• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Syllabus
  • Schedule
    • Section 1
      • Week 1: Course Introduction
      • Week 2: Access Controls
      • Week 3: Systems Software Security
      • Week 4: Applications Software Security
      • Week 5: Cryptography Protocols
      • Week 6: Practical Cryptography
      • Week 7: Midterm Exam
    • Section 2
      • Week 8: Business Continuity & Disaster Recovery
      • Week 9: Security Operations
      • Week 10: Physical & Environmental Security
      • Week 11: Security Architecture & Design
      • Week 12: – Network Protocols
      • Week 13: Telecommunications and Network Security
      • Week 14: Risk Management and Compliance
      • Week 15: Final Exam
  • Course Material
    • Case Studies
      • C2.1 (9/11)
      • C4.1 (9/25)
      • C6.1 (10/9)
      • C8.1 (10/23)
      • C9.1 (10/30)
      • C10.1 (11/6)
      • C11.1 (11/13)
    • Practical Assignments
      • PA1.1 (Due 9/11)
      • PA2.1 (Due 9/18)
      • PA4.1 (Due 10/2)
      • PA5 (Due 10/9)
        • PA5.1
        • PA5.2
        • PA5.3
      • PA8.1 (Due 10/30)
      • PA9.1 (Due 11/6)
      • PA10.1 (Due 11/13)
      • PA11.1 ( Due 11/20)
      • PA12.1 (Due 11/27)
      • PA13 (Due 12/4)
        • PA13.1
        • PA13.2
        • PA13.3
    • Written Assignments
      • WA2.1 (Due 9/18)
      • WA3.1 (Due 9/25)
      • WA4.1 (Due 10/2)
      • WA6.1 (Due 10/16)
      • WA8.1 (Due 10/30)
      • WA9.1 (Due 11/6)
      • WA10.1 (Due 11/13)
      • WA12.1 (Due 11/27)
      • WA13.1 (Due 12/4)
  • Webex
  • Gradebook

ITACS 5209 F17

Temple University

Week 9 Case Study

We can all agree about the importance of running antivirus software; no enterprise-class organization would operate without some kind of anti-malware to protect operations.  However, as all of us who use antivirus know, this protection does not come without a cost.  Antivirus frequently uses a lot of system resources, such as processor and memory.  Many users will attempt to disable antivirus when they suspect it is slowing down their computers.  At an operational level, this processing time required by antivirus software represents a hidden cost, and when extrapolated to hundreds of servers or thousands of workstations, is a sizable cost.

Read the following paper which discusses antivirus performance and resource utilization, and ranks the major AV vendors: http://www.anti-malware-test.com/content/antivirus-performance-test-february-2010

This week’s case study group should summarize these findings, provide any insight on whether or not these statistics have changed since 2010, and facilitate a discussion on this topic.

Primary Sidebar

Weekly Discussions

  • Uncategorized (12)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in