SlideShare uma empresa Scribd logo
1 de 33
Baixar para ler offline
1Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Protecting Systems Using
Antiviruses
Module 3
Simplifying Security.
Alireza Ghahrood
Security Solution Provider :
Cyber Space |BigData |Cloud |Virtualization
www.about.me/alirezaghahrood
| Cell :+98 (912) 1964383 |
3March 2011, Thursday
Market for Antivirus Becoming Aggressive in North IT Market
The need for protecting valuable data pushing the demand for antivirus products in
Northern region.
With explosion in the use of networks and also increased use of internet has definitely created a new conduit
for computer viruses to spread at a rapid rate. Earlier viruses used executable files and would typically be no
more than an annoyance by displaying harmless phrases. The latest viruses are much more sophisticatedand
able to cause extensive and irreparable damage to files. Some viruses are
able to spread themselves to other computers on the Internet or network causing widespread damage
to many systems. Thus to counterattack
these problems and to keep up with the
accompanying rise of malicious web activity a number
of vendors are busy rolling out layers
of updates of Antivirus. We at ITPV, contemplatedin the Northern region about how the Antivirus vendors
are doing, what is the demand, which segment is booming and whats the future of this technology.
http://www.itvarnews.net
2 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module Objectives
The Most Dangerous Computer
Viruses of All Time
Introduction to Antivirus Software
How Does Antivirus Software
Work?
Antivirus Software 2011
Steps to Install Antivirus on Your
Computer
How to Test if Antivirus is
Working?
Choosing the Best Antivirus
Software
Configuring McAfee Antivirus
Configuring Kaspersky PURE
Antivirus Security Checklist
3 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Copyright © by EC-Council
served. Reproduction is Strictly Prohibited.
4
All Rights
Module Flow
Introduction
to Antivirus
Software
Steps to
Install
Antivirus
How Does
Antivirus
Software Work?
Choosing the
Best Antivirus
Software
Configuring
McAfee
Antivirus
Configuring
Kaspersky
PURE
Re
The Most Dangerous ComputerViruses of
All Time
In the past few years, numerous PCs have been infected by computer viruses and there have
been computer viruses that affected the global economic growth drastically
The top 10 most destructive computer viruses of all time according to techweb:
CIH ( 1998)
Estimated Damage: 20 to 80 million dollars worldwide,
countless amounts of PC data destroyed. Unleashed
from Taiwan in June of 1998
Melissa ( 1999)
Estimated Damage: 300 to 600 million dollars
ILOVEYOU ( 2000)
Estimated Damage: 10 to 15 billion dollars
Code Red ( 2001)
Estimated Damage: 2 billion and 600 million dollars
(2.6 B $)
SQL Slammer ( 2003)
Estimated Damage: Because SQL Slammer erupted on a
Saturday, the damage was low in dollars and cents.
However, it hit 500,000 servers world wide and actually
shut down South Korea’s online capacity for 12 hours
Blaster ( 2003)
Estimated Damage: 2 to 10 billion dollars, hundreds of
thousands of infected PCs
Sobig.F ( 2003)
Estimated Damage: 5 to 10 billion dollars, over 1 million
PCs infected
Bagle ( 2004)
Estimated Damage: Tens of millions of dollars and
counting
MyDoom ( 2004)
Estimated Damage: At its peak, slowed global Internet
performance by 10 percent and Web load times by up to
50percent
Sasser ( 2004)
Estimated Damage: Tens of millions of dollars
5 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Introduction to Antivirus Software
A computer connected to the Internet is always at high risk, and it is always recommended to
install antivirus software on the system
A computer virus can degrade the performance of a computer and can delete the stored
computer data
An antivirus program protects the computer against viruses, worms, spywares, Trojans, etc.
6 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
7
Need for Antivirus Program
Today in the digital domain, loads of data is
stored on computers and it has become
significant to protect the data
When a PC is connected to the Internet, the
PC has to combat different malicious programs
such as viruses, worms, Trojans, spyware,
adware
Cyber criminals such as attackers and hackers use
these malicious programs as tools to steal
important information such as personal data
stored on the computer
These programs pose a severe threat to the
computer and may destroy its functionality in
different ways
Malicious programs pave their way into one’s PC
through email attachments and spam email,
through USB drives, visiting a fraudulent website,
etc.
Due to the invasion of malicious programs
in cyberspace, antivirus programs have
become necessary for computers
If your computer has a good antivirus program installed, then the PC is protected and combat all
types of malicious programs
7 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Copyright © by EC-Council
served. Reproduction is Strictly Prohibited.
8
All Rights
Module Flow
Introduction
to Antivirus
Software
Choosing the
Best Antivirus
Software
Configuring
McAfee
Antivirus
How Does
Antivirus
Software Work?
Steps to
Install
Antivirus
Configuring
Kaspersky
PURE
Re
How Does Antivirus SoftwareWork?
Most of the commercial antivirus software uses two techniques:
Uses virus dictionary to look for known viruses while examining files
Detects suspicious behavior from any computer program
Virus Dictionary
Approach
Suspicious Behavior
Approach
Other Ways to Detect
Viruses
The antivirus software
monitors the behavior of all
the programs instead of
identifying the known viruses
Whenever a program with
suspicious behavior is found
the software alerts the user
and asks what to do
While examining the files the
antivirus software refers to
the dictionary of known
viruses identified by the
author of antivirus software
If a bit of code in the file
matches with that of any
virus in the dictionary, then
the antivirus software can
either delete the file, repair
the file by removing the virus,
or quarantine it
Antivirus software will try to
emulate the beginning of
each new executable code
that is being executed before
transferring control to the
executable
If the program seems to be a
virus or using self‐modifying
code then it immediately
examines the other
executable programs
9 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
http://www.eccouncil.org
Antivirus Software 2011
http://www.mcafee.com http://www.symantec.com http://www.avast.com http://www.kaspersky.com http://www.vipreantivirus.com
http://free.avg.com http://www.comodo.com http://www.bitdefender.com http://www.pctools.com
10 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Copyright © by EC-Council
served. Reproduction is Strictly Prohibited.
11
All Rights
Module Flow
Introduction
to Antivirus
Software
Choosing the
Best Antivirus
Software
How Does
Antivirus
Software Work?
Steps to
Install
Antivirus
Configuring
McAfee
Antivirus
Configuring
Kaspersky
PURE
Re
Choosing the Best Antivirus
When purchasing an antivirus software, look for
the various features and how they can best serve
your needs
The most important things to be considered are:
Antivirus Scanning
Antivirus Detection Accuracy
Check for antivirus software that scans and detects
viruses accurately and detects the majority of threats
Scanning Speed
Check whether the antivirus software can perform the
task quickly and efficiently
Resource Utilization
Ensure that the antivirus software uses minimal
system resources and does not affect system
