SlideShare una empresa de Scribd logo
1 de 12
ANTI VIRUS
Presented To:
PIR AMAD ALI SHAH
PRESENTED BY
 FURQAN UMER KHAN B-18261
 M. SOHAIB AFZAAL B-17545
Content
 INTRODUCTION
 HISTORY
 ANTIVIRUS TYPES
 ANTIVIRUS SOFTWARE
 ANTIVIRUS SOFTWARE TYPES
 ANTIVIRUS PROGRAM
What is Anti-Virus
 Antivirus or anti-virus software (often abbreviated as AV),
sometimes known as anti-malware software, is computer
software used to prevent, detect and remove malicious
software.
 Antivirus software was originally developed to detect and
remove computer viruses.
 In particular, modern antivirus software can protect from:
malicious browser helper objects (BHOs), browser hijackers,
ransomware, keyloggers, backdoors, rootkits, trojan horses,
worms, malicious LSPs, dialers, fraudtools, adware and
spyware.
 Some products also include protection from other computer
threats, such as infected and malicious URLs, spam, scam
and phishing attacks, online identity (privacy), online
banking attacks, social engineering techniques, advanced
persistent threat (APT) and botnet DDoS attacks
History
 In the early 1980s, Internet security was
practically nonexistent. No large-scale
attacks had ever been attempted, and
network-based vulnerabilities were rarely,
if ever, exploited. T
 his changed in the late 1980s with the
Morris Worm, the first known large-scale
attack propagated via the Internet.
 Today, spyware, viruses, trojan attacks,
worms, and malware are all common
occurrences affecting nearly every
computer user at least once.
Anti-Virus Types
1. Firewall software: Analyzes incoming and outgoing data
packets on a network; that is, all the information sent and
received through the computer's network connection.
2. Network layer firewalls: are called packet filters. These
firewalls are the simplest of firewalls, and only allow
information packets to pass through the firewall if the
packet matches a specific set of rules.
3. Proxy servers: act as a firewall in that they inspect
incoming packets for specific applications and block all
other requests.
4. Application Layer Firewalls: These firewalls inspect all
packets for specific protocols, such as FTP and browser
traffic.
Antivirus Software
 Antivirus software identifies, prevents, and removes
malware from a computer system.
 Malware is any number of viruses and software bits
that intend to harm the computer or steal
information, such as viruses, adware, rootkits,
backdoors, hijackers, keyloggers, spyware, trojans,
and worms.
 Modern antivirus software employs several methods
to detect and remove malware. However, no
antivirus software can detect and prevent all possible
malware.
Types of Antivirus Software
1. Signature Based Detection: The antivirus software can
then scan each file on the computer's hardware and memory
and compare the entire file, as well as small sections of
each file, against the virus signature database.
2. Heuristics: To help protect computers against new and
unknown malware, heuristic detection algorithms were
created.
3. Rootkit Detection: Rootkits are a particularly nasty form
of malware.
4. Real Time Protection: Most antivirus software provides
real-time protection, often under any number of clever
synonyms such as resident shield, background guard,
autoprotect, and so on.
5. Antispyware: software often provides real-time
protection, just like most antivirus software does.
Additionally, just like most antivirus software,
antispyware software relies on up to date spyware
signature definition files to work properly.
Antivirus Program
Conclusion
 Antivirus and security software has become an essential
part of modern computer use.
 Firewalls inspect the data flowing between the computer
and the Internet and attempt to filter out information
packets that seek to exploit vulnerabilities.
 Antivirus software has become quite sophisticated, often
involving signature-based detection methods, heuristic
detection methods, rootkit detection, and real-time
scanning to prevent computers from being infected with
malware.
 Antispyware software specifically protects the computer
from spyware, which can slow down the computer's
performance.

Más contenido relacionado

La actualidad más candente

Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentationshohrabkhan
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirusShabnam Bashir
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses Mohak Jain
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusAdeel Rasheed
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentationRakibul islam
 
Computer Viruses
Computer VirusesComputer Viruses
Computer VirusesAnnies Minu
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and PreventionPratimesh Pathak
 
Computer virus
Computer virusComputer virus
Computer virusUtchi
 
Types of Operating System
Types of Operating SystemTypes of Operating System
Types of Operating SystemHemant Raj
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniquesPrasad Athukorala
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 

La actualidad más candente (20)

Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Computer virus
Computer virusComputer virus
Computer virus
 
Types of Operating System
Types of Operating SystemTypes of Operating System
Types of Operating System
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Web browsers
Web browsersWeb browsers
Web browsers
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 

Destacado (7)

