Comparative Analysis Finals

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 15

Republic of the Philippines

Laguna State Polytechnic University


Province of Laguna

A COMPARATIVE ANALYSIS OF ANTI-VIRUS SOFTWARES


___________________________________________________________________

A project to pass to:


MIKE PHILIP T. RAMOS
Teacher Professor-Information Technology
Laguna State Polytechnic University – Los Baños, Campus
Los Baños, Laguna

___________________________________________________________________

As part of the requirements of the Information Technology subject:


IT APPLICATION TOOLS IN BUSINESS

___________________________________________________________________

The Researchers:
Dompor, Yashmien C.
Lambit, Zai Maery C.
Mateo, Apple Jane
Soriano, Ameth Trish E.
Villamayor, Cristina M.
___________________________________________________________________

1st Semester 2023-202


Introduction
The progression of Information Technology (IT) tools has been characterized by
notable advancements that have fundamentally altered how individuals and entities
handle, analyze, and convey information. With this evolution different IT tools merge in
helping individuals and entities such as businesses to maximize their competitive edge.
Businesses use IT tools to aid in optimizing the operational landscape of businesses,
resulting in enhanced efficiency, better decision-making, and ultimately, heightened
profitability.
The introduction of different IT tools in business made it accessible to store
information about the business, however if the information is not secured and was used
maliciously it can lead to the downfall of the business, this led businesses to use Data
Security as a premeasure to safeguard valuable assets.
Data security involves safeguarding corporate data and averting unauthorized
access to prevent data loss. This encompasses shielding data from threats capable of
encrypting or damaging it, like ransomware, as well as threats capable of altering or
compromising its integrity. Data security is important to businesses because it involves
the implementation of measures to safeguard digital information from unauthorized
access, corruption, or theft throughout its complete lifecycle. This concept covers
various facets of information security, ranging from the physical protection of hardware
and storage devices to administrative and access controls, along with the logical
security of software applications. It also encompasses organizational policies and
procedures.
With the increasing risks of cyber threats and incidents of data breaches, it is
imperative for businesses to implement measures protecting sensitive data from
unauthorized access and theft. There exist diverse data security technologies designed
to aid in this effort, each with unique functions and applications. These include Firewalls,
Encryption, Intrusion Detection and Prevention Systems (IDPS), Security Information
and Event Management (SIEM), File Integrity Monitoring (FIM), secure Email Gateways,
Antivirus and Anti-Malware Software, Virtual Private Networks (VPNs), Multi-Factor
Authentication (MFA), and Access Control Systems.
Anti-virus software stands out as a widely utilized data security measure. It is a
security application, also recognized as antivirus programs, crafted to prevent, detect,
scan, and eliminate viruses and various forms of malware across computers, networks,
and other devices. Typically, part of comprehensive security suites, this software is
available independently as a standalone solution. It is commonly installed on computers
to mitigate potential cyber threats.
The key benefit of antivirus software is its capacity to protect against harmful
viruses, such as malware and spyware. It guarantees system security by automatically
blocking pop-ups and spam from malicious websites, while also restricting access to
these detrimental sites. Acting as a real-time shield, antivirus software conducts scans
on all incoming files and programs. In the event a file is quarantined, it is segregated
from the rest of the system and its programs, thereby minimizing the risk of potential
damage.
Each business functions within its own distinct environment, characterized by
unique dynamics and requirements. In choosing antivirus software there are different
software choices available, such as Norton, McAfee, Bitdefender, and Total AV, each
providing a range of features and capabilities. It is essential to acknowledge that the
effectiveness of antivirus software can vary and choosing the most appropriate option
hinges on individual needs, system specifications, and personal preferences.

