SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Presented by:
                                  Ajit Kumar Pradhan
                   090101ITR006
                7th Sem IT
After INTERNET has evolved it had given a
sophisticate increase on the general computer
user as well as the malicious code writer, who
has changed the backbone of internet
architecture for their futuristic use & produced
billions of malicious codes throughout the web.
For defending these many billions of advance
technological codes we use a outdated
technology called as Antivirus. Is it sufficient ?
Lets see……
   In 1969 the term ‘virus’ – Dr. David Gerrold.
   In 1971 ‘Creeper virus‘ detected by-ARPANET.
   In between 1974-79 some virus like Webbit
    ,Animal ,Shockwave rider.
   "Elk Cloner" first personal computer virus "in
    the wild“ in 1981.
   Claimed by John McAfee in 1983.
   Mr. Fred Cohen published 1st educational paper
    on viruses in 1984.
   The first documented signature based antivirus
    s/w produced by Bernd Fix in 1987.
   In late 1987 two released based on heuristic
    analysis Flushot Plus by Ross Greenberg and
    Anti4us by Erwin Lanting.
   In 1988 a mailing list named VIRUS-L formed for
    better research in field of viruses.
   From 1988 -2007 strategic development occurs.
   100-200 billions of viruses believed to exist
    “in the wild”.
   “Infinite amounts” in zoos.
   At least 300 new malicious programs (Worms,
    Trojans, Spyware, Hacker tools, Root-kits )
    released per day.
   2- 3 millions of undetectable programs exists
    from early 19th centuries.
   It is software used to prevent, detect and
    remove Malicious programs.
   Provides computer security implemented by
    software methodology.
   No common malware definition

   No common repository

   Out-of date signatures
 High rate of production of new advanced virus.
 Traditional techniques like digital signature
  analysis.
 Lake of up-to-date knowledge.
 Unexpected renewal costs for providing service.
 Rogue security applications
 Problems caused by false positives
 System and interoperability related issues.
 Damage happens to ordinary files.
   According to an FBI survey, major businesses lose $12
    million annually dealing with virus incidents.

   A recent Yankee Group report stated that 99% of
    companies had AV technology installed, yet 62% of
    companies suffered successful virus attacks.

   According to AusCERT, Australia’s Computer
    Emergency Response Team, the two most
    technological and deployed AV products fail to
    prevent 80% of new threats.
   Try to use a good up-to-date antivirus
    product.
   Learn about malicious virus infection
    procedure
   Up to date with virus definitions.
   Use your commonsense while using system
As we are entering to a new era of technology
where no Antivirus is appropriate for
protecting our confidentiality, because of the
featured brain of malicious code writers. For
protecting our privacy we have to up to date
our brain with the technology.
   http://theinventionofantivirussoftware.blogs
    pot.in/
   http://en.wikipedia.org/wiki/Antivirus_softwa
    re
   http://www.antivirussoftwaremax.com/the-
    history-of-antivirus-software/
Anti virus
Anti virus

Weitere ähnliche Inhalte

Was ist angesagt?

Ibm risk management-30min
Ibm risk management-30minIbm risk management-30min
Ibm risk management-30min
Kim Aarenstrup
 
Sandbox Technology in AntiVirus
Sandbox Technology in AntiVirusSandbox Technology in AntiVirus
Sandbox Technology in AntiVirus
Ashish Gautam
 

Was ist angesagt? (20)

Risq mark bullen - juniper (11-16-16)
Risq   mark bullen - juniper (11-16-16)Risq   mark bullen - juniper (11-16-16)
Risq mark bullen - juniper (11-16-16)
 
Lecture 19
Lecture 19Lecture 19
Lecture 19
 
eScan Version 14 With Cloud Security.
eScan Version 14 With Cloud Security.eScan Version 14 With Cloud Security.
eScan Version 14 With Cloud Security.
 
Ibm risk management-30min
Ibm risk management-30minIbm risk management-30min
Ibm risk management-30min
 
ANTI - VIRUS
ANTI - VIRUSANTI - VIRUS
ANTI - VIRUS
 
Viruses
VirusesViruses
Viruses
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITY
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Presentation about security I.T.
Presentation about security I.T.Presentation about security I.T.
Presentation about security I.T.
 