Avast! antivirus protection
Avast! antivirus protectionAvast! antivirus protection
Avast! antivirus protection
 
Anti Virus Software
Anti Virus SoftwareAnti Virus Software
Anti Virus Software
 
Roll Laptop
Roll LaptopRoll Laptop
Roll Laptop
 
Normative theory
Normative theoryNormative theory
Normative theory
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Uses and gratifications theory
Uses and gratifications theoryUses and gratifications theory
Uses and gratifications theory
 
Uses and Gratifications Theory
Uses and Gratifications TheoryUses and Gratifications Theory
Uses and Gratifications Theory
 

Similar a Anti virus

Similar a Anti virus (20)

Computer basic maintenance
Computer basic maintenanceComputer basic maintenance
Computer basic maintenance
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools
 
Security threats explained
Security threats explained Security threats explained
Security threats explained
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
information about virus
information about virusinformation about virus
information about virus
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Firewall
FirewallFirewall
Firewall
 
Computer Virus_Athi-1.pdf
Computer Virus_Athi-1.pdfComputer Virus_Athi-1.pdf
Computer Virus_Athi-1.pdf
 
Cyber security
Cyber security Cyber security
Cyber security
 
Stay Secure: Unveiling the Power of Antivirus Software
Stay Secure: Unveiling the Power of Antivirus SoftwareStay Secure: Unveiling the Power of Antivirus Software
Stay Secure: Unveiling the Power of Antivirus Software
 
How To Protect Your Computer
How To Protect Your ComputerHow To Protect Your Computer
How To Protect Your Computer
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Technical Report Writing Presentation
Technical Report Writing PresentationTechnical Report Writing Presentation
Technical Report Writing Presentation
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
 
Safe Computing At Home And Work
Safe Computing At Home And WorkSafe Computing At Home And Work
Safe Computing At Home And Work
 
Antivirus
AntivirusAntivirus
Antivirus
 

Más de Muhammad Sohaib Afzaal (20)

Culture advertisement from marketing ads
Culture advertisement from marketing adsCulture advertisement from marketing ads
Culture advertisement from marketing ads
 
Mughal Architecture Palaces
Mughal Architecture PalacesMughal Architecture Palaces
Mughal Architecture Palaces
 
Modernity
ModernityModernity
Modernity
 
Conflict theory
Conflict theoryConflict theory
Conflict theory
 
Effects of the modernization process on human communication
Effects of the modernization process on human communicationEffects of the modernization process on human communication
Effects of the modernization process on human communication
 
Culture & types
Culture &  typesCulture &  types
Culture & types
 
Iconology
IconologyIconology
Iconology
 
Postmodernism or the cultural logic of late capitalism
Postmodernism or the cultural logic of late capitalismPostmodernism or the cultural logic of late capitalism
Postmodernism or the cultural logic of late capitalism
 
Hybrid cultures,
Hybrid cultures,Hybrid cultures,
Hybrid cultures,
 
Firewall
FirewallFirewall
Firewall
 
News agencies & press laws
News agencies &  press lawsNews agencies &  press laws
News agencies & press laws
 
American online
American onlineAmerican online
American online
 
Development of Reuters
Development of ReutersDevelopment of Reuters
Development of Reuters
 
Impact of media
Impact of mediaImpact of media
Impact of media
 
Conspiracy Theory
Conspiracy TheoryConspiracy Theory
Conspiracy Theory
 
Press council of pakistan ordinance, 2002
Press council of pakistan ordinance, 2002Press council of pakistan ordinance, 2002
Press council of pakistan ordinance, 2002
 
Pemra
PemraPemra
Pemra
 
Theatre
TheatreTheatre
Theatre
 
Use of learning
Use of learningUse of learning
Use of learning
 
Media globalization through localization
Media globalization through localizationMedia globalization through localization
Media globalization through localization
 

Último

Automate your OpenSIPS config tests - OpenSIPS Summit 2024
Automate your OpenSIPS config tests - OpenSIPS Summit 2024Automate your OpenSIPS config tests - OpenSIPS Summit 2024
Automate your OpenSIPS config tests - OpenSIPS Summit 2024Andreas Granig
 
Salesforce Introduced Zero Copy Partner Network to Simplify the Process of In...
Salesforce Introduced Zero Copy Partner Network to Simplify the Process of In...Salesforce Introduced Zero Copy Partner Network to Simplify the Process of In...
Salesforce Introduced Zero Copy Partner Network to Simplify the Process of In...CloudMetic
 
BusinessGPT - Security and Governance for Generative AI
BusinessGPT  - Security and Governance for Generative AIBusinessGPT  - Security and Governance for Generative AI
BusinessGPT - Security and Governance for Generative AIAGATSoftware
 