Review of Related Literature


In today’s digital world, there are growing threats in every business, regardless of
its size, is a potential target of cyber-attack. Every company has valuable data, such as
finances and sensitive data, which malicious individuals may seek to misuse. These
assets can range from tangible items like money to confidential records and innovative
concepts. Understanding the typical reasons for cyber-attacks can help you gain insight
into the potential risks you might encounter and determine the most effective ways to
address them. It’s typically occurred due to criminals seeking access to a range of
valuable assets, including a business's financial information, customer financial details
such as credit card data, sensitive personal data, email addresses and login credentials
of customers or staff, customer databases, client lists, IT infrastructure, IT services such
as the ability to accept online payments, and intellectual property like trade secrets or
product designs.
The common issues related to cyber-attacks encompass a wide range of threats
that can have severe implications for individuals and organizations. Data breaches,
which involve unauthorized access to sensitive information, are a prevalent concern.
Ransomware attacks, where cybercriminals encrypt data and demand payment for its
release, pose a significant risk to businesses and individuals. Phishing attempts, which
involve fraudulent emails or messages aimed at obtaining sensitive information, are
another widespread issue. Additionally, malware infections, such as viruses, worms, and
trojans, can compromise the security of computer systems and networks. DDoS
(Distributed Denial of Service) attacks, which overwhelm a system with traffic, leading to
service disruption, are also a common threat. Insider threats, posed by individuals within
an organization, can also result in data breaches and other security incidents. These
cyber-attack issues can lead to substantial financial losses, reputational damage, and
compromised data security. Organizations and individuals must remain vigilant and
implement robust cybersecurity measures to mitigate these risks. This includes
investing in cybersecurity tools and technologies, providing comprehensive training to
employees to recognize and respond to cyber threats, and establishing incident
response plans to address potential security breaches. Additionally, staying informed
about emerging cyber threats and adhering to best practices for data protection and
network security is crucial in safeguarding against these common cyber-attack issues.
Due to innovation of technology today, it has become part of our lives. Even
though computers help our lives to be better, there are still threats and challenges that
are constantly changing from time to time. So, the Anti Viruses software is created. The
purpose of antivirus software, often known as antivirus programs, is to safeguard
computers, networks, and other devices against viruses and other malicious software by
preventing, detecting, and eliminating them. According to Yasar (2023), the "Antivirus
Software Market" refers to the global industry involved in the development and
distribution of software programs designed to protect computer systems from malicious
software and cyber threats. Antivirus software detects, prevents, and removes malware,
viruses, ransomware, and other cybersecurity risks. It plays a critical role in
safeguarding personal and business data, ensuring system security, and maintaining
the integrity of digital environments. The market offers a variety of antivirus software
solutions, including standalone applications, integrated security suites, and cloud-based
offerings. Key players in the market continually innovate to keep up with evolving cyber
threats, providing enhanced features such as real-time scanning, behavioral analysis,
and machine learning algorithms. The Antivirus Software Market is driven by the
increasing frequency and complexity of cyber-attacks, growing awareness about data
security, and the rising adoption of digital technologies across industries. With the
ongoing need for robust cybersecurity measures, the market is expected to witness
significant growth in It detects any potential virus and then works to remove it. It also
blocks spam and ads. Also helps to protect potential hackers and data thieves.
According to Townsend (2019), Anti-Virus Software can often interfere with
updates, either by preventing them, or harboring them incomplete. Therefore, people
often must disable their software while updating their system, firmware, or programs.
One example is Steam, a video game distribution program, stating on their website that
“some malware tools may interfere with Steam”, and urging users to make educated
exceptions to allow Steam to run normally. In recent years, there has an advance of
malware and viruses as the anti-viruses keep innovating. As cyber threats become more
sophisticated, antivirus software may struggle to detect. The rise of ransomware attacks
poses a significant challenge, as these malicious programs can encrypt user data,
demanding payment for decryption keys. Antivirus solutions may not always catch new
variants quickly enough. Malware creators employ evasion techniques to avoid
detection by traditional antivirus programs. According to the users Some antivirus
solutions can be resource-intensive, impacting system performance and slowing down
devices, especially on older hardware.
According to Choo, K.R. & Walls, J. (2017) Android devices becoming
increasingly popular and the number of malware apps targeting them, it is important to
ensure the security and privacy of user data and to prevent the device from being
compromised. We study safety hazards and vulnerabilities related to Android in this
section, as well as perform a systematic assessment of 15 common free antimalware
applications using 11 recognized malware samples gathered from the Contagio Mobile
Malware Mini Dump database between Feb. 27, 2014, and Aug. 3, 2014. The
assessment generated outcomes that varied considerably across all three Android
operating systems and hardware test devices by conducting a manual experiment to
replicate potential daily threats to unknowingly install malicious applications.
In the past year the Philippines experienced a series of cyberattacks in
government websites and private organizations. These extensive data breaches have
posed threats to national security, compromising the personal information of millions of
citizens.
Finland-based web security organization F-Secure has discovered a malware
focusing on the secret data of government and private associations, including the
Philippines' Department of Justice. The coordinators of the Asia-Pacific Economic
Cooperation (APEC) Summit held in Manila last November and an anonymous
unmistakable worldwide law office, which spoke to Philippines during the mediation
case, were not saved from the digital security assault, as per reported by CNN
Philippines’ reporters Gotlinga & Tan (2016) on suspected Chinese Spyware used to
attack the Philippines government. Malicious software and viruses are as common as
ever, which is why it is as essential as ever to have antivirus software. But as safety
specialists like to call it the "threat landscape" is evolving. And that implies your strategy,
and your information should also develop to protect your identity. It may not be enough
to have antivirus alone. Antivirus softwares should also be updated and improve its
features. (Symanovich, 2019)

