Antivirus Protection & Internet Security Software
Vulnerable Software Infographic
Vulnerabilities – within an operating system (OS) or an application – can result from:
If vulnerabilities are known to exist in an operating system or an application – whether those vulnerabilities are intended or not – the software will be open to attack by malicious programs.
Of course, it’s possible to design an OS in a way that prevents new or unknown applications from gaining reasonably broad or complete access to files stored on the disk – or getting access to other applications running on the device. In effect, this type of restriction can boost security by blocking all malicious activity. However, this approach will also impose significant restrictions on legitimate applications – and that can be very undesirable.
Here are some examples of closed and partly-closed systems:
If desktop operating systems, such as Windows or MacOS, were based on the principle of the ‘closed system’, it would be much more difficult – and maybe impossible in some cases – for independent companies to develop the wide range of third-party applications that consumers and businesses have come to rely on. In addition, the range of available web services would also be much smaller.
The Internet – and the world in general – would be a very different place:
To some extent, the risks that system vulnerability and malware bring may be the price we have to pay for living in a world where technology helps us to achieve our work and leisure objectives… more rapidly and more conveniently. However, choosing a rigorous antivirus solution can help to ensure you can enjoy technology’s benefits – in safety.
To discover the other factors that enable malware to thrive and survive, please click the following links:
Other articles and links related to Exploits and Vulnerabilities
© 1997 – 2016 Kaspersky Lab
All Rights Reserved. Industry-leading Antivirus Software