Download presentation
Presentation is loading. Please wait.
Published byGeraldine Stevenson Modified over 8 years ago
1
Antivirus Software Technology By Mitchell Zell
2
Intro Computers are vulnerable to attack Most common type of attack is Malware Short for malicious software Definition of Malware: Software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
3
Types of Malware Virus Worm Trojan Horse Logic Bomb Rootkit Spyware
4
:53-4:22
5
Virus Small software programs that are designed to spread from one computer to another and to interfere with computer operation Commonly spread through email or instant messaging Can be hidden in other software you download
6
Worm A computer program that has the ability to copy itself from machine to machine Commonly spread through networks
7
Trojan Horse Dangerous programs that hide within other seemingly harmless programs By downloading the intended program, the Trojan Horse has full access to the computer. It can damage the computer It can send important sensitive information over the internet and back to the creator of the Trojan Horse
8
Logic Bomb A piece of computer code that executes a malicious task, such as clearing a hard drive or deleting specific files, when it is triggered by a specific event Planted in the computer ahead of time Triggered by the person who planted it Positive triggers Individual sends command to trigger Logic Bomb Negative triggers Lack of input from an individual triggers Logic Bomb
9
Rootkits A Rootkit is a type of software designed to hide the fact that an operating system has been compromised Disguised as necessary files which antivirus software overlooks
10
Spyware A type of malware installed on a computer without the knowledge of the owner in order to collect the owner’s private information Can save information such as passwords and other private information
11
Antivirus Software Designed to detect, prevent, and remove malicious software Scans for viruses by looking for the Virus Signature Algorithm or hash (a number derived from a string of text) that uniquely identifies a specific virus
12
Antivirus Software (con’t) Since virus signatures are becoming more complex, new technology is used HIPS Behavior Blocking
13
HIPS Host Intrusion Prevention System Monitors each activity a program attempts and prompts the user for action or responds based on predefined criteria In basic terms, HIPS watches the activity of applications and declares that each application can do certain activities, but not others It allows the application to function normally, but prevents it from performing tasks it is not authorized to perform
14
Behavior Blockers Monitor and profile whole program behavior When a collection of behaviors tips the scale, the behavior blocker will alert the user or take action against the entire program based on predefined criteria Focus on entire program instead of individual actions Determines that a program is harmful and quarantines it Easier to use
15
Security Virus Signatures are becoming more complex Antivirus software passes over newer signatures To counteract this, multiple layers of security should be used
16
Works Cited http://antivirus.about.com/od/virusdescriptions/a/Antivirus-Software- Technology.htm http://antivirus.about.com/od/virusdescriptions/a/Antivirus-Software- Technology.htm http://antivirus.about.com/od/whatisavirus/tp/Top-5-Malware-Threats.htm http://antivirus.about.com/od/whatisavirus/tp/Top-5-Malware-Threats.htm http://computer.howstuffworks.com/virus5.htm http://computer.howstuffworks.com/virus5.htm http://www.microsoft.com/security/pc-security/virus-whatis.aspx http://www.microsoft.com/security/pc-security/virus-whatis.aspx http://computer.howstuffworks.com/trojan-horse.htm http://computer.howstuffworks.com/trojan-horse.htm http://computer.howstuffworks.com/logic-bomb.htm http://computer.howstuffworks.com/logic-bomb.htm http://www.pctools.com/security-news/what-is-a-rootkit-virus/ http://www.pctools.com/security-news/what-is-a-rootkit-virus/ http://www.pctools.com/security-news/what-is-spyware/ http://www.pctools.com/security-news/what-is-spyware/ http://antivirus.about.com/od/antivirusglossary/a/What-Is-Antivirus- Software.htm http://antivirus.about.com/od/antivirusglossary/a/What-Is-Antivirus- Software.htm http://antivirus.about.com/od/antivirussoftwarereviews/a/hips_behavior.htm http://antivirus.about.com/od/antivirussoftwarereviews/a/hips_behavior.htm http://antivirus.about.com/od/whatisavirus/a/virussignature.htm http://antivirus.about.com/od/whatisavirus/a/virussignature.htm
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.