Case Study
In the rapidly changing field of data security, selecting antivirus software
becomes a pivotal choice, directly impacting the robustness of digital systems. By
conducting a thorough comparative examination of factors such as Detection, features,
system performance, user-friendliness, update and support, comparability, and cost,
both business and individuals can make informed choices to strengthen their security
measures against the constantly expanding range of cyber threats. Several antivirus
programs have gained popularity in the market due to their exceptional performance
and the advantages they offer to their users.
Different Anti-Virus Software and their Features
McAfee is known for its multi-device coverage, allowing users to protect multiple
devices under a single subscription. It offers protection against various online threats. It
is a popular choice for users seeking a wide range of cybersecurity features and
protection across multiple devices.
Detection and Protection
McAfee is known for its robust detection capabilities against various types of malwares,
like viruses, trojans, worms, ransomware, spyware, and phishing attempts.
Security Features
McAfee offers the following features: Real-time Scanning, Firewall Protection, Safe Web
Browsing, Identity Theft Protection, Performance Optimization, Multi-Device Coverage,
Password Manager. McAfee's security combines these features to create a defense
against cyber threats, making it a popular choice for users seeking a wide range of
protective measures.
System Performance
Certain users have noted that McAfee can have a noticeable impact on system
performance, particularly during activities like scans or updates, as it tends to be
resource intensive. Consequently, McAfee consistently focuses on refining its software
to reduce its impact on system resources. This involves implementing performance
optimization measures to improve overall system speed by clearing temporary files and
optimizing storage.
Ease of Use
McAfee antivirus software is user-friendly. Its interface tends to be intuitive and
straightforward, for it to be accessible for users with different levels of technical
expertise.
Updates and Support
McAfee provides regular updates to its antivirus software to make sure to protect the
system from evolving viruses.
Compatibility
It is designed to be compatible with various operating systems and devices, such as
Windows, MacOs, Mobile phones (android and IOS).
Cost
Prices can vary based on the number of devices covered, the level of protection, and
additional features included in the subscription.

