SlideShare a Scribd company logo
1 of 11
SANDBO   New age Security


   X
   Presented By:-
               Ashish Gautam
               6059
Preface

     The term security always plays an
important role in our lives ,where it is the
age of computers so security plays an even
bigger role.

    The latest and most sophisticated
technology emerged recently is Sand Box
technology.
About Sand Box

In computer security, a sandbox is a security
mechanism for separating running programs.
It is often used to execute untested
code,untrusted users and untrusted websites
in a virtual Environment . Any action take by
suspicious virus present in these will not
effect our System.
Working of SANDBOX Technology

Auto Sandbox offers three options for users
whenever suspicious application is
identified and prompted to run in safe
virtualized environment: 1. execute the file
within the virtual AutoSandbox, 2. run it
outside the sandbox or 3. cancel running the
application entirely.
Working of SANDBOX Technology

When user allows to run suspicious
program in the Sandbox, the program will
run as usual but operations like files
opened/created/renamed and read/writes
from registry are monitored and virtualized,
that means stored only in the sandbox and
no permanent changes will be saved to
user’s system.
VIRUS SCANNERS VS SANDBOX

Sand Box scans the actions the virus code takes
 and not the name or characteristics of the virus.
Sandbox cannot replace anti-virus scanners as
 identification, disinfection and removal of viruses
 can only be done by virus scanners.
Both work complementary to each others for
 providing a fully secured environment .
FEATURES OF SANDBOX
First in the world
           Norman is the first anti-virus
 company in the world to present this new
 technology .
User friendly
   It can detect unknown viruses with a
 minimal risk of false alarms.
Sophisticated technology
  The method is based on the basic function of
 a computer virus replication.
WITHOUT SANDBOX ?
If the sandbox agent does not protect your computer,
hostile applets could access all the files and
resources that are available on your computer.
Recently corporate networks and computers connects
to the internet have been attacked and have reported
damages from illegal access from the outside.
Malicious mobile code (java as well as other executables )
is increasingly being used to issue these attacks. Without
sophisticated knowledge like sandbox the rate of threats
increases enormously.
LIST OF COMMON ATTACKS

Deleting of files
Theft of information and data
Remote access via the internet
Manipulation of your connection
Dangerous calls to the system
?
THANK ’U’

More Related Content

What's hot

What's hot (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Ddos attacks
Ddos attacksDdos attacks
Ddos attacks
 
Bug bounty
Bug bountyBug bounty
Bug bounty
 
Antivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methodsAntivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methods
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
DDoS Attack PPT by Nitin Bisht
DDoS Attack  PPT by Nitin BishtDDoS Attack  PPT by Nitin Bisht
DDoS Attack PPT by Nitin Bisht
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny Czarny
 
Computer virus
Computer virusComputer virus
Computer virus
 
What is malware
What is malwareWhat is malware
What is malware
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
Network Security
Network SecurityNetwork Security
Network Security
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Bug Bounty Secrets
Bug Bounty Secrets Bug Bounty Secrets
Bug Bounty Secrets
 
App development
App developmentApp development
App development
 

Viewers also liked

The Sandbox Approach - Improving our Working Environment
The Sandbox Approach - Improving our Working EnvironmentThe Sandbox Approach - Improving our Working Environment
The Sandbox Approach - Improving our Working Environment
Roberto de Paula Lico Junior
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
Arrow ECS UK
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
aztechtchr
 

Viewers also liked (14)

Sandbox for 2nd sem
Sandbox for 2nd semSandbox for 2nd sem
Sandbox for 2nd sem
 
The Sandbox
The SandboxThe Sandbox
The Sandbox
 
WORKING ENVIRONMENT
WORKING ENVIRONMENTWORKING ENVIRONMENT
WORKING ENVIRONMENT
 
The Sandbox Approach - Improving our Working Environment
The Sandbox Approach - Improving our Working EnvironmentThe Sandbox Approach - Improving our Working Environment
The Sandbox Approach - Improving our Working Environment
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
Honeypot ppt1
Honeypot ppt1Honeypot ppt1
Honeypot ppt1
 
Honey Pot
Honey PotHoney Pot
Honey Pot
 
Antivirus
AntivirusAntivirus
Antivirus
 
checkpoint
checkpointcheckpoint
checkpoint
 
Malware
MalwareMalware
Malware
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
E-PAPER TECHNOLOGY
E-PAPER TECHNOLOGYE-PAPER TECHNOLOGY
E-PAPER TECHNOLOGY
 

Similar to Sandbox Technology in AntiVirus

Beyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityBeyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus security
UltraUploader
 
Battling Malware In The Enterprise
Battling Malware In The EnterpriseBattling Malware In The Enterprise
Battling Malware In The Enterprise
Ayed Al Qartah
 

Similar to Sandbox Technology in AntiVirus (20)

Sandboxing - Malware detection.pptx
Sandboxing - Malware detection.pptxSandboxing - Malware detection.pptx
Sandboxing - Malware detection.pptx
 
What is Ransomware? How To Prevent It
What is Ransomware? How To Prevent ItWhat is Ransomware? How To Prevent It
What is Ransomware? How To Prevent It
 
Next Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers GuideNext Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers Guide
 
Sandbox Security
Sandbox Security Sandbox Security
Sandbox Security
 
Comodo advanced endpoint protection
Comodo advanced endpoint protectionComodo advanced endpoint protection
Comodo advanced endpoint protection
 
Product brochure-print-spread
Product brochure-print-spreadProduct brochure-print-spread
Product brochure-print-spread
 
Beyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityBeyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus security
 
It kamus virus security glossary
It kamus virus   security glossaryIt kamus virus   security glossary
It kamus virus security glossary
 
SentinelOne Buyers Guide
SentinelOne Buyers GuideSentinelOne Buyers Guide
SentinelOne Buyers Guide
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
How to install Kaspersky Antivirus.ppt
How to install Kaspersky Antivirus.pptHow to install Kaspersky Antivirus.ppt
How to install Kaspersky Antivirus.ppt
 
How to Choose a SandBox - Gartner
How to Choose a SandBox - GartnerHow to Choose a SandBox - Gartner
How to Choose a SandBox - Gartner
 
10 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 202310 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 2023
 
Insecure magazine - 52
Insecure magazine - 52Insecure magazine - 52
Insecure magazine - 52
 
RSA OSX Malware
RSA OSX MalwareRSA OSX Malware
RSA OSX Malware
 
Your Guide to tackle the Ransomware threat "WannaCry" | Sysfore
Your Guide to tackle the Ransomware threat "WannaCry" | SysforeYour Guide to tackle the Ransomware threat "WannaCry" | Sysfore
Your Guide to tackle the Ransomware threat "WannaCry" | Sysfore
 
OS X Malware: Let's Play Doctor
OS X Malware: Let's Play DoctorOS X Malware: Let's Play Doctor
OS X Malware: Let's Play Doctor
 
Battling Malware In The Enterprise
Battling Malware In The EnterpriseBattling Malware In The Enterprise
Battling Malware In The Enterprise
 
website vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paperwebsite vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paper
 
How to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksHow to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware Attacks
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 

Sandbox Technology in AntiVirus

  • 1. SANDBO New age Security X Presented By:- Ashish Gautam 6059
  • 2. Preface The term security always plays an important role in our lives ,where it is the age of computers so security plays an even bigger role. The latest and most sophisticated technology emerged recently is Sand Box technology.
  • 3. About Sand Box In computer security, a sandbox is a security mechanism for separating running programs. It is often used to execute untested code,untrusted users and untrusted websites in a virtual Environment . Any action take by suspicious virus present in these will not effect our System.
  • 4. Working of SANDBOX Technology Auto Sandbox offers three options for users whenever suspicious application is identified and prompted to run in safe virtualized environment: 1. execute the file within the virtual AutoSandbox, 2. run it outside the sandbox or 3. cancel running the application entirely.
  • 5. Working of SANDBOX Technology When user allows to run suspicious program in the Sandbox, the program will run as usual but operations like files opened/created/renamed and read/writes from registry are monitored and virtualized, that means stored only in the sandbox and no permanent changes will be saved to user’s system.
  • 6. VIRUS SCANNERS VS SANDBOX Sand Box scans the actions the virus code takes and not the name or characteristics of the virus. Sandbox cannot replace anti-virus scanners as identification, disinfection and removal of viruses can only be done by virus scanners. Both work complementary to each others for providing a fully secured environment .
  • 7. FEATURES OF SANDBOX First in the world Norman is the first anti-virus company in the world to present this new technology . User friendly It can detect unknown viruses with a minimal risk of false alarms. Sophisticated technology The method is based on the basic function of a computer virus replication.
  • 8. WITHOUT SANDBOX ? If the sandbox agent does not protect your computer, hostile applets could access all the files and resources that are available on your computer. Recently corporate networks and computers connects to the internet have been attacked and have reported damages from illegal access from the outside. Malicious mobile code (java as well as other executables ) is increasingly being used to issue these attacks. Without sophisticated knowledge like sandbox the rate of threats increases enormously.
  • 9. LIST OF COMMON ATTACKS Deleting of files Theft of information and data Remote access via the internet Manipulation of your connection Dangerous calls to the system
  • 10. ?

