SlideShare ist ein Scribd-Unternehmen logo
1 von 25
• NAME: Peer Umair
Firdous
• Group: 157a
Introduction to Antivirus Programs
• Antivirus software is a type of program
designed and developed to protect computers
from malware like viruses, computer worms,
spyware, botnets, rootkits, key loggers and
such. Antivirus programs function to scan,
detect and remove viruses from your
computer
What is a computer virus?
• In more technical terms, a computer virus is a
type of malicious code or program written to
alter the way a computer operates and is
designed to spread from one computer to
another. A virus operates by inserting or
attaching itself to a legitimate program or
document that supports macros in order to
execute its code
Types of Viruses ?
1. Boot sector virus
This type of virus can take control when you start — or boot — your computer. One way it can
spread is by plugging an infected USB drive into your computer.
2. Web scripting virus
This type of virus exploits the code of web browsers and web pages. If you access such a web
page, the virus can infect your computer.
3. Browser hijacker
This type of virus “hijacks” certain web browser functions, and you may be automatically directed
to an unintended website.
4. Resident virus
This is a general term for any virus that inserts itself in a computer system’s memory. A resident
virus can execute anytime when an operating system loads.
5. Direct action virus
This type of virus comes into action when you execute a file containing a virus. Otherwise, it
remains dormant.
Types of Viruses ?
6. Polymorphic virus
A polymorphic virus changes its code each time an infected file is executed. It does
this to evade antivirus programs.
7. File infector virus
This common virus inserts malicious code into executable files — files used to perform
certain functions or operations on a system.
8. Multipartite virus
This kind of virus infects and spreads in multiple ways. It can infect both program files
and system sectors.
9. Macro virus
Macro viruses are written in the same macro language used for software applications.
Such viruses spread when you open an infected document, often through email
attachments.
What are Antivirus Programs?
Antivirus software is a type of security software
designed to protect users from multiple types of
malware, not just viruses.
The software is a risk management tool that
scans devices regularly and on-demand for
known malware and suspicious behavior
associated with malware. Antimalware software
is similar to antivirus software but tends to be
more specific to the malware it defends against.
When malware is detected by antivirus software,
the user will be alerted to the threat and the
malware will be deleted. Sometimes the
antivirus will ask the user first before deletion.
Asking first is a useful attribute when the
detection of malware is a false positive, which is
a possibility when the antivirus uses certain
detection techniques.
Types of Antivirus Programs?
• System monitoring antivirus
• This antivirus protection can monitor
software and computer systems for behavior
that is suspect or atypical of the user.
• For instance, alerts are created when a user
connects to unfamiliar sites or attempts to
access a large number of files, or when there’s
a significant increase in data usage.
Types of Antivirus Programs?
• Machine learning antivirus
• Another form of protection can be machine learning
techniques, which monitor “normal” computer or
network behaviors. The machine learning antivirus
software is able to limit activities by programs or
computers if they look suspicious.
• More specifically, machine learning detection
implements algorithms to facilitate malware detection
that is broader in scope. This type of antivirus
protection is beneficial because it works in tandem
with other antivirus applications to provide multiple
layers of protection.
Types of Antivirus Programs?
• Malware signature antivirus
• Malware signature antivirus software detects
malware signatures, which are digital fingerprints
of malicious software. Antivirus protection can
scan for specific malicious codes, identify specific
viruses, and disable these programs.
• While malware signature antivirus protection is
key for detecting and eradicating known viruses,
one limitation is its inability to address new
viruses. The antivirus product simply doesn’t
contain these new virus signatures.
cyber attacks?
• A cyber attack is an assault launched by cybercriminals
using one or more computers against a single or
multiple computers or networks. A cyber attack can
maliciously disable computers, steal data, or use a
breached computer as a launch point for other attacks.
Cybercriminals use a variety of methods to launch a
cyber attack, including malware, phishing,
ransomware, denial of service, among other methods.
The security solutions in today’s market offer varying degrees of protection
against cyber attacks, which you can use at least for a level of primary
protection. These are:
Encryption Software: This software can help encrypt and protect all your
sensitive data such as customer information, financial statements,
employee records, and client information.
Data Backup Solutions: Data Backup Solutions can help backup all your
business-critical data. In the event of any information loss or compromise,
you can quickly retrieve the data from the alternate backup location.
Password Security Software: With a password security software, you
can set up a two-step authentication or password security for your internal
programs to reduce the probability of hacking of passwords.
Antivirus Software: An antivirus software can be your primary defense
against most types of malware.
Firewalls: Firewalls can help provide an added layer of protection to any
hardware or software. Firewalls can help prevent an unauthorized user
from accessing a computer or network.
360 SECURITY
• 360 Total Security is a program developed by
Qihoo 360, an internet security company
based in China. 360 Safeguard's focus is on
stopping malware such as computer
viruses and trojan horses, and providing
security patches for Microsoft Windows. 360
Safeguard trojan horse scanner is cloud-based.
A heuristics engine is built into the scanner.
• What features does 360 Total Security
Provide?
• Some interesting applications contained
within this framework include protection
against online shopping hackers, blocking
potential key loggers and ensuring that an
existing webcam is not hacked for nefarious
purposes. More features are likely to be made
available as new concerns emerge
• Will 360 Total Security protect my system
against ransomware?
• Ransomware is an emerging threat and it
needs to be taken seriously. This system is
able to detect and thwart the majority of
these viruses. All versions provide this level of
protection. Users can therefore determine
whether or not their systems may be at risk.
• What antivirus engines does 360 Total
Security employ?
• This package works in synergy with
Bitdefender and Avira. These are two of the
most powerful engines on the market today,
so we can be assured of superior levels of
coverage (particularly with more advanced
threats). The free version also utilizes these
effective tools.
Interface of 360 Security:
Link to Download 360 Security:
https://www.360totalsecurity.com/en/
Cybersecurity