Presentation about security i.t.
Presentation about security i.t.Presentation about security i.t.
Presentation about security i.t.
 
AusCERT - Mikko Hypponen
AusCERT - Mikko HypponenAusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
 
IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015
 
Sandbox Technology in AntiVirus
Sandbox Technology in AntiVirusSandbox Technology in AntiVirus
Sandbox Technology in AntiVirus
 
What is Spyware?
What is Spyware?What is Spyware?
What is Spyware?
 
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
 
Secure printing in an unsecure world
Secure printing in an unsecure worldSecure printing in an unsecure world
Secure printing in an unsecure world
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & worms
 
Zimperium Enterprise Mobile Threats
Zimperium Enterprise Mobile ThreatsZimperium Enterprise Mobile Threats
Zimperium Enterprise Mobile Threats
 
Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]
 
Your Data Is Under Siege: Fortify Your Endpoints
Your Data Is Under Siege: Fortify Your EndpointsYour Data Is Under Siege: Fortify Your Endpoints
Your Data Is Under Siege: Fortify Your Endpoints
 

Andere mochten auch

Ge Careers How To Apply
Ge Careers   How To ApplyGe Careers   How To Apply
Ge Careers How To Apply
Bruno Pitzer
 
LVSA Annrual Report 2010_2011
LVSA Annrual Report 2010_2011LVSA Annrual Report 2010_2011
LVSA Annrual Report 2010_2011
Bill Ritchie
 
Feedback en Jessica stellen zich voor!
Feedback en Jessica stellen zich voor!Feedback en Jessica stellen zich voor!
Feedback en Jessica stellen zich voor!
JessRoos
 
КОНЦЕПЦІЯ ЦІЛЬОВОЇ ПРОГРАМИ ЗБИРАННЯ, ЗАГОТІВЛІ ТА УТИЛІЗАЦІЇ ВИКОРИСТАНОЇ УП...
КОНЦЕПЦІЯ ЦІЛЬОВОЇ ПРОГРАМИ ЗБИРАННЯ, ЗАГОТІВЛІ ТА УТИЛІЗАЦІЇ ВИКОРИСТАНОЇ УП...КОНЦЕПЦІЯ ЦІЛЬОВОЇ ПРОГРАМИ ЗБИРАННЯ, ЗАГОТІВЛІ ТА УТИЛІЗАЦІЇ ВИКОРИСТАНОЇ УП...
КОНЦЕПЦІЯ ЦІЛЬОВОЇ ПРОГРАМИ ЗБИРАННЯ, ЗАГОТІВЛІ ТА УТИЛІЗАЦІЇ ВИКОРИСТАНОЇ УП...
State Enterprise Ukrecoresursy
 
Angina pektoris
Angina pektoris Angina pektoris
Angina pektoris
saffaatifah
 
Bò nhúng dấm chấm mắm sả ớt
Bò nhúng dấm chấm mắm sả ớtBò nhúng dấm chấm mắm sả ớt
Bò nhúng dấm chấm mắm sả ớt
Các Món Ăn Ngon
 

Andere mochten auch (20)

NV_path_rendering
NV_path_renderingNV_path_rendering
NV_path_rendering
 
Ge Careers How To Apply
Ge Careers   How To ApplyGe Careers   How To Apply
Ge Careers How To Apply
 
10 Things to Make API Users Like You
10 Things to Make API Users Like You10 Things to Make API Users Like You
10 Things to Make API Users Like You
 
LVSA Annrual Report 2010_2011
LVSA Annrual Report 2010_2011LVSA Annrual Report 2010_2011
LVSA Annrual Report 2010_2011
 
Feedback en Jessica stellen zich voor!
Feedback en Jessica stellen zich voor!Feedback en Jessica stellen zich voor!
Feedback en Jessica stellen zich voor!
 
