Strategic Analysis Anti-virus softwares or applications are most instrumental in providing network and computer users the kind of security to protect them from the possible threats posed by viruses and worms to the computer system. Although anti-virus softwares are highly recommendable for to safeguard computer systems, most users do not have access to these types of programs or applications leaving their computer networks susceptible to system failures. The inaccessibility of anti-virus softwares is primarily caused by the inability of most people to afford the high cost of these programs or applications.
Majority of companies who offer anti-virus softwares take advantage of the market’s need of and dependence on these programs and applications. The continuous development and unending presence of viruses and worms only reinforces the will of companies to maintain high cost for their anti-virus softwares. (Vamosi, 2004) An argument presented as a solution to the limited access granted for anti-virus softwares is to look at the relations or connections between the company’s network and home users and realize the importance of subsidizing anti-virus softwares to home or end users.
The company’s network and that of the home users are closely connected, such that the exposure of home network systems to viruses and worms enables the company to identify the structure or design of viruses and worms that attach network systems and engineer new anti-virus softwares or update and improve existing anti-virus softwares to address the problem appropriately and efficiently. Moreover, allowing majority of home users to utilize the company’s anti-virus software will expose IT professionals with numerous types of viruses and worms to work with and various ways in which they intrude or breach home network systems in particular. IT professionals will be able to gain numerous insights about existing viruses and worms and how they may be detected. In addition, knowledge of various types of viruses and worms will provide IT professionals with the raw material in predicting how these viruses and worms will evolve through time. For instance, one common means of inserting viruses and worms in home network systems is through spam mails. Studying the structure of spam mails, and determining how to resolve the problem has become one of the greatest challenges faced by IT professionals. Viruses, worms, and other network problems and failures were foreseen to cause damages and increase the threats and risks in the coming years.
(Gaudin, 2004) By exposing majority of home users with free anti-virus softwares tied up to the network of the company, IT professionals will be able to monitor how viruses and worms enter home network systems and design more appropriate anti-virus softwares that are improved along with the transformation and evolution of existing viruses and worms within computer networks. Although the company’s network system might be at risk for virus and worm interference, allowing the subsidy of anti-virus softwares to strengthen the ability of the company to succeed in its field is worth the effort. Consequently, the ability of the company to address virus and worm problems efficiently, appropriately, and timely will earn a large and loyal client base, allowing the return of investment in due time. Establishing secure network systems is not enough. The system should be managed efficiently in order to maintain the security status of the network. The management part is supposed to be fulfilled by the IT management, IT professionals, and end users as they have earned the capacity to administer and appraise anti-virus softwares. First, the IT management should be able to initiate and handle transformations of organizational practices and operations to promote network security.
For both IT management and professionals concerning the maintenance of a network security, there is a need to make informed choices on how virus and worm intrusions shall be prevented, detected, and resolved. IT professionals are highly experienced in handling network-related situations, that they have the ability to obtain knowledge, information, or data on how these issues shall be addressed through the encouragement and motivation of the IT management. (Gaudin, 2004) On the other hand, end users should also carry out their roles in the maintenance of network security. There is a need for end users to be well-informed of different types of viruses and worms. In order for them to help in maintaining network security, they should be able to learn how viruses and worms are disguised.
For instance, end users should be informed of the various kinds of spam mail that are in truth, carriers of viruses and worms. If the problem depends, then there is a need for individuals to allow the monitoring of network control and use to easily determine how and when the breach or intrusion happened, allowing IT professionals to provide resolutions regarding the problem easily. According to Valmosi, the provision of free anti-virus softwares is possible through the involvement of corporate clients. The high cost of anti-virus softwares should be purchased by corporate clients. Along with the initial fee of accessing anti-virus software services, corporate clients should also pay for the annual fees or subscriptions from which the monitoring and improvement of anti-virus softwares are dependent on. (Vamosi, 2004) From the agreement of corporate clients to pay for anti-virus softwares, the company becomes readily available to offer subsidized anti-virus softwares to home users, allowing safe and secure network systems.ReferencesGaudin, S. (2004).
IT and End Users Differ on Spam Severity. Retrieved November 21, 2008, from Enterprise IT Planet. Website: http://www.enterpriseitplanet.com/security/news/article.
php/3370591Goodin, D. (2006). 2006 InfoWorld Security Survey: ITs Confidence Crisis. Retrieved November 21, 2008, from InfoWorld. Website: h http://www.infoworld.com/article/06/10/30/44FEsecsurvey_1.
htmlVamosi, R. (2004). Antivirus Software Must Be Free. Here’s Why. Retrieved November 21, 2008, from CBS Interactive Inc. Website: http://reviews.cnet.com/4520-3513_7-5124261-1.html