke, N., & Kontogeorgis, D. (2019). A proactive malicious software identification approach for digital forensic examiners. Journal of Information Security and Applications, 47, 139-155.
Alves, T., Das, R., & Morris, T. (2018). Embedding encryption and machine learning intrusion prevention systems on programmable logic controllers. IEEE Embedded Systems Letters, 10(3), 99-102.
Harris, S., Lubold, G, & Sonne, P. (2017). How Kaspersky’s Software Fell Under Suspicion of Spying on America. The Wall Street Journal. Retrieved from https://www.wsj.com/articles/how-kasperskys-software-fell-under-suspicion-of-spying-on-america-1515168888
Hern, A. (2017). Kaspersky: The security firm tries to win back trust after the Russian spying scandal. The Guardian. Retrieved from https://www.theguardian.com/technology/2017/oct/23/kaspersky-lab-security-firm-win-trust-russian-spying-scandal-antivirus
Kabir, E., Hu, J., Wang, H., & Zhuo, G. (2018). A novel statistical technique for intrusion detection systems. Future Generation Computer Systems, 79, 303-318.
Martinelli, F., Marulli, F., & Mercaldo, F. (2017). Evaluating a convolutional neural network for effective mobile malware detection. Procedia Computer Science, 112, 2372-2381.
Nazarenko, M. A., Gorobets, A. I., Miskov, D. V., Muravyev, V. V., & Novikov, A. S. (2019). Antivirus software and industrial cybersecurity system certification in Russia. Russian Technological Journal, 7(1), 48-56.
Periroth, N, & Shane, S. (2017). How Israel Caught Russian Hackers Scouring the World for U.S. Secrets. NYT. Retrieved from https://www.nytimes.com/2017/10/10/technology/kaspersky-lab-israel-russia-hacking.html
Särelä, M., Kyöstilä, T., Kiravuo, T., & Manner, J. (2017). Evaluating intrusion prevention systems with evasions. International Journal of Communication Systems, 30(16), e3339.
Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs a more holistic approach: A literature review. International Journal of Information Get research paper samples and course-specific study resources under   homework for you course hero writing service – Manage ment, 36(2), 215-225.
Wang, L. (2017). Big Data in intrusion detection systems and intrusion prevention systems. J Comput Netw, 4(1), 48-55.
Zhao, L. Z., & Yang, F. (2016). Research on Strategy of Network Antivirus under Virtual Network Environment. Journal of Applied Science and Engineering Innovation, 3(5), 182-184.

Tags:

Order for this Paper or similar Answer/Assignment Writing Service

Place your order by filling a guided instructions form in 3 easy steps.

Why choose our Study Bay Services?

Like every student, Focusing on achieving the best grades is our main goal

Top Essay Writers

We have carefully cultivated a team of exceptional academic writers, each with specialized expertise in particular subject areas and a proven track record of research writing excellence. Our writers undergo rigorous screening and evaluation to ensure they hold relevant advanced degrees and demonstrate mastery of English grammar, citation style, and research methodology. Recent projects completed by our writers include research papers on topics such as sustainable energy policy, cognitive behavioral therapy, and molecular genetics.

Student-Based Prices

We prioritize attracting highly skilled writers through competitive pay and strive to offer the most cost-effective services for students. References from recent years include surveys of customer satisfaction with online writing services conducted by the American Customer Satisfaction Index between 2018 to 2022, demonstrating our commitment to balancing affordable costs with high standards of work through positive reviews and retention of expert writers.

100% Plagiarism-Free

We guarantee 100% original and plagiarism-free final work through a thorough scanning of every draft copy using advanced plagiarism detection software before release, ensuring authentic and high-quality content for our valued customers. To note, we also do not generate assignment content with AI tool, thus you a guaranteed 0% similarity index for your final research paper.

How it works

When you decide to place an order with Study Pro Essay, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and,the support and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.