Presentation is loading. Please wait.

Presentation is loading. Please wait.

Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.

Similar presentations


Presentation on theme: "Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious."— Presentation transcript:

1 Antivirus Software Technology By Mitchell Zell

2 Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious software  Definition of Malware:  Software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.

3 Types of Malware  Virus  Worm  Trojan Horse  Logic Bomb  Rootkit  Spyware

4 :53-4:22

5 Virus  Small software programs that are designed to spread from one computer to another and to interfere with computer operation  Commonly spread through email or instant messaging  Can be hidden in other software you download

6 Worm  A computer program that has the ability to copy itself from machine to machine  Commonly spread through networks

7 Trojan Horse  Dangerous programs that hide within other seemingly harmless programs  By downloading the intended program, the Trojan Horse has full access to the computer.  It can damage the computer  It can send important sensitive information over the internet and back to the creator of the Trojan Horse

8 Logic Bomb  A piece of computer code that executes a malicious task, such as clearing a hard drive or deleting specific files, when it is triggered by a specific event  Planted in the computer ahead of time  Triggered by the person who planted it  Positive triggers  Individual sends command to trigger Logic Bomb  Negative triggers  Lack of input from an individual triggers Logic Bomb

9 Rootkits  A Rootkit is a type of software designed to hide the fact that an operating system has been compromised  Disguised as necessary files which antivirus software overlooks

10 Spyware  A type of malware installed on a computer without the knowledge of the owner in order to collect the owner’s private information  Can save information such as passwords and other private information

11 Antivirus Software  Designed to detect, prevent, and remove malicious software  Scans for viruses by looking for the Virus Signature  Algorithm or hash (a number derived from a string of text) that uniquely identifies a specific virus

12 Antivirus Software (con’t)  Since virus signatures are becoming more complex, new technology is used  HIPS  Behavior Blocking

13 HIPS  Host Intrusion Prevention System  Monitors each activity a program attempts and prompts the user for action or responds based on predefined criteria  In basic terms, HIPS watches the activity of applications and declares that each application can do certain activities, but not others  It allows the application to function normally, but prevents it from performing tasks it is not authorized to perform

14 Behavior Blockers  Monitor and profile whole program behavior  When a collection of behaviors tips the scale, the behavior blocker will alert the user or take action against the entire program based on predefined criteria  Focus on entire program instead of individual actions  Determines that a program is harmful and quarantines it  Easier to use

15 Security  Virus Signatures are becoming more complex  Antivirus software passes over newer signatures  To counteract this, multiple layers of security should be used

16 Works Cited  http://antivirus.about.com/od/virusdescriptions/a/Antivirus-Software- Technology.htm http://antivirus.about.com/od/virusdescriptions/a/Antivirus-Software- Technology.htm  http://antivirus.about.com/od/whatisavirus/tp/Top-5-Malware-Threats.htm http://antivirus.about.com/od/whatisavirus/tp/Top-5-Malware-Threats.htm  http://computer.howstuffworks.com/virus5.htm http://computer.howstuffworks.com/virus5.htm  http://www.microsoft.com/security/pc-security/virus-whatis.aspx http://www.microsoft.com/security/pc-security/virus-whatis.aspx  http://computer.howstuffworks.com/trojan-horse.htm http://computer.howstuffworks.com/trojan-horse.htm  http://computer.howstuffworks.com/logic-bomb.htm http://computer.howstuffworks.com/logic-bomb.htm  http://www.pctools.com/security-news/what-is-a-rootkit-virus/ http://www.pctools.com/security-news/what-is-a-rootkit-virus/  http://www.pctools.com/security-news/what-is-spyware/ http://www.pctools.com/security-news/what-is-spyware/  http://antivirus.about.com/od/antivirusglossary/a/What-Is-Antivirus- Software.htm http://antivirus.about.com/od/antivirusglossary/a/What-Is-Antivirus- Software.htm  http://antivirus.about.com/od/antivirussoftwarereviews/a/hips_behavior.htm http://antivirus.about.com/od/antivirussoftwarereviews/a/hips_behavior.htm  http://antivirus.about.com/od/whatisavirus/a/virussignature.htm http://antivirus.about.com/od/whatisavirus/a/virussignature.htm


Download ppt "Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious."

Similar presentations


Ads by Google