Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

MODULE 5 ASSIGNMENT

Chapter6 Exercises

1. Using the Web, search for “software firewalls.” Examine the various alternatives available
and compare their functionality, cost, features, and type of protection. Create a weighted ranking
according to your own evaluation of the features and specifications of each software package.

Software Cost Functionality Features Protection


Trend Micro $45 for one Trend Micro Titanium  Blocks
Titanium year of Maximum Maximum viruses,
Maximum protection on Security Security 2014 spyware,
Security up to three provides includes a worms, and
2014 PCs. comprehensive feature called Trojans,
protection for System Tuner preventing
your Windows, that helps infection of
Mac, Android, optimize the your
iOS, and performance of computer
Chromebook your computer.  Protects
devices. This For against
includes safeguarding spyware by
protection children identifying
against online, dangerous
ransomware, parental links in
viruses, controls let websites,
malware, you restrict or social
spyware, and filter website networks,
identity theft. access. emails, and
Ensure that your Furthermore, instant
online banking this software messages
and shopping is offers the
secure with Pay Vault, which
Guard. New safely stores
feature Fraud sensitive files,
Buster adds an manages your
extra layer of passwords, and
security by provides 5GB
guarding you of online
against scams storage.
and phishing
emails.
ZoneAlarm $44.95 per Monitors Program  Has an
Internet year changes to your include advanced
security 2013 computer, and advanced anti- module that
blocks attacks virus and web protects
that use new filtering against
technology that viewed. downloadin
does not have g dangerous
the usual files and
antivirus. protects
Further, the your
package you computer
will find a two- while using
way firewall, the
parental control, BitTorrent
scanner, identity network.
protection, anti-
spam, anti-
phishing, etc.
Comodo FREE Provides will React instantly  Protects
Firewall quickly allow or to these threats your system
2013 block access to by identifying against
the internet, bandwidth internal
immunize your bottlenecks attacks such
system against with real-time as Trojan
attacks, and traffic viruses/mali
give you total monitoring cious
protection over features. The software and
your personal Silent Security external
information. Technology attacks by
feature means hackers
no needless
alerts with out-
of-the-box
protection
against
hackers,
trojans, and
other unknown
threats.

You might also like