Weitere ähnliche Inhalte

Was ist angesagt?

IT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest ThreatIT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest ThreatETech 7
 
Cybersecurity…real world solutions
Cybersecurity…real world solutions Cybersecurity…real world solutions
Cybersecurity…real world solutions ErnestStaats
 
Anatomy of a Ransomware Event
Anatomy of a Ransomware EventAnatomy of a Ransomware Event
Anatomy of a Ransomware EventArt Ocain
 
Ransomware Detection: Don’t Pay Up. Backup.
Ransomware Detection:  Don’t Pay Up. Backup.Ransomware Detection:  Don’t Pay Up. Backup.
Ransomware Detection: Don’t Pay Up. Backup.marketingunitrends
 
Triangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughTriangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughMartin Opsahl
 
Cambodia CERT Seminar: Incident response for ransomeware attacks
Cambodia CERT Seminar: Incident response for ransomeware attacksCambodia CERT Seminar: Incident response for ransomeware attacks
Cambodia CERT Seminar: Incident response for ransomeware attacksAPNIC
 
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?Storage Switzerland
 
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Planning your 2015 Threat Detection Strategy with a Broken Crystal BallPlanning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Planning your 2015 Threat Detection Strategy with a Broken Crystal BallAlienVault
 
AI for Ransomware Detection & Prevention Insights from Patents
AI for Ransomware Detection & Prevention Insights from PatentsAI for Ransomware Detection & Prevention Insights from Patents
AI for Ransomware Detection & Prevention Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
Take the Ransom Out of Ransomware
Take the Ransom Out of RansomwareTake the Ransom Out of Ransomware
Take the Ransom Out of RansomwareUnitrends
 
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than EverNew USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than EverAlienVault
 
Cyber Attack Survival: Are You Ready?
Cyber Attack Survival:  Are You Ready?Cyber Attack Survival:  Are You Ready?
Cyber Attack Survival: Are You Ready?Radware
 
Cybersecurity: How to Protect Your Firm from a Cyber Attack
Cybersecurity: How to Protect Your Firm from a Cyber AttackCybersecurity: How to Protect Your Firm from a Cyber Attack
Cybersecurity: How to Protect Your Firm from a Cyber AttackShawn Tuma
 
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber AttackWebinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber AttackAujas
 
Demo how to detect ransomware with alien vault usm_gg
Demo  how to detect ransomware with alien vault usm_ggDemo  how to detect ransomware with alien vault usm_gg
Demo how to detect ransomware with alien vault usm_ggAlienVault
 
Cerdant Security State of the Union
Cerdant Security State of the UnionCerdant Security State of the Union
Cerdant Security State of the UnionDavid Perkins
 
Cyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSCyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSKenny Huang Ph.D.
 
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESRansomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESKatherine Duffy
 

Was ist angesagt? (20)

IT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest ThreatIT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest Threat
 
Cybersecurity…real world solutions
Cybersecurity…real world solutions Cybersecurity…real world solutions
Cybersecurity…real world solutions
 
Anatomy of a Ransomware Event
Anatomy of a Ransomware EventAnatomy of a Ransomware Event
Anatomy of a Ransomware Event
 
Ransomware Detection: Don’t Pay Up. Backup.
Ransomware Detection:  Don’t Pay Up. Backup.Ransomware Detection:  Don’t Pay Up. Backup.
Ransomware Detection: Don’t Pay Up. Backup.
 
Triangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughTriangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enough
 
Cambodia CERT Seminar: Incident response for ransomeware attacks
Cambodia CERT Seminar: Incident response for ransomeware attacksCambodia CERT Seminar: Incident response for ransomeware attacks
Cambodia CERT Seminar: Incident response for ransomeware attacks
 
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
 
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Planning your 2015 Threat Detection Strategy with a Broken Crystal BallPlanning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
 
AI for Ransomware Detection & Prevention Insights from Patents
AI for Ransomware Detection & Prevention Insights from PatentsAI for Ransomware Detection & Prevention Insights from Patents
AI for Ransomware Detection & Prevention Insights from Patents
 
Ransomware
RansomwareRansomware
Ransomware
 
Take the Ransom Out of Ransomware
Take the Ransom Out of RansomwareTake the Ransom Out of Ransomware
Take the Ransom Out of Ransomware
 
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than EverNew USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
 
Cyber Attack Survival: Are You Ready?
Cyber Attack Survival:  Are You Ready?Cyber Attack Survival:  Are You Ready?
Cyber Attack Survival: Are You Ready?
 
Cybersecurity: How to Protect Your Firm from a Cyber Attack
Cybersecurity: How to Protect Your Firm from a Cyber AttackCybersecurity: How to Protect Your Firm from a Cyber Attack
Cybersecurity: How to Protect Your Firm from a Cyber Attack
 
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber AttackWebinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
 
Demo how to detect ransomware with alien vault usm_gg
Demo  how to detect ransomware with alien vault usm_ggDemo  how to detect ransomware with alien vault usm_gg
Demo how to detect ransomware with alien vault usm_gg
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
 
Cerdant Security State of the Union
Cerdant Security State of the UnionCerdant Security State of the Union
Cerdant Security State of the Union
 
Cyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSCyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoS
 
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESRansomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
 

Ähnlich wie Cybersecurity

ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
information about virus
information about virusinformation about virus
information about virustoshan badiye
 
How Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfHow Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfBlogger
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirussinghhp10699
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Security threats explained
Security threats explained Security threats explained
Security threats explained Abhijeet Karve
 
How do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfHow do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfBlogger
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?culltdueet65
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02hiiraa
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptxPragatiKachhi1
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptxLakshayNRReddy
 

Ähnlich wie Cybersecurity (20)

Computer Virus_Athi-1.pdf
Computer Virus_Athi-1.pdfComputer Virus_Athi-1.pdf
Computer Virus_Athi-1.pdf
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
information about virus
information about virusinformation about virus
information about virus
 
How Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfHow Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdf
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
Firewall
FirewallFirewall
Firewall
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Security threats explained
Security threats explained Security threats explained
Security threats explained
 
How do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfHow do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdf
 
Antivirus
AntivirusAntivirus
Antivirus
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?
 
Virus & Antivirus
Virus & AntivirusVirus & Antivirus
Virus & Antivirus
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 

Mehr von UmairFirdous

1 introd-n.pptxhggvbyyttrreewwqqsssdfgjjj
1 introd-n.pptxhggvbyyttrreewwqqsssdfgjjj1 introd-n.pptxhggvbyyttrreewwqqsssdfgjjj
1 introd-n.pptxhggvbyyttrreewwqqsssdfgjjjUmairFirdous
 
Opthalmology Kotha bole aur kya kar rahey h
Opthalmology Kotha bole aur kya kar rahey hOpthalmology Kotha bole aur kya kar rahey h
Opthalmology Kotha bole aur kya kar rahey hUmairFirdous
 
disorderofpuberty.pptx
disorderofpuberty.pptxdisorderofpuberty.pptx
disorderofpuberty.pptxUmairFirdous
 
Biliary Dyskinesia.pptx
Biliary Dyskinesia.pptxBiliary Dyskinesia.pptx
Biliary Dyskinesia.pptxUmairFirdous
 
hypothyroidism.pptx
hypothyroidism.pptxhypothyroidism.pptx
hypothyroidism.pptxUmairFirdous
 
Acute Pancreatitis.ppt
Acute Pancreatitis.pptAcute Pancreatitis.ppt
Acute Pancreatitis.pptUmairFirdous
 
chestandabdominaltrauma-190114100000.pdf
chestandabdominaltrauma-190114100000.pdfchestandabdominaltrauma-190114100000.pdf
chestandabdominaltrauma-190114100000.pdfUmairFirdous
 
folicaciddeficiency-230725062219-7281efe9.pdf
folicaciddeficiency-230725062219-7281efe9.pdffolicaciddeficiency-230725062219-7281efe9.pdf
folicaciddeficiency-230725062219-7281efe9.pdfUmairFirdous
 
Mohammad_Umar_Pathphysiology_ppt.pptx
Mohammad_Umar_Pathphysiology_ppt.pptxMohammad_Umar_Pathphysiology_ppt.pptx
Mohammad_Umar_Pathphysiology_ppt.pptxUmairFirdous
 
Dar_Shahid_Yousuf_Iws.pptx
Dar_Shahid_Yousuf_Iws.pptxDar_Shahid_Yousuf_Iws.pptx
Dar_Shahid_Yousuf_Iws.pptxUmairFirdous
 

Mehr von UmairFirdous (12)

1 introd-n.pptxhggvbyyttrreewwqqsssdfgjjj
1 introd-n.pptxhggvbyyttrreewwqqsssdfgjjj1 introd-n.pptxhggvbyyttrreewwqqsssdfgjjj
1 introd-n.pptxhggvbyyttrreewwqqsssdfgjjj
 
Opthalmology Kotha bole aur kya kar rahey h
Opthalmology Kotha bole aur kya kar rahey hOpthalmology Kotha bole aur kya kar rahey h
Opthalmology Kotha bole aur kya kar rahey h
 
disorderofpuberty.pptx
disorderofpuberty.pptxdisorderofpuberty.pptx
disorderofpuberty.pptx
 
Biliary Dyskinesia.pptx
Biliary Dyskinesia.pptxBiliary Dyskinesia.pptx
Biliary Dyskinesia.pptx
 
hypothyroidism.pptx
hypothyroidism.pptxhypothyroidism.pptx
hypothyroidism.pptx
 
Acute Pancreatitis.ppt
Acute Pancreatitis.pptAcute Pancreatitis.ppt
Acute Pancreatitis.ppt
 
1.pptx
1.pptx1.pptx
1.pptx
 
chestandabdominaltrauma-190114100000.pdf
chestandabdominaltrauma-190114100000.pdfchestandabdominaltrauma-190114100000.pdf
chestandabdominaltrauma-190114100000.pdf
 
folicaciddeficiency-230725062219-7281efe9.pdf
folicaciddeficiency-230725062219-7281efe9.pdffolicaciddeficiency-230725062219-7281efe9.pdf
folicaciddeficiency-230725062219-7281efe9.pdf
 
361_ASHUTOSH.pptx
361_ASHUTOSH.pptx361_ASHUTOSH.pptx
361_ASHUTOSH.pptx
 
Mohammad_Umar_Pathphysiology_ppt.pptx
Mohammad_Umar_Pathphysiology_ppt.pptxMohammad_Umar_Pathphysiology_ppt.pptx
Mohammad_Umar_Pathphysiology_ppt.pptx
 
Dar_Shahid_Yousuf_Iws.pptx
Dar_Shahid_Yousuf_Iws.pptxDar_Shahid_Yousuf_Iws.pptx
Dar_Shahid_Yousuf_Iws.pptx
 

