Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{156143,
author = {R.Arjunarao and KurraHarshaKeerthi},
title = {MALWARE PROTECTION USING TRADITIONAL SECURITY TOOLS},
journal = {International Journal of Innovative Research in Technology},
year = {},
volume = {9},
number = {2},
pages = {12-17},
issn = {2349-6002},
url = {https://ijirt.org/article?manuscript=156143},
abstract = {In today’s digital world everyone is becoming (or) part of it. Digital technology has become integral part of everyone’s life and is being used from day to day works such as purchase of daily needs, bill payments, etc. to complex tasks/works such as handling air traffic control. While using the technology one of the primary concerns to all is privacy, availability, security of the information stored/transmitted by using the digital technology/device. Denial of access to the information, interruption in the process while accessing any data or device/system when required by the authorised user is one of the main issues in this digital world. In digital world this type of cybercrimes can be carried out from any part of the world which is contrary to conventional crimes. Malware is one of the main threats to any individual device or organisation systems. It will have a great impact on the CIA of the information security i.e., Confidentiality, Integrity and availability as malwares compromise them. End point/user of any process is very important because maximum crimes can be avoided if the end point/end user of the process/device is cautious and this is the main concern in this project/research. This project/research is about, to know what is malware, steps to be taken by individual/organisation for mitigation, prevention and control of malware attacks. This is carried out by studying the traditional tools/methods available for End point security of any system.},
keywords = {Malware, detection, networks, security, ransome, infected,encryption},
month = {},
}
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry