ISOL534 UofCumberlands how Should I Protect My Windows PC from Malware and Viruses?

User Generated

fhwvgu8087

Writing

ISOL534

University of cumberlands

Description

Mini Research Paper

The format of your paper will need to follow the following outline in APA format (include title page, abstract page, content pages, and reference page):

INTRODUCTION

  • State the topic you are attempting to cover
  • State the issues involved
  • State why we should be concerned with resolving whatever issues are involved
  • State how answering the issues will help us
  • State the implications and consequences of dealing with or resolving the issues involved

REVIEW OF THE LITERATURE (2 sources minimal, at least 1 needs to be peer-reviewed)
Identify who has tried to answer the question before by doing the following:

  • Summarize how each of the sources presents and deals with the subject
  • Explain how each source presents and deals with its findings or results
  • Explain the relevancy of each source to your topic
  • State what you learned from each of your sources
  • State in what way(s) each source contributes to answering your issues

DISCUSSION

  • State your answer to your issue
  • State how and elaborate on how, explain how, illustrate how each of the sources you previously reviewed help you answer your issue
  • State what questions about your topic you still have that your sources may not have answered

CONCLUSIONS

  • Indicate how each of the sources have contributed to your conclusions (and clearly, accurately, correctly document those sources within your text)
  • State the implications of your conclusions
  • State what might be the possible consequences of your conclusions
  • State the significance these implications and consequences might have in the information technology / information security realm

DOCUMENTATION

  • On a separate page, include a section labeled References which provides the full publication information for all the sources you used in your paper
  • You should have a MINIMUM of three (2) sources for your paper, at least 1 source needs to be peer-reviewed
  • Not meeting this minimum requirement of three (2) sources will lead to a lower evaluation of your paper for each missing source
  • Use APA format for documenting your sources

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running Head: PROTECTING WINDOWS FROM MALWARE

Protecting Windows from Malware
Author’s Name
Institute Affiliation

1

2
PROTECTING WINDOWS FROM MALWARE

Table of Content
Abstract .................................................................................................... Error! Bookmark not defined.
INTRODUCTION ....................................................................................................................................... 4
LITERATURE REVIEW ............................................................................................................................... 4
The First Literature.............................................................................................................................. 4
The Second Literature ......................................................................................................................... 5
DISCUSSION............................................................................................................................................. 6
CONCLUSION........................................................................................................................................... 7
REFERENCES ............................................................................................................................................ 8

3
PROTECTING WINDOWS FROM MALWARE

Abstract
Several studies have been done by many individuals as well as organizations and all
have indicated that the malware (nasty software) has been developing ad their impacts on our
PCs have been getting worse. Malware is known to damage the PCs without the owner's
consent. This is a study on how we can protect our Windows PCs against malware infections
that include consumer's protection of their identities online. This paper also includes a
detailed explanation of measures to include in our computi...


Anonymous
Super useful! Studypool never disappoints.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags