Antivirus Software Troy Behmer. Outline Topics covered: – What is Antivirus software (AVS)? – What are the advantages and disadvantages of AVS? – What.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

1. Intro What is PremiumAV? Antivirus engine Features of PremiumAV. Classification of PremiumAV. PremiumAV LAB Re-Branding or Private Label Why Re- Branding.
Day anti-virus anti-virus 1 detecting a malicious file malware, detection, hiding, removing.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
By Joshua T. I. Towers $13.3 billion was the direct cost of malware for business in 2006 “direct costs are defined as labor costs to analyze, repair.
Nasca Internet Networking and Security viruses.
Computer Security Fundamentals by Chuck Easttom Chapter 5 Malware.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Towards Extending the Antivirus Capability to Scan Network Traffic Mohammed I. Al-Saleh Jordan University of Science and Technology.
No.24 Prerawat Denvutivorkarn M.2/2. Definition: "antivirus" is protective software designed to defend your computer against malicious software. Malicious.
GROUP MEMBERS ALI RAZA EHTASHAM ZAFAR SOHAIB AHMED BILAL HASSAN FAHAD ABDUL AZIZ.
What is it, how does it work, and why is it important?
Beyond Anti-Virus by Dan Keller Fred Cohen- Computer Scientist “there is no algorithm that can perfectly detect all possible computer viruses”
Viruses and their Cures Catherine Agnew CEDu 581 – Oconomowoc.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
eScan Total Security Suite with Cloud Security
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Hacker Zombie Computer Reflectors Target.
Virus & Anti-Virus Itthiwat Phiphopsukhawadee M.2/7 No.5 Saranpat Prasertthum M.2/7 No.17 Korakrit Laotrakul M.2/7 No.23 Pesan Kasemkitjanuwat M.2/7 No.25.
Internet Security facilities for secure communication.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Why do you need to think about security?  Data loss  System loss  Identity theft.
Malware Adware Removal Best Free Malware Virus Protection Best Free Malware Adware Removal Service Best free Anti Spyware Removal Service Best free Trojan.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
 a crime committed on a computer network, esp. the Internet.
PC Security: Antivirus Presentation done by Ming-Li Emily Chang (A2980) Raymond Chok (A2419)
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
Return to the PC Security web page Lesson 5: Dealing with Malware.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
November 19, 2008 CSC 682 Use of Virtualization to Thwart Malware Written by: Ryan Lehan Presented by: Ryan Lehan Directed By: Ryan Lehan Produced By:
Antivirus software.
Computer Skills and Applications Computer Security.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
W elcome to our Presentation. Presentation Topic Virus.
Safe’n’Sec complex solutions for home PCs protection.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
1 3 Computing System Fundamentals 3.7 Utility Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Protecting Your PC. Malware Virus Trojan Spyware Worm Rootkit Browser Hijacker With or Without AV software, ALL computers that have access to the internet.
Zemana AntiLogger (2012) Zemana AntiLogger (2012) Zemana Antilogger has been specifically developed to protect PC from numerous security.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Computer Security Keeping you and your computer safe in the digital world.
Protecting Computers From Viruses and Similarly Programmed Threats Ryan Gray COSC 316.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
Managing Windows Security
Protecting your mobile devices away from virus by a cloud-based approach Wei Wu.
Cyber Security By: Pratik Gandhi.
 Security is a must today. If your device is not secure with updated antivirus then it is surely vulnerable to the attacks of dangerous viruses, spyware.
Presentation transcript:

Antivirus Software Troy Behmer

Outline Topics covered: – What is Antivirus software (AVS)? – What are the advantages and disadvantages of AVS? – What types are being used today? – Which are the top rated for 2011? – How are they tested? – What lies in the future for AVS? – Conclusion.

Antivirus Software (AVS) Software programmed with the intent of preventing, detecting, and removing computer attacks on a system. – Possible attacks– Trojans, viruses, worms, other forms of malware. – Recognizes malicious programs uses detection methods. 2011: – Software needs to have multiple scanning engines.

Advantages of AVS Protection from outside threats using: – Signature-based detection: searches for known patterns of malicious data inside executable code. – Generic signatures: identifies new viruses or variants of previous viruses by searching for known malicious code or variants in the program files. – Sandbox Test: security mechanism takes program and runs it separate from the rest of the system, waits to see if it attempts any malicious actions. Removal of pre-existing threats in system.

Possible disadvantages of AVS Can impair comp. performance. Novice users may misunderstand prompts and leave an area vulnerable. Signature based detection can be fooled with new viruses, possibly using AVS against the system. Colorful and easy to use interfaces are chosen over more protective systems due to level of difficulty. Most run to the highest trusted level of the systems kernel, making a convenient “highway” for attack.

Types of Antivirus Software Stand-Alone: Portable virus scanner that with scan the PC it is attached to for a certain set of known viruses. – Cannot provide any protection against new viruses. – Example: Stinger  Made by McAfee, removes some specific viruses. – Usually freeware. Suite: Software that provides anti-virus as well as other additional features for the system. – Anti-spyware, firewall, parental controls, etc. – Example: Bit Defender Internet security. – Tend to be expensive ($30 – UP).

Types Continued Cloud: Uses smaller agent software on a secure computer, while offloading the main portion of analysis to the software provider’s infrastructure. – Example : Cloud AV  sends suspicious docs to a network cloud. Multiple virtual machines are used to run parallel scans with different virus scanners.

Top Rated of BitDefender Antivirus 2011: Best protection from new forms of malware. Extremely customizable dashboard. 2.Norton Antivirus 2011: Provides antivirus, antispyware, antirootkit, bot protection. 3.F-Secure Antivirus 2011: Protection against new viruses and spyware, easy user interface, easy to install. 4.Panda Antivirus 2011: Provides medium security from all malware threats. – May be prone to brute force attack. 5.AVG Antivirus 2011: Protects downloads, game/movie quality, faster scanning for malware.

How they are tested EICAR test: Executing infected files to see whether or not the antivirus is able to catch the problem. The quality of the software is determined by the percentage of threats it successfully blocks, detects, or removes. VIDEO:

Future of AVS Will antivirus’ stay as a third party product or become an integrated part of computer operating systems? Antivirus’ could be moved onto network devices in order to make internet traffic more regulated/manageable. – Centralized antivirus could boost efficiency. What do you think?

Conclusion What we’ve talked about: – What an antivirus software is/does. – Advantages/disadvantages of AVS. – Types currently being used. – Which manufacturers are rated the best in 2011, and how they were tested. – What the future of antivirus software holds.

References all-windows-users-should-know/ all-windows-users-should-know/