Conclusion
While McAfee's known for its multi-device coverage and user-friendly interface, some
users have reported issues related to system performance. However, McAfee responds
to it and create ang action to improve its performance. The ease of use, regular
updates, various support options, and compatibility across multiple operating systems
and devices contribute to making McAfee a popular choice among users seeking
reliable and extensive protection.
Norton has advanced protection with antivirus software that helps shield your
device from known and unknown online threats and helps safeguard your personal and
financial data. It is arguably the most feature-rich antivirus program, has good real-time
protection, and has excellent rates of detecting malware. Norton provides a
comprehensive set of security features to protect your device:
Detection and Protection
Norton's defense is built on machine learning, which lead to great malware detection.
They offer strong detection and defense against a range of cyberthreats are. It makes
use of cutting-edge antivirus and anti-malware technologies like machine learning,
behavioral analysis, to find and stop harmful software and real-time scanning. Frequent
updates guarantee that the program remains up to date with the newest threats, and
Norton's large database aids in the identification of known malware signatures.
Proactive tools like heuristic analysis are also included in the software to help detect
new and developing risks. To improve system security, Norton seeks to provide
thorough detection and defense against a variety of cyberthreats. Norton is a popular
antivirus program that usually comes with features like firewall, identity protection, real-
time threat protection, secure VPN.
Security and features
Norton offers advanced antivirus and anti-malware capabilities to detect and remove a
wide range of threats, including viruses, ransomware, and spyware. A built-in firewall
improves the overall security of your device by preventing unauthorized access by
monitoring and managing incoming and outgoing network traffic. Norton also has a
firewall that keeps an eye on and regulates network traffic to prevent unwanted access.
It also helps protect and secure your personal information and online transactions,
safeguarding against identity theft and phishing attempts.
System Performance
Unlike many other antivirus products, Norton's virus protection features detected no
false positives, caught 100% of zero-day malware, and reduced system load time. Their
virus defense is hence impenetrable. As per the user’s feedback, Norton 360 continues
to work even after removing certain files, terminating the application's processes. 4.)
Ease of use Both beginners and advanced users will be able to navigate the well-
designed user interface. Whether you’re on desktop or mobile, Norton makes it easy to
use the full suite of security features, as well as any additional apps you choose that
makes it a user-friendly platform.
Updates and Supports
Updating the most recent version of Norton might give you with and solve a lot of issues
with older versions. Security that leads the industry and doesn't impede your speed. It
protects your identity and computer from emerging online threats. and provides the
most recent virus protection.
Compatibility
PCs, Macs, Android smartphones and tablets, iPads, and iPhones are all compatible
and able to use Norton Secure VPN. Throughout the duration of the subscription,
Norton Secure VPN may be used on the designated number of devices indefinitely.
Cost
Norton is worth the price depends on your specific needs and preferences. Norton
provides a selection of cybersecurity products with features like firewalls, antivirus
defense, and anti-identity theft measures.
Conclusion
In conclusion, using Norton can enhance your digital safety by safeguarding against
various online threats and providing a secure browsing experience. The effectiveness of
needs is still depending on the user’s issue. There's not a hundred percent perfect anti-
virus because, Afterall, the provider of anti-viruses is also the creator of such viruses
and problems.
BITDEFENDER Renowned for being a top cybersecurity provider, creating and
offering a range of internet security suites, antivirus software, and other cybersecurity
products for consumers, companies, and organizations. Their main goal was to develop
software that would fend off threats such as ransomware, viruses, and malware that
might jeopardize the security and privacy of data and devices. In terms of:
Detection and Protection
For its superior malware detection and eradication capabilities, Bitdefender often
receives top marks in independent lab testing. Behavioral detection, machine learning,
and cloud-based scanning are some of the cutting-edge technologies it uses to provide
complete protection.
Security Features
Numerous features are available, including parental controls, webcam security,
ransomware protection, online attack avoidance, VPN (in some versions), password
manager, file shredder, and real-time scanning.
System Performance
When compared to other antivirus software, Bitdefender is renowned for having the
least negative effect on system performance. Without appreciably slowing down your
device, it operates well in the background.
Ease of Use
Although Bitdefender can be difficult to set up, the program is simple and light, so you
shouldn't have any major problems using it once it's installed.
Updates and Support
To deliver the most recent security, Bitdefender updates its software and malware
definitions on a regular basis. Additionally, it provides a range of assistance avenues,
such as customer service, forums, and online manuals.
Compatibility
It is compatible with various operating systems, including Windows, macOS, Android,
and iOS.
Cost
Bitdefender offers different packages where prices vary based on the subscribed
product, subscription duration, and the number of devices covered/
Conclusion
Bitdefender is a top choice for users seeking reliable and powerful antivirus protection
with a range of features and minimal impact on system performance.
TOTAL AV Is a cybersecurity company that offers antivirus and security software
solutions for personal and business use. In terms of:
Detection and Protection
The objective of Total AV is to locate and eliminate malware in all its forms, including
trojans, spyware, ransomware, viruses, and phishing scams. It protects devices from
malware, viruses, ransomware, and other internet threats using a variety of tactics,
including antivirus scanning, real-time protection, and optimization tools.
Security Features
Several functions are available with Total AV, such as firewall, ad blocker, password
manager, VPN (limited in some versions), antivirus protection, and real-time scanning.
Its feature set is designed to offer complete security solutions for different types of
users.
System Performance
Regarding its effect on system performance, users have claimed varying degrees of
experience. While some find it less obtrusive than other antivirus software, others
complain it is resource-intensive and may slow down their devices.
Ease of Use
Total AV is designed to be intuitive and user-friendly, with straightforward navigation and
easy-to-access features.
Updates and Supports
The software typically provides regular updates to its antivirus database to ensure
protection against the latest threats. Additionally, it offers customer support services to
assist users with installation, troubleshooting, and any queries they might have
regarding the software or their subscriptions. Support is commonly available through
email, live chat, or phone, depending on the subscription plan.
Compatibility
Total AV is compatible with Windows, macOS, iOS, and Android devices. It offers
specific versions tailored for each operating system to provide protection against
malware, viruses, and other online threats.
Cost
Total AV's antivirus software varies based on several factors, including the type of
subscription, the number of devices covered, and the duration of the subscription plan.
Conclusion
Regarding its product efficacy and marketing strategies, Total AV has encountered
considerable doubt. To find out if Total AV suits your cybersecurity requirements and
preferences, it's critical to assess your unique requirements, study reviews, and
consider independent testing.
Survey and Interviews