Editor's Notes

  1. Sophisticated:- Able to understand difficult or complicated things.
  2. Hostile:- Virodhi Applets:- a simple program that can make one thing Malicious:- Natkhat Sophisticated:- Able to understand difficult or complicated things.
  3. Denial of Services
  4. Q. What does malicious software do? A. Malicious software is typically designed to infect your computer. This infection is accomplished by the integration with, or the taking over of, various aspects of your Windows operating system. Following this infection, different types of malicious software have different goals. For example, a virus program might spread to more computers, and a spyware program might record your keyboard activity. Q. How does Sandboxie protect against computer viruses? A. Sandboxie considers the program it supervises as potentially harmful, and keeps the programs bound within a  sandbox , which is a kind of protective bubble. The program cannot escape the sandbox, and therefore cannot change, harm or infect your computer in any way. When you're done with the program, you delete the sandbox. Q. Does Sandboxie remove viruses? A. Yes, but not in the sense that Sandboxie discards just the viruses, and leaves everything else intact. What Sandboxie does is delete the entire sandbox, which deletes any viruses trapped within the sandbox, as well as any other changes (good or bad) that were attempted by the program running under the supervision of Sandboxie. Q. Is Sandboxie an anti-virus? A. No. While Sandboxie is a countermeasure against malicious software, it works differently from traditional anti-virus software. Unlike an anti-virus, Sandboxie does not attempt to identify or differentiate between "good" and "bad" (or harmful) programs. An anti-virus might not identify a new virus, and might let it slip by and infect your computer. Sandboxie, on the other hand, considers all programs as potentially harmful, and does not let any program modify your computer in any way. Q. Should I use Sandboxie instead of anti-virus software? A. No. Sandboxie can prevent a virus in the sandbox from escaping into your real computer. However, common sense dictates that it is preferable to prevent the virus from running in the first place. Therefore it is a good idea to use anti-virus software to prevent known threats, while relying on Sandboxie to be your first line of defense against threats that are not yet known to the anti-virus. Q. Is Sandboxie 100% fool-proof? A. No, but it tries to be as close as possible to 100%. At the same time, it is important to remember that Sandboxie is never the only software in your computer. Your other software, including your Windows operating system, might have security holes that could be abused by viruses in ways that no security software can prevent. Therefore it is always important to keep up with software updates. As the saying goes: "The only truly secure computer is one buried in concrete, with the power turned off and the network cable cut." Q. Can the anti-virus detect a virus in the sandbox? A. Yes. Files contained in the sandbox are stored in the hard disk, typically in the folder SANDBOX in drive C. Programs under the supervision of Sandboxie can only operate within this folder, but there is nothing special about the folder itself. The anti-virus software may detect viruses as they arrive into this folder, or at any later time. Q. How should I respond to the anti-virus detecting a virus? A. Your anti-virus should tell you where the virus was identified. If the virus was identified within the sandbox (typically, in the SANDBOX folder in drive C), there is little cause for alarm. You can immediately invoke the Delete Sandbox  command, or you may direct the anti-virus to delete the virus file, or move it to quarantine. Q. When the anti-virus moves a virus file out of the sandbox and into quarantine, does it bypass Sandboxie? A. No. The anti-virus itself is not operating under the supervision of Sandboxie, even if the virus alert seems to indicate otherwise. Operating outside the sandbox, the anti-virus can reach into the sandbox folder, pull the virus file, and move it into quarantine. The process is similar to SandboxieQuick Recovery, wherein Sandboxie Control reaches inside the sandbox to pull some file out of it. Q. Will viruses remain in the sandbox after I close all programs in the sandbox? A. Yes and no:  1. No, if your sandbox is set to automatically delete;  2. Yes, in the default configuration, but only until you manually delete the contents of the sandbox.  It is important to note that a virus file in the sandbox is just that --  a file , not much different from your average text file. Unless you move the file out of the sandbox and invoke it, there is little cause for alarm. Q. Do I have to securely wipe the contents of the sandbox to make sure the virus is gone? A. No. Although you can configure Sandboxie to use a third-party data wiping utility, the key point is to make the virus file itself inaccessible, and this is accomplished even with non-secure deletion. There is, however, an advantage to secure deletion, as discussed in the next answer. Q. Why does my anti-virus detect a virus in the  System Volume Information  folder? A. The System Restore component in Windows collects various files into the  System Volume Information  when they are deleted. While the intention is to protect your system, sometimes System Restore ends up making copies of virus files. These virus files are inactive, and even if restored, will be restored into the sandbox, so there is little cause for alarm. Nevertheless, it is a good idea to let your anti-virus get rid of any such virus files.  Note that this will not occur if you securely wipe the contents of the sandbox (see previous quesion). Q. My computer is already infected with a virus, will Sandboxie protect against that virus? A. No. Sandboxie can only protect your computer from the programs that run under the supervision of Sandboxie. The virus which has already infected your computer is running unencumbered outside the supervision of Sandboxie. It might also serve as an infection channel and assist other viruses in the sandbox to break out of the sandbox and infect your computer. It is strongly recommended that you dis-infect your computer as soon as possible, then install Sandboxie to protect against future threats. Q. Does Sandboxie protect against the KillDisk virus? A. Yes. The KillDisk virus works by modifying the hard disk partition directly, bypassing any file systems. This kind of access has been blocked since Sandboxie version 2.33 (early 2006). Q. Can I install an anti-virus (or firewalls or other security software) into the sandbox? A. For most security software, the answer is no. This type of software wants to integrate with Windows in order to monitor access to files and network connections. Sandboxie is designed to isolate programs in the sandbox from the rest of the system, which means the security software will be unable to monitor the system correctly. Note that virus scanner software which does not include active ("real time") monitoring should be able to function correctly under Sandboxie.