give your opinion on already posted response 8

Read Response-1 below and give your opinion on response given by one of your classmate. your answer should be supported with research unless the question is opinion oriented.. Responses to discussions below should NOT be “I agree” or “I like the way you stated that.” These responses should again be insightful, offering an opinion or facts based on your research and experiences. The response to one classmate should be a minimum of 200 words. See APA criteria for citing resources.

Describe the best practice to employ to mitigate malware effects on a machine.

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now


The word malware is used to describe the severe issue that software is facing; it is mainly developed to destroy the computers. The term Malware primarily includes the virus called spyware, adware these types of infection are very dangerous for machines, which will damage the software, hardware of the computer (Noëlle, 2017).

The required steps that we need to take to avoid these malware attacks are, regular cleaning of the software, but there is some virus which is not eliminated when we cleanup also, these viruses are ransomware. We also have some cyber security techniques to avoid malware effects and keep ourselves secure and safe. Regular updating of the operating systems, plugins, and browsers is essential if any update is waiting better don’t let it remain the best way is to accept the update. Another way the attack occurs is through social engineering attacks, the step we need to take here is regular checking of the mails, better not to reply to the unnecessary letters by which we may fall in risk.

Sometimes we will get popups saying that they want to help us in securing the system from the malware actions, we can identify whether it is fake or original one is the perfect company or original one never send popup messages it will give a contact number, and the foremost thing is it will charge (McHugh, 2005).

Noëlle Rakotondravony, Benjamin Taubmann, Waseem Mandarawi, Eva Weishäupl, Peng Xu, Bojan Kolosnjaji, … Hans P. Reiser. (2017). Classifying malware attacks in IaaS cloud environments. Journal of Cloud Computing: Advances, Systems and Applications, (1), 1.
McHugh, J. A., & Deek, F. P. (2005). An Incentive System for Reducing MALWARE ATTACKS. Communications of the ACM, 48(6), 94–99.