Theme End-user security software scans computers for pieces of malicious code,quarantines this code, and then removes it from the machine. Securityprograms can even detect and remove malicious code hidden in Master BootRecord (MBR) and are designed to encrypt or wipe data from a computershard drive. Electronic security protocols also focus on real-time malwaredetection. Many use heuristic and behavioral analysis to monitor the behaviorof a program and its code to defend against viruses or Trojans that change their shape with each execution (polymorphic and metamorphic malware). Securityprograms can confine potentially malicious programs to a virtual bubbleseparate from a user's network to analyze their behavior and learn how tobetter detect new infections. Security programs continue to evolve newdefenses as cyber-security professionals identify new threats and new ways tocombat them. To make the most of end-user security software, employeesneed to be educated about how to use it. Crucially, keeping it running andupdating it frequently ensures that it can protect users against the latest cyberthreats.
Explain why is the top-down approach to information security superior to thebottom-up approach?