Kürzlich hochgeladen

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

Cybersecurity

  • 1. • NAME: Peer Umair Firdous • Group: 157a
  • 2.
  • 3.
  • 4. Introduction to Antivirus Programs • Antivirus software is a type of program designed and developed to protect computers from malware like viruses, computer worms, spyware, botnets, rootkits, key loggers and such. Antivirus programs function to scan, detect and remove viruses from your computer
  • 5. What is a computer virus? • In more technical terms, a computer virus is a type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another. A virus operates by inserting or attaching itself to a legitimate program or document that supports macros in order to execute its code
  • 6. Types of Viruses ? 1. Boot sector virus This type of virus can take control when you start — or boot — your computer. One way it can spread is by plugging an infected USB drive into your computer. 2. Web scripting virus This type of virus exploits the code of web browsers and web pages. If you access such a web page, the virus can infect your computer. 3. Browser hijacker This type of virus “hijacks” certain web browser functions, and you may be automatically directed to an unintended website. 4. Resident virus This is a general term for any virus that inserts itself in a computer system’s memory. A resident virus can execute anytime when an operating system loads. 5. Direct action virus This type of virus comes into action when you execute a file containing a virus. Otherwise, it remains dormant.
  • 7. Types of Viruses ? 6. Polymorphic virus A polymorphic virus changes its code each time an infected file is executed. It does this to evade antivirus programs. 7. File infector virus This common virus inserts malicious code into executable files — files used to perform certain functions or operations on a system. 8. Multipartite virus This kind of virus infects and spreads in multiple ways. It can infect both program files and system sectors. 9. Macro virus Macro viruses are written in the same macro language used for software applications. Such viruses spread when you open an infected document, often through email attachments.
  • 8.
  • 9. What are Antivirus Programs? Antivirus software is a type of security software designed to protect users from multiple types of malware, not just viruses. The software is a risk management tool that scans devices regularly and on-demand for known malware and suspicious behavior associated with malware. Antimalware software is similar to antivirus software but tends to be more specific to the malware it defends against. When malware is detected by antivirus software, the user will be alerted to the threat and the malware will be deleted. Sometimes the antivirus will ask the user first before deletion. Asking first is a useful attribute when the detection of malware is a false positive, which is a possibility when the antivirus uses certain detection techniques.
  • 10. Types of Antivirus Programs? • System monitoring antivirus • This antivirus protection can monitor software and computer systems for behavior that is suspect or atypical of the user. • For instance, alerts are created when a user connects to unfamiliar sites or attempts to access a large number of files, or when there’s a significant increase in data usage.
  • 11. Types of Antivirus Programs? • Machine learning antivirus • Another form of protection can be machine learning techniques, which monitor “normal” computer or network behaviors. The machine learning antivirus software is able to limit activities by programs or computers if they look suspicious. • More specifically, machine learning detection implements algorithms to facilitate malware detection that is broader in scope. This type of antivirus protection is beneficial because it works in tandem with other antivirus applications to provide multiple layers of protection.
  • 12. Types of Antivirus Programs? • Malware signature antivirus • Malware signature antivirus software detects malware signatures, which are digital fingerprints of malicious software. Antivirus protection can scan for specific malicious codes, identify specific viruses, and disable these programs. • While malware signature antivirus protection is key for detecting and eradicating known viruses, one limitation is its inability to address new viruses. The antivirus product simply doesn’t contain these new virus signatures.
  • 13.
  • 14.
  • 15. cyber attacks? • A cyber attack is an assault launched by cybercriminals using one or more computers against a single or multiple computers or networks. A cyber attack can maliciously disable computers, steal data, or use a breached computer as a launch point for other attacks. Cybercriminals use a variety of methods to launch a cyber attack, including malware, phishing, ransomware, denial of service, among other methods.
  • 16.
  • 17. The security solutions in today’s market offer varying degrees of protection against cyber attacks, which you can use at least for a level of primary protection. These are: Encryption Software: This software can help encrypt and protect all your sensitive data such as customer information, financial statements, employee records, and client information. Data Backup Solutions: Data Backup Solutions can help backup all your business-critical data. In the event of any information loss or compromise, you can quickly retrieve the data from the alternate backup location. Password Security Software: With a password security software, you can set up a two-step authentication or password security for your internal programs to reduce the probability of hacking of passwords. Antivirus Software: An antivirus software can be your primary defense against most types of malware. Firewalls: Firewalls can help provide an added layer of protection to any hardware or software. Firewalls can help prevent an unauthorized user from accessing a computer or network.
  • 18.
  • 19. 360 SECURITY • 360 Total Security is a program developed by Qihoo 360, an internet security company based in China. 360 Safeguard's focus is on stopping malware such as computer viruses and trojan horses, and providing security patches for Microsoft Windows. 360 Safeguard trojan horse scanner is cloud-based. A heuristics engine is built into the scanner.
  • 20. • What features does 360 Total Security Provide? • Some interesting applications contained within this framework include protection against online shopping hackers, blocking potential key loggers and ensuring that an existing webcam is not hacked for nefarious purposes. More features are likely to be made available as new concerns emerge
  • 21. • Will 360 Total Security protect my system against ransomware? • Ransomware is an emerging threat and it needs to be taken seriously. This system is able to detect and thwart the majority of these viruses. All versions provide this level of protection. Users can therefore determine whether or not their systems may be at risk.
  • 22. • What antivirus engines does 360 Total Security employ? • This package works in synergy with Bitdefender and Avira. These are two of the most powerful engines on the market today, so we can be assured of superior levels of coverage (particularly with more advanced threats). The free version also utilizes these effective tools.
  • 23. Interface of 360 Security:
  • 24. Link to Download 360 Security: https://www.360totalsecurity.com/en/