diff --git a/7 SEMESTER/Management Information System/Week 10/Assignment/Assignment 10.pdf b/7 SEMESTER/Management Information System/Week 10/Assignment/Assignment 10.pdf
new file mode 100644
index 0000000..c2a4de6
Binary files /dev/null and b/7 SEMESTER/Management Information System/Week 10/Assignment/Assignment 10.pdf differ
diff --git a/7 SEMESTER/Management Information System/Week 10/Notes/Week 10 Notes.pdf b/7 SEMESTER/Management Information System/Week 10/Notes/Week 10 Notes.pdf
new file mode 100644
index 0000000..7ef83c5
Binary files /dev/null and b/7 SEMESTER/Management Information System/Week 10/Notes/Week 10 Notes.pdf differ
diff --git a/7 SEMESTER/Management Information System/Week 10/Transcript/Lecture-46.pdf b/7 SEMESTER/Management Information System/Week 10/Transcript/Lecture-46.pdf
new file mode 100644
index 0000000..539ecc4
Binary files /dev/null and b/7 SEMESTER/Management Information System/Week 10/Transcript/Lecture-46.pdf differ
diff --git a/7 SEMESTER/Management Information System/Week 10/Transcript/Lecture-47.pdf b/7 SEMESTER/Management Information System/Week 10/Transcript/Lecture-47.pdf
new file mode 100644
index 0000000..3b1e0ee
Binary files /dev/null and b/7 SEMESTER/Management Information System/Week 10/Transcript/Lecture-47.pdf differ
diff --git a/7 SEMESTER/Management Information System/Week 10/Transcript/Lecture-48.pdf b/7 SEMESTER/Management Information System/Week 10/Transcript/Lecture-48.pdf
new file mode 100644
index 0000000..d24c656
Binary files /dev/null and b/7 SEMESTER/Management Information System/Week 10/Transcript/Lecture-48.pdf differ
diff --git a/7 SEMESTER/Management Information System/Week 10/Transcript/Lecture-49.pdf b/7 SEMESTER/Management Information System/Week 10/Transcript/Lecture-49.pdf
new file mode 100644
index 0000000..85e2bfe
Binary files /dev/null and b/7 SEMESTER/Management Information System/Week 10/Transcript/Lecture-49.pdf differ
diff --git a/7 SEMESTER/Management Information System/Week 10/Transcript/Lecture-50.pdf b/7 SEMESTER/Management Information System/Week 10/Transcript/Lecture-50.pdf
new file mode 100644
index 0000000..0ab5d36
Binary files /dev/null and b/7 SEMESTER/Management Information System/Week 10/Transcript/Lecture-50.pdf differ
diff --git a/7 SEMESTER/Management Information System/Week 11/Assignment/Assignment 11.pdf b/7 SEMESTER/Management Information System/Week 11/Assignment/Assignment 11.pdf
new file mode 100644
index 0000000..ef5d41b
Binary files /dev/null and b/7 SEMESTER/Management Information System/Week 11/Assignment/Assignment 11.pdf differ
diff --git a/7 SEMESTER/Management Information System/Week 11/Notes/Malware Technology Solutions.html b/7 SEMESTER/Management Information System/Week 11/Notes/Malware Technology Solutions.html
new file mode 100644
index 0000000..2c8be72
--- /dev/null
+++ b/7 SEMESTER/Management Information System/Week 11/Notes/Malware Technology Solutions.html
@@ -0,0 +1,192 @@
+
+
+
+
+
+
+
+
+
+ Protection Tool 🛠️ |
+ Definition 📖 |
+ Examples 📝 |
+ Features 🔑 |
+
+
+ Antivirus Software 🦠 |
+ Detects and removes malicious software. |
+ Norton, McAfee, Kaspersky |
+ Real-time scanning, virus removal, heuristic analysis. |
+
+
+ Antispyware Software 👀 |
+ Prevents and removes spyware infections. |
+ Spybot, Malwarebytes |
+ Privacy protection, keystroke monitoring detection, updates. |
+
+
+ Firewall 🔥 |
+ Monitors and controls incoming/outgoing network traffic. |
+ Windows Defender, ZoneAlarm |
+ Packet filtering, access control, intrusion prevention. |
+
+
+ Intrusion Detection System (IDS) 🚨 |
+ Detects suspicious activity in a network. |
+ Snort, Suricata |
+ Signature-based detection, anomaly monitoring, real-time alerts. |
+
+
+ Virtual Private Network (VPN) 🔒 |
+ Encrypts internet traffic for privacy and security. |
+ NordVPN, ExpressVPN |
+ Data encryption, IP masking, secure remote access. |
+
+
+ Password Managers 🔑 |
+ Securely stores and generates passwords. |
+ LastPass, Dashlane |
+ Encryption, auto-fill, password health checks. |
+
+
+ Email Filtering Tools 📧 |
+ Blocks spam and phishing emails. |
+ SpamTitan, Mimecast |
+ Content filtering, domain blacklists, attachment scanning. |
+
+
+ Multi-Factor Authentication (MFA) 🔑🔑 |
+ Adds extra authentication layers for security. |
+ Google Authenticator, Duo |
+ 2FA codes, biometric security, one-time passwords. |
+
+
+ Endpoint Detection and Response (EDR) 💻 |
+ Monitors endpoints for threats and vulnerabilities. |
+ CrowdStrike, Carbon Black |
+ Endpoint monitoring, forensic tools, threat response. |
+
+
+
+
+
+
+ Threat Type 🛡️ |
+ Definition 📖 |
+ Examples 📝 |
+ Properties 🔑 |
+
+
+ Virus 🦠 |
+ A malicious code that replicates by attaching itself to programs. |
+ ILOVEYOU, Melissa |
+ Self-replicating, requires host program, spreads via infected files. |
+
+
+ Bug 🐞 |
+ Software flaw causing unintended behavior or vulnerabilities. |
+ Heartbleed, Shellshock |
+ Exploitable flaws, unintentional errors, patchable. |
+
+
+ Malware 💻 |
+ Malicious software designed to harm or exploit systems. |
+ Ransomware, Trojans |
+ Infiltration, disruption, data theft, various types (adware, spyware). |
+
+
+ Spyware 👀 |
+ Software that secretly monitors user activity. |
+ CoolWebSearch, FinFisher |
+ Tracks user data, keystroke logging, hides in legit software. |
+
+
+ Adware 📢 |
+ Software displaying unwanted ads, often bundled with other apps. |
+ Fireball, DollarRevenue |
+ Intrusive, collects data, slows down systems. |
+
+
+ Ransomware 💰 |
+ Locks or encrypts data until a ransom is paid. |
+ WannaCry, Petya |
+ Data encryption, extortion, spreads via phishing emails. |
+
+
+ Trojan Horse 🐎 |
+ Malicious code disguised as legitimate software. |
+ Emotet, Zeus |
+ Backdoor access, spreads malware, data theft. |
+
+
+ Phishing 🎣 |
+ Fraudulent attempts to steal sensitive information. |
+ Email scams, fake websites |
+ Deception, impersonation, data theft. |
+
+
+ Worm 🪱 |
+ Self-replicating malware that spreads across networks. |
+ Code Red, Mydoom |
+ No host needed, network spread, consumes resources. |
+
+
+ Rootkit 🛠️ |
+ Allows unauthorized access by masking its presence. |
+ ZeroAccess, Flame |
+ Hides in OS, grants administrative control, hard to detect. |
+
+
+
+
+