Feature Norton MacAfee Total AV Bitdefender

This anti-virus It has perfect lab


scores and Doesn’t require Fast and Secure
software not only
outstanding real- any technical VPN
quarantines
world expertise. Best Firewall
suspicious files
performance; this Simple & User- security
for inspection, but
tool inspires Centric Interface
also alerts you
confidence with Hardly interfere
Pros about potentially
its proactive Easy on the with other
dangerous
defense against Memory software
websites before
malicious Consumption
you click, saving
software. It's like Quick installation
you from
having a digital One-Click
accidental
guardian angel, Installer Value for Money
malware
intrusions. vigilantly
safeguarding your Top-class
system from even security rating
the most cunning
threats. Malware
detection

Secure system
mode for every
situation

Price might be an Despite No Real-Time High price rate


issue, but they impressive Antivirus Security
Weak offline
could perform a performance in in Free Package
free trial at the lab tests and real- security
beginning for world trials, this Longer Time to
Cons people to check. software raises Complete Full Continually ask to
concerns due to System Scan upgrade your
Regular online its vulnerability to plans.
scans are ideal, a customized Password Vault
even with their ransomware
Only in Premium Not Unlimited
frequent updates, sample, and the
because new noticeable Add-On Package access to VPN
viruses can still withdrawal of
slip through. several valuable Take more time
features from than usual to
previous scan.
iterations. These
critical
shortcomings
warrant careful
consideration
before embracing
this solution.

Conclusion and Recommendations

Conclusion

In conclusion Bitdefender stands out for reliability, minimal system impact, and strong
detection capabilities, making it suitable for users seeking robust protection. Total AV
has a comprehensive feature set, but mixed user reviews regarding system
performance indicate the need for individual assessment based on specific
requirements. McAfee offers multi-device coverage and a wide range of features, but
some users report issues with system performance, although ongoing efforts to optimize
are observed. Norton is feature-rich with excellent detection rates and efficient
performance, yet individual preferences and needs ultimately dictate its effectiveness.

Recommendation

Choosing the right anti-virus software requires tailoring recommendations to specific


needs. Individual users benefit from lightweight options like Bitdefender Antivirus Plus,
while businesses and advanced users require feature-rich solutions like Bitdefender
Total Security or Norton 360. Scalability and multi-device protection are crucial for
businesses, with Bitdefender GravityZone and McAfee Endpoint Security Suite ideal for
large enterprises. Consider industry-specific needs and explore other brands like
Kaspersky or ESET for budget-friendly or parental control options. Remember, go
beyond anti-virus, recommending layered defenses like firewalls and user awareness,
and encourage further research with resources like independent reports to help
everyone choose the best solution for their unique needs.

References

Asia Pacific Foundation of Canada (2023, November 7), Data Breaches Plague
Philippines as Country Scrambles to Bolster Cyber Defences. Asia Pacific Foundation of
Canada. https://www.asiapacific.ca/publication/data-breaches-plague-philippines-
country-scrambles-bolster#:~:text=In%20April%202023%2C%20a%20massive,the
%20Bureau%20of%20Internal%20Revenue.