КОНЦЕПЦІЯ ЦІЛЬОВОЇ ПРОГРАМИ ЗБИРАННЯ, ЗАГОТІВЛІ ТА УТИЛІЗАЦІЇ ВИКОРИСТАНОЇ УП...
КОНЦЕПЦІЯ ЦІЛЬОВОЇ ПРОГРАМИ ЗБИРАННЯ, ЗАГОТІВЛІ ТА УТИЛІЗАЦІЇ ВИКОРИСТАНОЇ УП...КОНЦЕПЦІЯ ЦІЛЬОВОЇ ПРОГРАМИ ЗБИРАННЯ, ЗАГОТІВЛІ ТА УТИЛІЗАЦІЇ ВИКОРИСТАНОЇ УП...
КОНЦЕПЦІЯ ЦІЛЬОВОЇ ПРОГРАМИ ЗБИРАННЯ, ЗАГОТІВЛІ ТА УТИЛІЗАЦІЇ ВИКОРИСТАНОЇ УП...
 
Mike baker eclipse
Mike baker eclipseMike baker eclipse
Mike baker eclipse
 
为什么选择游易帮
为什么选择游易帮为什么选择游易帮
为什么选择游易帮
 
Благотворительный фонд "Красивые дети в красивом мире"
Благотворительный фонд "Красивые дети в красивом мире"Благотворительный фонд "Красивые дети в красивом мире"
Благотворительный фонд "Красивые дети в красивом мире"
 
NEDITER
NEDITERNEDITER
NEDITER
 
Thais 5 años
Thais 5 añosThais 5 años
Thais 5 años
 
Doc1
Doc1Doc1
Doc1
 
慶應義塾大学 教育学特殊 第12講(2016年67月13日)
慶應義塾大学 教育学特殊 第12講(2016年67月13日) 慶應義塾大学 教育学特殊 第12講(2016年67月13日)
慶應義塾大学 教育学特殊 第12講(2016年67月13日)
 
Nahdet El Mahrousa's Incubator Information session
Nahdet El Mahrousa's Incubator Information session Nahdet El Mahrousa's Incubator Information session
Nahdet El Mahrousa's Incubator Information session
 
Presentasi b.ing
Presentasi b.ingPresentasi b.ing
Presentasi b.ing
 
Angina pektoris
Angina pektoris Angina pektoris
Angina pektoris
 
Web de la genèse à demain mars 2016
Web de la genèse à demain mars 2016Web de la genèse à demain mars 2016
Web de la genèse à demain mars 2016
 
150527 教育学特殊 第6講
150527 教育学特殊 第6講150527 教育学特殊 第6講
150527 教育学特殊 第6講
 
151121_お台場海苔づくり説明会
151121_お台場海苔づくり説明会151121_お台場海苔づくり説明会
151121_お台場海苔づくり説明会
 
Bò nhúng dấm chấm mắm sả ớt
Bò nhúng dấm chấm mắm sả ớtBò nhúng dấm chấm mắm sả ớt
Bò nhúng dấm chấm mắm sả ớt
 

Ähnlich wie Anti virus

Biologically inspired defenses against computer viruses
Biologically inspired defenses against computer virusesBiologically inspired defenses against computer viruses
Biologically inspired defenses against computer viruses
UltraUploader
 
A history of computer viruses introduction
A history of computer viruses   introductionA history of computer viruses   introduction
A history of computer viruses introduction
UltraUploader
 
X-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceX-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligence
IJECEIAES
 
Malware analysis and detection using reverse Engineering, Available at: www....
Malware analysis and detection using reverse Engineering,  Available at: www....Malware analysis and detection using reverse Engineering,  Available at: www....
Malware analysis and detection using reverse Engineering, Available at: www....
Research Publish Journals (Publisher)
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
shopnil786
 

Ähnlich wie Anti virus (20)

Case study cybersecurity industry birth and growth
Case study cybersecurity industry birth and growth Case study cybersecurity industry birth and growth
Case study cybersecurity industry birth and growth
 
Biologically inspired defenses against computer viruses
Biologically inspired defenses against computer virusesBiologically inspired defenses against computer viruses
Biologically inspired defenses against computer viruses
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
The Various Classes of Antivirus!
The Various Classes of Antivirus!The Various Classes of Antivirus!
The Various Classes of Antivirus!
 