performance when performing a scan
Software
12 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
T
u
p
Choosing the Best Antivirus Software
Hacker Blocking
his feature prevents other users from gaining
nauthorized access and steal important data such as
asswords and other confidential information
Bidirectional Firewall
Check whether the antivirus software is equipped
with a software firewall or not to scan the both
incoming and outgoing traffic
Automatic Updates
This feature keeps the user abreast
of the latest online threats without
the user having to visit the vendor’s
website to stay up to date Technical Support
Look for good technical support so
that issues are solved easily
Parental Controls
Check for the parental control feature in
the antivirus program that helps children
browse the Internet safely
Spyware Detection&
Prevention
Check for antispyware
components to keep spyware at
bay
Email Scanning
E‐mail Protection can monitor POP
and SMTP ports and ensures that
your computer doesn't contain a
threat to your computer
Easy Installation (and Easy to Use)
The anti virus software should be user friendly
and easy‐to‐use
On Demand and Scheduled Scanning
This options lets you schedule a scan according to user
specified time. User schedule the scan daily, weekly or
monthly
13 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Copyright © by EC-Council
served. Reproduction is Strictly Prohibited.
14
All Rights
Module Flow
Introduction
to Antivirus
Software
Choosing the
Best Antivirus
Software
How Does
Antivirus
Software Work?
Configuring
McAfee
Antivirus
Steps to
Install
Antivirus
Configuring
Kaspersky
PURE
Re
Steps to Install Antivirus on Your
Computer
Most of the antiviruses follow a wizard‐driven installation process
and necessary components are installed in the system by default1
2 Download the antivirus and launch the installation of
antivirus by double clicking the setup file
Agree to the legal agreement that might appear, click "I agree", and
then click "Next" to continue3
4 Review all the settings and click next until installation is finished
5 Once the installation process is finished, restart your computer
15 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Copyright © by EC-Council
served. Reproduction is Strictly Prohibited.
17
All Rights
Module Flow
Introduction
to Antivirus
Software
Choosing the
Best Antivirus
Software
How Does
Antivirus
Software Work?
Configuring
McAfee
Antivirus
Steps to
Install
Antivirus
Configuring
Kaspersky
PURE
Re
Configuring McAfee Antivirus
After selecting the Scan your PC option  Select
any one of the available three scan types (Run a
quick scan, Run a full scan, or Run a custom scan)
On the Main Security Center Console  click
Real‐time Scanning  select Scan your PC
18 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Configuring McAfee Antivirus
On the Main Security Center Console  click
Real‐time Scanning  select Schedule Scan
Settings and decide how often you want to
scan  click Apply
After selecting the Schedule Scan Settings option 
Real‐time Scanning Settings  select the file types,
attachments, and locations that you want the antivirus
to automatically scan and protect the computer from
threats  click Apply
19 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Copyright © by EC-Council
served. Reproduction is Strictly Prohibited.
20
All Rights
Module Flow
Introduction
to Antivirus
Software
How Does
Antivirus
Software Work?
Choosing the
Best Antivirus
Software
Configuring
McAfee
Antivirus
Steps to
Install
Antivirus
Configuring
Kaspersky
PURE
Re
Configuring Kaspersky PURE
After successfully installing Kaspersky PURE, follow the
steps to configure Kaspersky PURE
Step 1: Activate the application
For Kaspersky PURE to be fully functional, it needs to be
activated
You can:
Activate Commercial License with the purchased activation
code
Activate Trial Version for the trial period of 30 days and get
acquainted with the possibilities of the program
Activate Later, if you select activate later, the stage
of Kaspersky PURE activation will be skipped. The application
will be installed on your computer, but you will be able to
update the application only once after its installation.
To continue the activation process, click Next
After the license is activated, click Next to proceed with the
configuration
21 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Configuring Kaspersky PURE
Step 2: System analysis
The Installation Wizard analyzes the
system information and creates rules
for trusted applications that are
included in the Windows operating
system. Wait until the process is
completed.
22 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Configuring Kaspersky PURE
Step 3: Completing installation
When the installation is complete,
Kaspersky PURE ConfigurationWizard will
prompt with a message The installation is
complete:
Make sure the box Start Kaspersky
PURE is checked if you want to run the
application immediately after
the Configuration Wizard is closed
Clear the box Start Kaspersky PURE if
you want to run the program later
In order to close the Configuration
Wizard, click the Finish button
23 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
lication and the
Configuring Kaspersky PURE:
and Restore
After configuring the Kaspersky PURE antivirus, launch the app
program is ready for use
Backup
24 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Configuring Kaspersky
and Restore
To configure Backup, click Backup and Restore
In Backup and Restore, click Create a backup task
PURE: Backup
25 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Configuring Kaspersky
and Restore
Select the location of the files and
click Next  select the desired
drive to store the backup files 
click Next
Specify a password to protect your
data from unauthorized access and
click Next
PURE: Backup
26 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Configuring Kaspersky
and Restore
PURE: Backup
Configure storing different
versions of files and click 
Next  click Finish
27 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Configuring Kaspersky PURE:
ComputerProtection
Computer Protection components protect your computer against various threats, scan all system objects for viruses and
vulnerabilities, and regularly update Kaspersky PURE antivirus databases and program modules
28 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Configuring Kaspersky PURE: Parental
Control
To protect children and teenagers from threats related to computer and Internet usage, you should configure Parental
Control settings for all users
If you have no enabled password protection when installing the application at the first startup of Parental Control, it is
recommended that you set a password to protect against unauthorized modification of the Control settings
Now, you can enable Parental Control and impose restrictions on computer and Internet usage, and on instant messaging
for all accounts on the computer
29 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Kaspersky PURE:
Tools
Administrative
Using the Administrative tools, a user
can configure the operating system and
eliminate system vulnerabilities to
provide reliable data protection
A user can:
1.
2.
Tune browser settings
Search for problems related to malware
activity using the Microsoft Windows
Settings Troubleshooting option
Permanently delete data
Delete some unused data
Create a Rescue Disk to clean the
system after a virus attack
Erase user activity to protect the
privacy
3.
4.
5.
6.
30 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module Summary


