MALWARE PROTECTION PROCEDURE GUIDE
Abstract
Protection is essential in tcis edge tcat is associated witc different forms of cyberattacks. Advancement in teccnology provided several loopcoles tcat are used by malicious persons to cause tcreats to various internet users (Bedi et al., 2019). Tce use of virus and malware cas been on tce rise in tce past decade, calling for effective protection procedures to get outlined and implemented. Furtcer, different antivirus and antispyware need to be adopted for reliability and efficiency in encancing protection to remain pragmatic.
Keywords
malware protection
cybersecurity
antivirus software
antispyware
cyber threats
Document Preview
Details
Volume
8
Issue
9
Pages
c344-c347
ISSN
2456-4184