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)Gáspár Nagy
 
Community is Just as Important as Code by Andrea Goulet
Community is Just as Important as Code by Andrea GouletCommunity is Just as Important as Code by Andrea Goulet
Community is Just as Important as Code by Andrea GouletAndrea Goulet
 
Team Transformation Tactics for Holistic Testing and Quality (NewCrafts Paris...
Team Transformation Tactics for Holistic Testing and Quality (NewCrafts Paris...Team Transformation Tactics for Holistic Testing and Quality (NewCrafts Paris...
Team Transformation Tactics for Holistic Testing and Quality (NewCrafts Paris...Lisi Hocke
 
Lessons Learned from Building a Serverless Notifications System.pdf
Lessons Learned from Building a Serverless Notifications System.pdfLessons Learned from Building a Serverless Notifications System.pdf
Lessons Learned from Building a Serverless Notifications System.pdfSrushith Repakula
 
Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...
Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...
Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...Andrea Goulet
 
The Evolution of Web App Testing_ An Ultimate Guide to Future Trends.pdf
The Evolution of Web App Testing_ An Ultimate Guide to Future Trends.pdfThe Evolution of Web App Testing_ An Ultimate Guide to Future Trends.pdf
The Evolution of Web App Testing_ An Ultimate Guide to Future Trends.pdfkalichargn70th171
 
The Strategic Impact of Buying vs Building in Test Automation
The Strategic Impact of Buying vs Building in Test AutomationThe Strategic Impact of Buying vs Building in Test Automation
The Strategic Impact of Buying vs Building in Test AutomationElement34
 
architecting-ai-in-the-enterprise-apis-and-applications.pdf
architecting-ai-in-the-enterprise-apis-and-applications.pdfarchitecting-ai-in-the-enterprise-apis-and-applications.pdf
architecting-ai-in-the-enterprise-apis-and-applications.pdfWSO2
 
Effective Strategies for Wix's Scaling challenges - GeeCon
Effective Strategies for Wix's Scaling challenges - GeeConEffective Strategies for Wix's Scaling challenges - GeeCon
Effective Strategies for Wix's Scaling challenges - GeeConNatan Silnitsky
 
A Deep Dive into Secure Product Development Frameworks.pdf
A Deep Dive into Secure Product Development Frameworks.pdfA Deep Dive into Secure Product Development Frameworks.pdf
A Deep Dive into Secure Product Development Frameworks.pdfICS
 
Evolving Data Governance for the Real-time Streaming and AI Era
Evolving Data Governance for the Real-time Streaming and AI EraEvolving Data Governance for the Real-time Streaming and AI Era
Evolving Data Governance for the Real-time Streaming and AI Eraconfluent
 
OpenChain Webinar: AboutCode and Beyond - End-to-End SCA
OpenChain Webinar: AboutCode and Beyond - End-to-End SCAOpenChain Webinar: AboutCode and Beyond - End-to-End SCA
OpenChain Webinar: AboutCode and Beyond - End-to-End SCAShane Coughlan
 
How to install and activate eGrabber JobGrabber
How to install and activate eGrabber JobGrabberHow to install and activate eGrabber JobGrabber
How to install and activate eGrabber JobGrabbereGrabber
 
Microsoft365_Dev_Security_2024_05_16.pdf
Microsoft365_Dev_Security_2024_05_16.pdfMicrosoft365_Dev_Security_2024_05_16.pdf
Microsoft365_Dev_Security_2024_05_16.pdfMarkus Moeller
 

Último (20)

Automate your OpenSIPS config tests - OpenSIPS Summit 2024
Automate your OpenSIPS config tests - OpenSIPS Summit 2024Automate your OpenSIPS config tests - OpenSIPS Summit 2024
Automate your OpenSIPS config tests - OpenSIPS Summit 2024
 
Abortion Clinic In Johannesburg ](+27832195400*)[ 🏥 Safe Abortion Pills in Jo...
Abortion Clinic In Johannesburg ](+27832195400*)[ 🏥 Safe Abortion Pills in Jo...Abortion Clinic In Johannesburg ](+27832195400*)[ 🏥 Safe Abortion Pills in Jo...
Abortion Clinic In Johannesburg ](+27832195400*)[ 🏥 Safe Abortion Pills in Jo...
 
Salesforce Introduced Zero Copy Partner Network to Simplify the Process of In...
Salesforce Introduced Zero Copy Partner Network to Simplify the Process of In...Salesforce Introduced Zero Copy Partner Network to Simplify the Process of In...
Salesforce Introduced Zero Copy Partner Network to Simplify the Process of In...
 