An antivirus program protects a computer against viruses, worms, spywares, and Trojans
A computer connected to the Internet is always at high risk and it is recommended to have
antivirus software installed on the system
Most of the commercial antivirus software uses two techniques:
 Uses virus dictionary to look for known viruses while examining files
 Detects suspicious behavior from any computer program
 In the virus dictionary approach, while examining the files, the antivirus software refers to
the dictionary of known viruses identified by the software author
Whenever a program with suspicious behavior is found, the antivirus software alerts the
user and asks what to do

31 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Antivirus Security Checklist
Do not use multiple antivirus programs on your computer
simultaneously
Update antivirus software to get maximum efficiency
Always visit the vendor’s web site to download the patches
Enable real‐time scanning
Always perform link and email scanning
Enable firewall
Always schedule scanning
32 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.

Mais conteúdo relacionado

Mais procurados

Cscu module 06 internet security
Cscu module 06 internet securityCscu module 06 internet security
Cscu module 06 internet securitySejahtera Affif
 
Week 13 ch14 c
Week 13 ch14 cWeek 13 ch14 c
Week 13 ch14 cZahir Reza
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worriesUltraUploader
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsConnecting Up
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesSejahtera Affif
 
Computer security
Computer securityComputer security
Computer securityDhani Ahmad
 
Today's malware aint what you think
Today's malware aint what you thinkToday's malware aint what you think
Today's malware aint what you thinkNathan Winters
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxanbersattar
 
Securing Your Small Business Network
Securing Your Small Business NetworkSecuring Your Small Business Network
Securing Your Small Business NetworkAnindita Ghatak
 
Information-Security-Lecture-6.pptx
Information-Security-Lecture-6.pptxInformation-Security-Lecture-6.pptx
Information-Security-Lecture-6.pptxanbersattar
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffNicholas Davis
 
Information-Security-Lecture-4.pptx
Information-Security-Lecture-4.pptxInformation-Security-Lecture-4.pptx
Information-Security-Lecture-4.pptxanbersattar
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Information-Security-Lecture-7.pptx
Information-Security-Lecture-7.pptxInformation-Security-Lecture-7.pptx
Information-Security-Lecture-7.pptxanbersattar
 

Mais procurados (20)

C3
C3C3
C3
 
Cscu module 06 internet security
Cscu module 06 internet securityCscu module 06 internet security
Cscu module 06 internet security
 
Week 13 ch14 c
Week 13 ch14 cWeek 13 ch14 c
Week 13 ch14 c
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worries
 
M
MM
M
 
IT security awareness
IT security awarenessIT security awareness
IT security awareness
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Threats of Computer System and its Prevention
Threats of Computer System and its PreventionThreats of Computer System and its Prevention
Threats of Computer System and its Prevention
 
Computer security
Computer securityComputer security
Computer security
 
Today's malware aint what you think
Today's malware aint what you thinkToday's malware aint what you think
Today's malware aint what you think
 
Malwares
MalwaresMalwares
Malwares
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptx
 
Securing Your Small Business Network
Securing Your Small Business NetworkSecuring Your Small Business Network
Securing Your Small Business Network
 
Information-Security-Lecture-6.pptx
Information-Security-Lecture-6.pptxInformation-Security-Lecture-6.pptx
Information-Security-Lecture-6.pptx
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
 
Network monitoring white paper
Network monitoring white paperNetwork monitoring white paper
Network monitoring white paper
 
Information-Security-Lecture-4.pptx
Information-Security-Lecture-4.pptxInformation-Security-Lecture-4.pptx
Information-Security-Lecture-4.pptx
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Information-Security-Lecture-7.pptx
Information-Security-Lecture-7.pptxInformation-Security-Lecture-7.pptx
Information-Security-Lecture-7.pptx
 

Semelhante a Best Antivirus Software for Protecting Systems

Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.pptAsif Raza
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays worldSibghatullah Khattak
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools ollyabraham
 
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...IRJET Journal
 
How Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfHow Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfBlogger
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpointgalaxy201
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityLumension
 
The Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityThe Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityLumension
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptxPragatiKachhi1
 
Computer virus
Computer virusComputer virus
Computer virusDark Side
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementMuhammad FAHAD
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesSejahtera Affif
 

Semelhante a Best Antivirus Software for Protecting Systems (20)

185
185185
185
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools
 
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
 
How Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfHow Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdf
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
IT viruses
 IT viruses IT viruses
IT viruses
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint Security
 
Policy report barrat & associates ltd
Policy report  barrat & associates ltdPolicy report  barrat & associates ltd
Policy report barrat & associates ltd
 
The Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityThe Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day Reality
 
R esearch report with footnote
R esearch report with footnoteR esearch report with footnote
R esearch report with footnote
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Taylor 1
Taylor 1Taylor 1
Taylor 1
 
Computer virus
Computer virusComputer virus
Computer virus
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
 
The Various Classes of Antivirus!
The Various Classes of Antivirus!The Various Classes of Antivirus!
The Various Classes of Antivirus!
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 

Mais de Alireza Ghahrood

Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final Alireza Ghahrood
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Alireza Ghahrood
 
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...Alireza Ghahrood
 
NATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
NATO - Robotrolling Report.NATO Strategic Communications Centre of ExcellenceNATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
NATO - Robotrolling Report.NATO Strategic Communications Centre of ExcellenceAlireza Ghahrood
 
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINEDIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINEAlireza Ghahrood
 
Optional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet DossierOptional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet DossierAlireza Ghahrood
 
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...Alireza Ghahrood
 
http://www.neetuchoudhary.com/
http://www.neetuchoudhary.com/http://www.neetuchoudhary.com/
http://www.neetuchoudhary.com/Alireza Ghahrood
 
Power your businesswith risk informed decisions
Power your businesswith risk informed decisionsPower your businesswith risk informed decisions
Power your businesswith risk informed decisionsAlireza Ghahrood
 
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and ComplianceEffectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and ComplianceAlireza Ghahrood
 
participatea in the identity management lifecycle
participatea in the identity management lifecycleparticipatea in the identity management lifecycle
participatea in the identity management lifecycleAlireza Ghahrood
 
implement authentication mechanisms
implement authentication mechanismsimplement authentication mechanisms
implement authentication mechanismsAlireza Ghahrood
 
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...Alireza Ghahrood
 
Identity and Access Management Solutions for Financial Institutions
Identity and Access Management Solutions for Financial InstitutionsIdentity and Access Management Solutions for Financial Institutions
Identity and Access Management Solutions for Financial InstitutionsAlireza Ghahrood
 
Cscu module 12 information security and legal compliance
Cscu module 12 information security and legal complianceCscu module 12 information security and legal compliance
Cscu module 12 information security and legal complianceAlireza Ghahrood
 
Cscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theftCscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theftAlireza Ghahrood
 
Cscu module 06 internet security
Cscu module 06 internet securityCscu module 06 internet security
Cscu module 06 internet securityAlireza Ghahrood
 
Cscu module 08 securing online transactions
Cscu module 08 securing online transactionsCscu module 08 securing online transactions
Cscu module 08 securing online transactionsAlireza Ghahrood
 

Mais de Alireza Ghahrood (20)

Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
 
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
 
NATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
NATO - Robotrolling Report.NATO Strategic Communications Centre of ExcellenceNATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
NATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
 
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINEDIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
 
ANT Catalog
ANT CatalogANT Catalog
ANT Catalog
 
Optional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet DossierOptional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet Dossier
 
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
 
http://www.neetuchoudhary.com/
http://www.neetuchoudhary.com/http://www.neetuchoudhary.com/
http://www.neetuchoudhary.com/
 
Power your businesswith risk informed decisions
Power your businesswith risk informed decisionsPower your businesswith risk informed decisions
Power your businesswith risk informed decisions
 
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and ComplianceEffectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
 
participatea in the identity management lifecycle
participatea in the identity management lifecycleparticipatea in the identity management lifecycle
participatea in the identity management lifecycle
 
implement access controls
implement access controlsimplement access controls
implement access controls
 
implement authentication mechanisms
implement authentication mechanismsimplement authentication mechanisms
implement authentication mechanisms
 
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
 
Identity and Access Management Solutions for Financial Institutions
Identity and Access Management Solutions for Financial InstitutionsIdentity and Access Management Solutions for Financial Institutions
Identity and Access Management Solutions for Financial Institutions
 
Cscu module 12 information security and legal compliance
Cscu module 12 information security and legal complianceCscu module 12 information security and legal compliance
Cscu module 12 information security and legal compliance
 
Cscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theftCscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theft
 
Cscu module 06 internet security
Cscu module 06 internet securityCscu module 06 internet security
Cscu module 06 internet security
 
Cscu module 08 securing online transactions
Cscu module 08 securing online transactionsCscu module 08 securing online transactions
Cscu module 08 securing online transactions
 

Último

Radhika Call Girls In Jaipur 9358660226 Escorts service
Radhika Call Girls In Jaipur 9358660226 Escorts serviceRadhika Call Girls In Jaipur 9358660226 Escorts service
Radhika Call Girls In Jaipur 9358660226 Escorts servicerahul222jai
 
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7Sana Rajpoot
 
Rajkot Call Girls Contact Number +919358341802 Call Girls In Rajkot
Rajkot Call Girls Contact Number +919358341802 Call Girls In RajkotRajkot Call Girls Contact Number +919358341802 Call Girls In Rajkot
Rajkot Call Girls Contact Number +919358341802 Call Girls In RajkotSivanyaPandeya
 
Guwahati ❣️ Call Girl 97487*63073 Call Girls in Guwahati Escort service book now
Guwahati ❣️ Call Girl 97487*63073 Call Girls in Guwahati Escort service book nowGuwahati ❣️ Call Girl 97487*63073 Call Girls in Guwahati Escort service book now
Guwahati ❣️ Call Girl 97487*63073 Call Girls in Guwahati Escort service book nowapshanarani255
 
Best VIP Call Girl Noida Sector 48 Call Me: 8700611579
Best VIP Call Girl Noida Sector 48 Call Me: 8700611579Best VIP Call Girl Noida Sector 48 Call Me: 8700611579
Best VIP Call Girl Noida Sector 48 Call Me: 8700611579diyaspanoida
 
Mysore Call girl service 6289102337 Mysore escort service
Mysore Call girl service 6289102337 Mysore escort serviceMysore Call girl service 6289102337 Mysore escort service
Mysore Call girl service 6289102337 Mysore escort servicemaheshsingh64440
 
CALL GIRLS 9999288940 women seeking men Locanto No Advance North Goa
CALL GIRLS 9999288940 women seeking men Locanto No Advance North GoaCALL GIRLS 9999288940 women seeking men Locanto No Advance North Goa
CALL GIRLS 9999288940 women seeking men Locanto No Advance North Goadelhincr993
 
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...riyasharma00119
 
Call Now ☎9870417354|| Call Girls in Dwarka Escort Service Delhi N.C.R.
Call Now ☎9870417354|| Call Girls in Dwarka Escort Service Delhi N.C.R.Call Now ☎9870417354|| Call Girls in Dwarka Escort Service Delhi N.C.R.
Call Now ☎9870417354|| Call Girls in Dwarka Escort Service Delhi N.C.R.riyadelhic riyadelhic
 
Book_ A Project based approach CHAPTER 1 summary.pptx
Book_ A Project based approach CHAPTER 1 summary.pptxBook_ A Project based approach CHAPTER 1 summary.pptx
Book_ A Project based approach CHAPTER 1 summary.pptxssuser8fd809
 
Varanasi Call Girl 78709*93772 Call Girls in Varanasi Escort service book now
Varanasi  Call Girl 78709*93772 Call Girls in Varanasi Escort service book nowVaranasi  Call Girl 78709*93772 Call Girls in Varanasi Escort service book now
Varanasi Call Girl 78709*93772 Call Girls in Varanasi Escort service book nowapshanarani255
 
Hire 💕 8617370543 Uttara Kannada Call Girls Service Call Girls Agency
Hire 💕 8617370543 Uttara Kannada Call Girls Service Call Girls AgencyHire 💕 8617370543 Uttara Kannada Call Girls Service Call Girls Agency
Hire 💕 8617370543 Uttara Kannada Call Girls Service Call Girls AgencyJia Oberoi
 
Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...
Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...
Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...Sheetaleventcompany
 
BADDI CALL GIRL 92628/71154 BADDI CALL G
BADDI CALL GIRL 92628/71154 BADDI CALL GBADDI CALL GIRL 92628/71154 BADDI CALL G
BADDI CALL GIRL 92628/71154 BADDI CALL GNiteshKumar82226
 
Best VIP Call Girls Noida Sector 23 Call Me: 8700611579
Best VIP Call Girls Noida Sector 23 Call Me: 8700611579Best VIP Call Girls Noida Sector 23 Call Me: 8700611579
Best VIP Call Girls Noida Sector 23 Call Me: 8700611579diyaspanoida
 
Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...
Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...
Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...aakahthapa70
 
Call Girls In {{Laxmi Nagar Delhi}} 9667938988 Indian Russian High Profile Es...
Call Girls In {{Laxmi Nagar Delhi}} 9667938988 Indian Russian High Profile Es...Call Girls In {{Laxmi Nagar Delhi}} 9667938988 Indian Russian High Profile Es...
Call Girls In {{Laxmi Nagar Delhi}} 9667938988 Indian Russian High Profile Es...aakahthapa70
 
Call Girls In {Connaught Place Delhi} 9667938988 IndianRussian High Profile E...
Call Girls In {Connaught Place Delhi} 9667938988 IndianRussian High Profile E...Call Girls In {Connaught Place Delhi} 9667938988 IndianRussian High Profile E...
Call Girls In {Connaught Place Delhi} 9667938988 IndianRussian High Profile E...aakahthapa70
 

Último (20)

Radhika Call Girls In Jaipur 9358660226 Escorts service
Radhika Call Girls In Jaipur 9358660226 Escorts serviceRadhika Call Girls In Jaipur 9358660226 Escorts service
Radhika Call Girls In Jaipur 9358660226 Escorts service
 
9953056974 Call Girls In Ashok Nagar, Escorts (Delhi) NCR.
9953056974 Call Girls In Ashok Nagar, Escorts (Delhi) NCR.9953056974 Call Girls In Ashok Nagar, Escorts (Delhi) NCR.
9953056974 Call Girls In Ashok Nagar, Escorts (Delhi) NCR.
 
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
 
Rajkot Call Girls Contact Number +919358341802 Call Girls In Rajkot
Rajkot Call Girls Contact Number +919358341802 Call Girls In RajkotRajkot Call Girls Contact Number +919358341802 Call Girls In Rajkot
Rajkot Call Girls Contact Number +919358341802 Call Girls In Rajkot
 
Guwahati ❣️ Call Girl 97487*63073 Call Girls in Guwahati Escort service book now
Guwahati ❣️ Call Girl 97487*63073 Call Girls in Guwahati Escort service book nowGuwahati ❣️ Call Girl 97487*63073 Call Girls in Guwahati Escort service book now
Guwahati ❣️ Call Girl 97487*63073 Call Girls in Guwahati Escort service book now
 
Best VIP Call Girl Noida Sector 48 Call Me: 8700611579
Best VIP Call Girl Noida Sector 48 Call Me: 8700611579Best VIP Call Girl Noida Sector 48 Call Me: 8700611579
Best VIP Call Girl Noida Sector 48 Call Me: 8700611579
 
Mysore Call girl service 6289102337 Mysore escort service
Mysore Call girl service 6289102337 Mysore escort serviceMysore Call girl service 6289102337 Mysore escort service
Mysore Call girl service 6289102337 Mysore escort service
 
CALL GIRLS 9999288940 women seeking men Locanto No Advance North Goa
CALL GIRLS 9999288940 women seeking men Locanto No Advance North GoaCALL GIRLS 9999288940 women seeking men Locanto No Advance North Goa
CALL GIRLS 9999288940 women seeking men Locanto No Advance North Goa
 
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...
 
Call Now ☎9870417354|| Call Girls in Dwarka Escort Service Delhi N.C.R.
Call Now ☎9870417354|| Call Girls in Dwarka Escort Service Delhi N.C.R.Call Now ☎9870417354|| Call Girls in Dwarka Escort Service Delhi N.C.R.
Call Now ☎9870417354|| Call Girls in Dwarka Escort Service Delhi N.C.R.
 
Book_ A Project based approach CHAPTER 1 summary.pptx
Book_ A Project based approach CHAPTER 1 summary.pptxBook_ A Project based approach CHAPTER 1 summary.pptx
Book_ A Project based approach CHAPTER 1 summary.pptx
 
Varanasi Call Girl 78709*93772 Call Girls in Varanasi Escort service book now
Varanasi  Call Girl 78709*93772 Call Girls in Varanasi Escort service book nowVaranasi  Call Girl 78709*93772 Call Girls in Varanasi Escort service book now
Varanasi Call Girl 78709*93772 Call Girls in Varanasi Escort service book now
 
Hire 💕 8617370543 Uttara Kannada Call Girls Service Call Girls Agency
Hire 💕 8617370543 Uttara Kannada Call Girls Service Call Girls AgencyHire 💕 8617370543 Uttara Kannada Call Girls Service Call Girls Agency
Hire 💕 8617370543 Uttara Kannada Call Girls Service Call Girls Agency
 
Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...
Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...
Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...
 
BADDI CALL GIRL 92628/71154 BADDI CALL G
BADDI CALL GIRL 92628/71154 BADDI CALL GBADDI CALL GIRL 92628/71154 BADDI CALL G
BADDI CALL GIRL 92628/71154 BADDI CALL G
 
Best VIP Call Girls Noida Sector 23 Call Me: 8700611579
Best VIP Call Girls Noida Sector 23 Call Me: 8700611579Best VIP Call Girls Noida Sector 23 Call Me: 8700611579
Best VIP Call Girls Noida Sector 23 Call Me: 8700611579
 
Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...
Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...
Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...
 
Call Girls In {{Laxmi Nagar Delhi}} 9667938988 Indian Russian High Profile Es...
Call Girls In {{Laxmi Nagar Delhi}} 9667938988 Indian Russian High Profile Es...Call Girls In {{Laxmi Nagar Delhi}} 9667938988 Indian Russian High Profile Es...
Call Girls In {{Laxmi Nagar Delhi}} 9667938988 Indian Russian High Profile Es...
 
Call Girls In {Connaught Place Delhi} 9667938988 IndianRussian High Profile E...
Call Girls In {Connaught Place Delhi} 9667938988 IndianRussian High Profile E...Call Girls In {Connaught Place Delhi} 9667938988 IndianRussian High Profile E...
Call Girls In {Connaught Place Delhi} 9667938988 IndianRussian High Profile E...
 
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
 

Best Antivirus Software for Protecting Systems

  • 1. 1Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Protecting Systems Using Antiviruses Module 3 Simplifying Security.
  • 2. Alireza Ghahrood Security Solution Provider : Cyber Space |BigData |Cloud |Virtualization www.about.me/alirezaghahrood | Cell :+98 (912) 1964383 |
  • 3. 3March 2011, Thursday Market for Antivirus Becoming Aggressive in North IT Market The need for protecting valuable data pushing the demand for antivirus products in Northern region. With explosion in the use of networks and also increased use of internet has definitely created a new conduit for computer viruses to spread at a rapid rate. Earlier viruses used executable files and would typically be no more than an annoyance by displaying harmless phrases. The latest viruses are much more sophisticatedand able to cause extensive and irreparable damage to files. Some viruses are able to spread themselves to other computers on the Internet or network causing widespread damage to many systems. Thus to counterattack these problems and to keep up with the accompanying rise of malicious web activity a number of vendors are busy rolling out layers of updates of Antivirus. We at ITPV, contemplatedin the Northern region about how the Antivirus vendors are doing, what is the demand, which segment is booming and whats the future of this technology. http://www.itvarnews.net 2 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
  • 4. Module Objectives The Most Dangerous Computer Viruses of All Time Introduction to Antivirus Software How Does Antivirus Software Work? Antivirus Software 2011 Steps to Install Antivirus on Your Computer How to Test if Antivirus is Working? Choosing the Best Antivirus Software Configuring McAfee Antivirus Configuring Kaspersky PURE Antivirus Security Checklist 3 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
  • 5. Copyright © by EC-Council served. Reproduction is Strictly Prohibited. 4 All Rights Module Flow Introduction to Antivirus Software Steps to Install Antivirus How Does Antivirus Software Work? Choosing the Best Antivirus Software Configuring McAfee Antivirus Configuring Kaspersky PURE Re
  • 6. The Most Dangerous ComputerViruses of All Time In the past few years, numerous PCs have been infected by computer viruses and there have been computer viruses that affected the global economic growth drastically The top 10 most destructive computer viruses of all time according to techweb: CIH ( 1998) Estimated Damage: 20 to 80 million dollars worldwide, countless amounts of PC data destroyed. Unleashed from Taiwan in June of 1998 Melissa ( 1999) Estimated Damage: 300 to 600 million dollars ILOVEYOU ( 2000) Estimated Damage: 10 to 15 billion dollars Code Red ( 2001) Estimated Damage: 2 billion and 600 million dollars (2.6 B $) SQL Slammer ( 2003) Estimated Damage: Because SQL Slammer erupted on a Saturday, the damage was low in dollars and cents. However, it hit 500,000 servers world wide and actually shut down South Korea’s online capacity for 12 hours Blaster ( 2003) Estimated Damage: 2 to 10 billion dollars, hundreds of thousands of infected PCs Sobig.F ( 2003) Estimated Damage: 5 to 10 billion dollars, over 1 million PCs infected Bagle ( 2004) Estimated Damage: Tens of millions of dollars and counting MyDoom ( 2004) Estimated Damage: At its peak, slowed global Internet performance by 10 percent and Web load times by up to 50percent Sasser ( 2004) Estimated Damage: Tens of millions of dollars 5 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
  • 7. Introduction to Antivirus Software A computer connected to the Internet is always at high risk, and it is always recommended to install antivirus software on the system A computer virus can degrade the performance of a computer and can delete the stored computer data An antivirus program protects the computer against viruses, worms, spywares, Trojans, etc. 6 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
  • 8. 7 Need for Antivirus Program Today in the digital domain, loads of data is stored on computers and it has become significant to protect the data When a PC is connected to the Internet, the PC has to combat different malicious programs such as viruses, worms, Trojans, spyware, adware Cyber criminals such as attackers and hackers use these malicious programs as tools to steal important information such as personal data stored on the computer These programs pose a severe threat to the computer and may destroy its functionality in different ways Malicious programs pave their way into one’s PC through email attachments and spam email, through USB drives, visiting a fraudulent website, etc. Due to the invasion of malicious programs in cyberspace, antivirus programs have become necessary for computers If your computer has a good antivirus program installed, then the PC is protected and combat all types of malicious programs 7 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
  • 9. Copyright © by EC-Council served. Reproduction is Strictly Prohibited. 8 All Rights Module Flow Introduction to Antivirus Software Choosing the Best Antivirus Software Configuring McAfee Antivirus How Does Antivirus Software Work? Steps to Install Antivirus Configuring Kaspersky PURE Re
  • 10. How Does Antivirus SoftwareWork? Most of the commercial antivirus software uses two techniques: Uses virus dictionary to look for known viruses while examining files Detects suspicious behavior from any computer program Virus Dictionary Approach Suspicious Behavior Approach Other Ways to Detect Viruses The antivirus software monitors the behavior of all the programs instead of identifying the known viruses Whenever a program with suspicious behavior is found the software alerts the user and asks what to do While examining the files the antivirus software refers to the dictionary of known viruses identified by the author of antivirus software If a bit of code in the file matches with that of any virus in the dictionary, then the antivirus software can either delete the file, repair the file by removing the virus, or quarantine it Antivirus software will try to emulate the beginning of each new executable code that is being executed before transferring control to the executable If the program seems to be a virus or using self‐modifying code then it immediately examines the other executable programs 9 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
  • 11. http://www.eccouncil.org Antivirus Software 2011 http://www.mcafee.com http://www.symantec.com http://www.avast.com http://www.kaspersky.com http://www.vipreantivirus.com http://free.avg.com http://www.comodo.com http://www.bitdefender.com http://www.pctools.com 10 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
  • 12. Copyright © by EC-Council served. Reproduction is Strictly Prohibited. 11 All Rights Module Flow Introduction to Antivirus Software Choosing the Best Antivirus Software How Does Antivirus Software Work? Steps to Install Antivirus Configuring McAfee Antivirus Configuring Kaspersky PURE Re
  • 13. Choosing the Best Antivirus When purchasing an antivirus software, look for the various features and how they can best serve your needs The most important things to be considered are: Antivirus Scanning Antivirus Detection Accuracy Check for antivirus software that scans and detects viruses accurately and detects the majority of threats Scanning Speed Check whether the antivirus software can perform the task quickly and efficiently Resource Utilization Ensure that the antivirus software uses minimal system resources and does not affect system performance when performing a scan Software 12 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
  • 14. T u p Choosing the Best Antivirus Software Hacker Blocking his feature prevents other users from gaining nauthorized access and steal important data such as asswords and other confidential information Bidirectional Firewall Check whether the antivirus software is equipped with a software firewall or not to scan the both incoming and outgoing traffic Automatic Updates This feature keeps the user abreast of the latest online threats without the user having to visit the vendor’s website to stay up to date Technical Support Look for good technical support so that issues are solved easily Parental Controls Check for the parental control feature in the antivirus program that helps children browse the Internet safely Spyware Detection& Prevention Check for antispyware components to keep spyware at bay Email Scanning E‐mail Protection can monitor POP and SMTP ports and ensures that your computer doesn't contain a threat to your computer Easy Installation (and Easy to Use) The anti virus software should be user friendly and easy‐to‐use On Demand and Scheduled Scanning This options lets you schedule a scan according to user specified time. User schedule the scan daily, weekly or monthly 13 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
  • 15. Copyright © by EC-Council served. Reproduction is Strictly Prohibited. 14 All Rights Module Flow Introduction to Antivirus Software Choosing the Best Antivirus Software How Does Antivirus Software Work? Configuring McAfee Antivirus Steps to Install Antivirus Configuring Kaspersky PURE Re
  • 16. Steps to Install Antivirus on Your Computer Most of the antiviruses follow a wizard‐driven installation process and necessary components are installed in the system by default1 2 Download the antivirus and launch the installation of antivirus by double clicking the setup file Agree to the legal agreement that might appear, click "I agree", and then click "Next" to continue3 4 Review all the settings and click next until installation is finished 5 Once the installation process is finished, restart your computer 15 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
  • 17.
  • 18. Copyright © by EC-Council served. Reproduction is Strictly Prohibited. 17 All Rights Module Flow Introduction to Antivirus Software Choosing the Best Antivirus Software How Does Antivirus Software Work? Configuring McAfee Antivirus Steps to Install Antivirus Configuring Kaspersky PURE Re
  • 19. Configuring McAfee Antivirus After selecting the Scan your PC option  Select any one of the available three scan types (Run a quick scan, Run a full scan, or Run a custom scan) On the Main Security Center Console  click Real‐time Scanning  select Scan your PC 18 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
  • 20. Configuring McAfee Antivirus On the Main Security Center Console  click Real‐time Scanning  select Schedule Scan Settings and decide how often you want to scan  click Apply After selecting the Schedule Scan Settings option  Real‐time Scanning Settings  select the file types, attachments, and locations that you want the antivirus to automatically scan and protect the computer from threats  click Apply 19 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
  • 21. Copyright © by EC-Council served. Reproduction is Strictly Prohibited. 20 All Rights Module Flow Introduction to Antivirus Software How Does Antivirus Software Work? Choosing the Best Antivirus Software Configuring McAfee Antivirus Steps to Install Antivirus Configuring Kaspersky PURE Re
  • 22. Configuring Kaspersky PURE After successfully installing Kaspersky PURE, follow the steps to configure Kaspersky PURE Step 1: Activate the application For Kaspersky PURE to be fully functional, it needs to be activated You can: Activate Commercial License with the purchased activation code Activate Trial Version for the trial period of 30 days and get acquainted with the possibilities of the program Activate Later, if you select activate later, the stage of Kaspersky PURE activation will be skipped. The application will be installed on your computer, but you will be able to update the application only once after its installation. To continue the activation process, click Next After the license is activated, click Next to proceed with the configuration 21 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
  • 23. Configuring Kaspersky PURE Step 2: System analysis The Installation Wizard analyzes the system information and creates rules for trusted applications that are included in the Windows operating system. Wait until the process is completed. 22 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
  • 24. Configuring Kaspersky PURE Step 3: Completing installation When the installation is complete, Kaspersky PURE ConfigurationWizard will prompt with a message The installation is complete: Make sure the box Start Kaspersky PURE is checked if you want to run the application immediately after the Configuration Wizard is closed Clear the box Start Kaspersky PURE if you want to run the program later In order to close the Configuration Wizard, click the Finish button 23 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
  • 25. lication and the Configuring Kaspersky PURE: and Restore After configuring the Kaspersky PURE antivirus, launch the app program is ready for use Backup 24 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
  • 26. Configuring Kaspersky and Restore To configure Backup, click Backup and Restore In Backup and Restore, click Create a backup task PURE: Backup 25 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
  • 27. Configuring Kaspersky and Restore Select the location of the files and click Next  select the desired drive to store the backup files  click Next Specify a password to protect your data from unauthorized access and click Next PURE: Backup 26 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
  • 28. Configuring Kaspersky and Restore PURE: Backup Configure storing different versions of files and click  Next  click Finish 27 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
  • 29. Configuring Kaspersky PURE: ComputerProtection Computer Protection components protect your computer against various threats, scan all system objects for viruses and vulnerabilities, and regularly update Kaspersky PURE antivirus databases and program modules 28 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
  • 30. Configuring Kaspersky PURE: Parental Control To protect children and teenagers from threats related to computer and Internet usage, you should configure Parental Control settings for all users If you have no enabled password protection when installing the application at the first startup of Parental Control, it is recommended that you set a password to protect against unauthorized modification of the Control settings Now, you can enable Parental Control and impose restrictions on computer and Internet usage, and on instant messaging for all accounts on the computer 29 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
  • 31. Kaspersky PURE: Tools Administrative Using the Administrative tools, a user can configure the operating system and eliminate system vulnerabilities to provide reliable data protection A user can: 1. 2. Tune browser settings Search for problems related to malware activity using the Microsoft Windows Settings Troubleshooting option Permanently delete data Delete some unused data Create a Rescue Disk to clean the system after a virus attack Erase user activity to protect the privacy 3. 4. 5. 6. 30 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
  • 32. Module Summary   An antivirus program protects a computer against viruses, worms, spywares, and Trojans A computer connected to the Internet is always at high risk and it is recommended to have antivirus software installed on the system Most of the commercial antivirus software uses two techniques:  Uses virus dictionary to look for known viruses while examining files  Detects suspicious behavior from any computer program  In the virus dictionary approach, while examining the files, the antivirus software refers to the dictionary of known viruses identified by the software author Whenever a program with suspicious behavior is found, the antivirus software alerts the user and asks what to do  31 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
  • 33. Antivirus Security Checklist Do not use multiple antivirus programs on your computer simultaneously Update antivirus software to get maximum efficiency Always visit the vendor’s web site to download the patches Enable real‐time scanning Always perform link and email scanning Enable firewall Always schedule scanning 32 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.