Need help with your Assignment?

Get a timely done, PLAGIARISM-FREE paper
from our highly-qualified writers!

Methods of Preventing Viruses-The Kernel

Methods of Preventing Viruses-The Kernel

The Kernel is an important component of the operating system as far as the operation of a computer is concerned. The Kernel is used to coordinate the software and hardware components of the computer. It necessitates the functioning of different programs on the computer together with ensuring that the entire system functions as seamlessly as possible. The Kernel software resides inside the computer memory; hence better control of the computer is determined by the Kernel, and effective approaches can be considered in the regulation of any form of adversities together with setting the organization on the path to success (Singh et al., 2019, p. 8). As the central component of the operating system, the Kernel is responsible for handling, managing, and regulating computer systems and hardware operations. The Kernel is the first component to be loaded whenever the computer system is switched on. It remains in the main memory and acts as an interface between user applications and hardware devices.

Designers have considered installing the software into the Kernel since it is a basic operational unit of the computer. The installed software in the Kernel ensures that this component functions properly by executing programs and controlling the computer (Singh et al., 2019, p. 9). As an integral component of the operating system, the Kernel connects all computer systems, such as hardware, software, and liveware. Therefore, the software that runs on the Kernel has been established to run effectively because this component fully regulates the computer system and all the services it provides (Singh et al., 2019, p. 11). Besides this, one of the best strategies in regulating challenges is based on policy implementation and better decision-making related to what can work best for the computer. In this regard, software programs should be evaluated comprehensively, and better strategies should be developed on how to regulate computer processes and activities.

Using the Kernel software goes a long way in preventing the virus from attacking a computer’s operating system. This is made possible because the Kernel is responsible for executing low-level tasks, including but not limited to disk management, task management, and memory management (Singh et al., 2019, p. 23). When the system call is made, the Kernel examines the content of the call to determine its level of legibility before permitting the computer resources, such as CPU, memory, or files, to execute the requests made (Schoenfield, 2015, p. 215). Therefore, the Kernel acts as a bridge between the user and the resources in the computer system. Apart from these, using the Kernel software is important because it necessitates proper RAM management to ensure that all processes run effectively and efficiently.

As an antivirus designer, there are other methods I would use to prevent viruses from affecting the computers of the users in organizations. One of the methods is to sensitize the public on the importance of avoiding visiting websites that appear suspicious. In the modern environment, there are over a trillion websites that users can use to browse the internet, research, or communicate. Therefore, I would urge users to always check the URL of the website and examine the official sources to determine the legibility of the website and what it presents (Schoenfield, 2015, p. 217). One of the signs that one is visiting a malicious website is the absence of a lock icon next to the URL. Another way for users to prevent viruses from affecting their computers is by scanning email attachments. Email is one of the quickest ways viruses can be transferred from one user to another (Schoenfield, 2015, p. 219). Therefore, to ensure safety, users should scan the emails they receive using antivirus software.

References

Schoenfield, B. S. (2015). Securing systems: Applied security architecture and threat models. CRC Press.

Singh, R., Sahani, M., & Gretton, A. (2019). Kernel instrumental variable regression. Advances in Neural Information Processing Systems32.

ORDER A PLAGIARISM-FREE PAPER HERE

We’ll write everything from scratch

Question 


*ASSIGNMENT 8*

Since it is so dangerous, why would designers install software into the kernel at all (or make use of kernel software)? If you were an antivirus designer or maker, what other methods do you utilize to prevent viruses?
Answer the questions using an APA-formatted paper (Title page, body and references only). Your response should have a minimum of 500 words. Count the words only in the body of your response, not the references. A table of contents and abstract are not required.

Methods of Preventing Viruses-The Kernel

Methods of Preventing Viruses-The Kernel

A minimum of two references are required. One reference for the book is acceptable but multiple references are allowed. There should be multiple citations within the body of the paper. Note that an in-text citation includes author’s name, year of publication and the page number where the paraphrased material is located.
Your paper must be submitted to SafeAssign.

~~~~

*ASSIGNMENT 9*

One of the big challenges with cloud-based reputation checks is performance. Users do not typically want to wait a few seconds while the reputation of potential URLs is checked. Most of us have come to expect that websites are at the immediate tips of our fingers and that access and loading of the content should take place rapidly and immediately. This presents a tricky security problem. Since the reputation service exists in the cloud, the challenge can be summed up as, “How can a reputation be securely retrieved without slowing Web access down so much as to create a poor user experience?”
Answer the questions using an APA-formatted paper (Title page, body and references only). Your response should have a minimum of 500 words. Count the words only in the body of your response, not the references. A table of contents and abstract are not required.
A minimum of two references are required. One reference for the book is acceptable but multiple references are allowed. There should be multiple citations within the body of the paper. Note that an in-text citation includes author’s name, year of publication and the page number where the paraphrased material is located.
Your paper must be submitted to SafeAssign.

Order Solution Now