A history of computer viruses introduction
A history of computer viruses   introductionA history of computer viruses   introduction
A history of computer viruses introduction
 
Historyofviruses
HistoryofvirusesHistoryofviruses
Historyofviruses
 
Automated Sample Processing
Automated Sample ProcessingAutomated Sample Processing
Automated Sample Processing
 
IJSRED-V2I3P69
IJSRED-V2I3P69IJSRED-V2I3P69
IJSRED-V2I3P69
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
Seminar on Internet security
Seminar on Internet securitySeminar on Internet security
Seminar on Internet security
 
Fighting computer viruses
Fighting computer virusesFighting computer viruses
Fighting computer viruses
 
C3
C3C3
C3
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch
 
X-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceX-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligence
 
Malware analysis and detection using reverse Engineering, Available at: www....
Malware analysis and detection using reverse Engineering,  Available at: www....Malware analysis and detection using reverse Engineering,  Available at: www....
Malware analysis and detection using reverse Engineering, Available at: www....
 
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
 
Information security
Information securityInformation security
Information security
 
Computer virus and cyber attack
Computer virus and cyber attackComputer virus and cyber attack
Computer virus and cyber attack
 
Conficker
ConfickerConficker
Conficker
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Kürzlich hochgeladen (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Anti virus

  • 1. Presented by: Ajit Kumar Pradhan 090101ITR006 7th Sem IT
  • 2. After INTERNET has evolved it had given a sophisticate increase on the general computer user as well as the malicious code writer, who has changed the backbone of internet architecture for their futuristic use & produced billions of malicious codes throughout the web. For defending these many billions of advance technological codes we use a outdated technology called as Antivirus. Is it sufficient ? Lets see……
  • 3. In 1969 the term ‘virus’ – Dr. David Gerrold.  In 1971 ‘Creeper virus‘ detected by-ARPANET.  In between 1974-79 some virus like Webbit ,Animal ,Shockwave rider.  "Elk Cloner" first personal computer virus "in the wild“ in 1981.
  • 4. Claimed by John McAfee in 1983.  Mr. Fred Cohen published 1st educational paper on viruses in 1984.  The first documented signature based antivirus s/w produced by Bernd Fix in 1987.  In late 1987 two released based on heuristic analysis Flushot Plus by Ross Greenberg and Anti4us by Erwin Lanting.  In 1988 a mailing list named VIRUS-L formed for better research in field of viruses.  From 1988 -2007 strategic development occurs.
  • 5. 100-200 billions of viruses believed to exist “in the wild”.  “Infinite amounts” in zoos.  At least 300 new malicious programs (Worms, Trojans, Spyware, Hacker tools, Root-kits ) released per day.  2- 3 millions of undetectable programs exists from early 19th centuries.
  • 6. It is software used to prevent, detect and remove Malicious programs.  Provides computer security implemented by software methodology.
  • 7.
  • 8. No common malware definition  No common repository  Out-of date signatures
  • 9.  High rate of production of new advanced virus.  Traditional techniques like digital signature analysis.  Lake of up-to-date knowledge.  Unexpected renewal costs for providing service.  Rogue security applications  Problems caused by false positives  System and interoperability related issues.  Damage happens to ordinary files.
  • 10. According to an FBI survey, major businesses lose $12 million annually dealing with virus incidents.  A recent Yankee Group report stated that 99% of companies had AV technology installed, yet 62% of companies suffered successful virus attacks.  According to AusCERT, Australia’s Computer Emergency Response Team, the two most technological and deployed AV products fail to prevent 80% of new threats.
  • 11.
  • 12.
  • 13.
  • 14. Try to use a good up-to-date antivirus product.  Learn about malicious virus infection procedure  Up to date with virus definitions.  Use your commonsense while using system
  • 15. As we are entering to a new era of technology where no Antivirus is appropriate for protecting our confidentiality, because of the featured brain of malicious code writers. For protecting our privacy we have to up to date our brain with the technology.
  • 16. http://theinventionofantivirussoftware.blogs pot.in/  http://en.wikipedia.org/wiki/Antivirus_softwa re  http://www.antivirussoftwaremax.com/the- history-of-antivirus-software/