Choo, K.R. & Walls, J. (2017). Effectiveness on Installing Antivirus Software on


Malware Prevention. Studocu. https://www.studocu.com/ph/document/universidad-de-
manila/bachelor-in-information-technology-with-specialization-in-data-science/
effectiveness-of-installing-antivirus-software-on-malware-prevention/32281136

CrowdStrike. (2023, November 9). 10 most common types of cyber attacks today
- CrowdStrike. Retrieved from
https://www.crowdstrike.com/cybersecurity-101/cyberattacks/most-common-types-of-
cyberattacks/
CSRC Content Editor. (n.d.). Cyber Attack - Glossary | CSRC. Retrieved from
https://csrc.nist.gov/glossary/term/cyber_attack
Danao, M. (2023, December 04). McAfee Antivirus Review 2024: Features,
Pricing & More. Forbes. Retrieved from
https://www.forbes.com/advisor/business/software/mcafee-antivirus-review/
Glamoslija, K. (2024, January 02). Bitdefender Review 2024 — Is It a Good
Antivirus? Safety Detectives. Retrived from https://www.safetydetectives.com/best-
antivirus/bitdefender/

Gotlinga. 2016. Effectiveness on Installing Antivirus Software on Malware


Prevention. Studocu. Retrieved from
https://www.studocu.com/ph/document/universidad-de-manila/bachelor-in-information-
technology-with-specialization-in-data-science/effectiveness-of-installing-antivirus-
software-on-malware-prevention/32281136

Imperva Inc. (n.d.), Data Security, Imperva Inc.


https://www.imperva.com/learn/data-security/data-security/

Iwuozor, J. 2023, December 1. Norton Antivirus Review 2024: Pricing, Pros &
Cons. Forbes advisor. Retrieved from
https://www.forbes.com/advisor/business/software/norton-antivirus-review/

Jankevičiūtė, D. 2023, December 18. Norton 360 Antivirus Review (2024): Is It


Any Good?. Cybernews. Retrieved from https://cybernews.com/best-antivirus-
software/norton-antivirus-review/#:~:text=Not%20only%20is%20Norton
%20antivirus,protection%2C%20performance%2C%20and%20usability.

Johnson, J. (2023, August 9), 12 Different Types of Data Security Technology


and When to Use Each, History-Computer. https://history-computer.com/different-types-
of-data-security-technology-and-when-to-use-each/

Karbauskas, S. (2023, December 15). Bitdefender Antivirus review. Cybernews.


Retrived from https://cybernews.com/best-antivirus-software/bitdefender-antivirus-
review/

McAfee AntiVirus Review. Retrieved from


https://www.pcmag.com/reviews/mcafee-antivirus-plus
Mosopefoluwa.Amao. (2023, June 13). Insider threat vs outsider threat: Which is
worse? Information Security Buzz. Retrieved from
https://informationsecuritybuzz.com/insider-threat-vs-outsider-threat-which-is-worse/

NI Business Info. (n.d.). Reasons behind cyber attacks | nibusinessinfo.co.uk.


Retrieved from https://www.nibusinessinfo.co.uk/content/reasons-behind-cyber-attacks
Symanovich. 2019. Effectiveness on Installing Antivirus Software on Malware
Prevention. Studocu. Retrieved from
https://www.studocu.com/ph/document/universidad-de-manila/bachelor-in-information-
technology-with-specialization-in-data-science/effectiveness-of-installing-antivirus-
software-on-malware-prevention/32281136
Taylor, S. (2021, March 18), Data Security, Corporate Finance Institute.
https://corporatefinanceinstitute.com/resources/data-science/data-security/

Technologies, S. (2023, April 27). What are script kiddies in cybersecurity. Retrieved
from https://www.sangfor.com/glossary/cybersecurity/what-are-script-kiddies
Townsend, C. 2019. Cybersecurity Magazine. Retrieved from
https://www.uscybersecurity.net/anti-virus-software/#:~:text=Anti%2DVirus%20Software
%20can%20often,system%2C%20firmware%2C%20or%20programs.

TrustRadius. (2023, December 14). First impression of Norton 360 Antivirus.


Retrieved from https://www.trustradius.com/products/norton/reviews?qs=pros-and-
cons&fbclid=IwAR1uFa49Ngvlao2Om_QNmCf3KqW9wtAOCF3XT2kUk9CJKQqY2FK-
eHwSheA#overview
Valiaugaite, I. (2024, January 04). TotalAV Antivirus review. Cybernews. Retrived
from https://cybernews.com/best-antivirus-software/totalav-antivirus-review

Yasar, K. (2023, March), Antivirus Software (Antivirus Program), Tech Target.


https://www.techtarget.com/searchsecurity/definition/antivirus-software

Yasar, K. 2023. Techtarget. What is Antivirus Software. Retrieved from


https://www.techtarget.com/searchsecurity/definition/antivirus-software

You might also like