BusinessGPT - Security and Governance for Generative AI
BusinessGPT  - Security and Governance for Generative AIBusinessGPT  - Security and Governance for Generative AI
BusinessGPT - Security and Governance for Generative AI
 
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
 
Community is Just as Important as Code by Andrea Goulet
Community is Just as Important as Code by Andrea GouletCommunity is Just as Important as Code by Andrea Goulet
Community is Just as Important as Code by Andrea Goulet
 
Team Transformation Tactics for Holistic Testing and Quality (NewCrafts Paris...
Team Transformation Tactics for Holistic Testing and Quality (NewCrafts Paris...Team Transformation Tactics for Holistic Testing and Quality (NewCrafts Paris...
Team Transformation Tactics for Holistic Testing and Quality (NewCrafts Paris...
 
Lessons Learned from Building a Serverless Notifications System.pdf
Lessons Learned from Building a Serverless Notifications System.pdfLessons Learned from Building a Serverless Notifications System.pdf
Lessons Learned from Building a Serverless Notifications System.pdf
 
Abortion Clinic In Polokwane ](+27832195400*)[ 🏥 Safe Abortion Pills in Polok...
Abortion Clinic In Polokwane ](+27832195400*)[ 🏥 Safe Abortion Pills in Polok...Abortion Clinic In Polokwane ](+27832195400*)[ 🏥 Safe Abortion Pills in Polok...
Abortion Clinic In Polokwane ](+27832195400*)[ 🏥 Safe Abortion Pills in Polok...
 
Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...
Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...
Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...
 
The Evolution of Web App Testing_ An Ultimate Guide to Future Trends.pdf
The Evolution of Web App Testing_ An Ultimate Guide to Future Trends.pdfThe Evolution of Web App Testing_ An Ultimate Guide to Future Trends.pdf
The Evolution of Web App Testing_ An Ultimate Guide to Future Trends.pdf
 
Abortion Clinic Pretoria ](+27832195400*)[ Abortion Clinic Near Me ● Abortion...
Abortion Clinic Pretoria ](+27832195400*)[ Abortion Clinic Near Me ● Abortion...Abortion Clinic Pretoria ](+27832195400*)[ Abortion Clinic Near Me ● Abortion...
Abortion Clinic Pretoria ](+27832195400*)[ Abortion Clinic Near Me ● Abortion...
 
The Strategic Impact of Buying vs Building in Test Automation
The Strategic Impact of Buying vs Building in Test AutomationThe Strategic Impact of Buying vs Building in Test Automation
The Strategic Impact of Buying vs Building in Test Automation
 
architecting-ai-in-the-enterprise-apis-and-applications.pdf
architecting-ai-in-the-enterprise-apis-and-applications.pdfarchitecting-ai-in-the-enterprise-apis-and-applications.pdf
architecting-ai-in-the-enterprise-apis-and-applications.pdf
 
Effective Strategies for Wix's Scaling challenges - GeeCon
Effective Strategies for Wix's Scaling challenges - GeeConEffective Strategies for Wix's Scaling challenges - GeeCon
Effective Strategies for Wix's Scaling challenges - GeeCon
 
A Deep Dive into Secure Product Development Frameworks.pdf
A Deep Dive into Secure Product Development Frameworks.pdfA Deep Dive into Secure Product Development Frameworks.pdf
A Deep Dive into Secure Product Development Frameworks.pdf
 
Evolving Data Governance for the Real-time Streaming and AI Era
Evolving Data Governance for the Real-time Streaming and AI EraEvolving Data Governance for the Real-time Streaming and AI Era
Evolving Data Governance for the Real-time Streaming and AI Era
 
OpenChain Webinar: AboutCode and Beyond - End-to-End SCA
OpenChain Webinar: AboutCode and Beyond - End-to-End SCAOpenChain Webinar: AboutCode and Beyond - End-to-End SCA
OpenChain Webinar: AboutCode and Beyond - End-to-End SCA
 
How to install and activate eGrabber JobGrabber
How to install and activate eGrabber JobGrabberHow to install and activate eGrabber JobGrabber
How to install and activate eGrabber JobGrabber
 
Microsoft365_Dev_Security_2024_05_16.pdf
Microsoft365_Dev_Security_2024_05_16.pdfMicrosoft365_Dev_Security_2024_05_16.pdf
Microsoft365_Dev_Security_2024_05_16.pdf
 

Anti virus

  • 2. PRESENTED BY  FURQAN UMER KHAN B-18261  M. SOHAIB AFZAAL B-17545
  • 3. Content  INTRODUCTION  HISTORY  ANTIVIRUS TYPES  ANTIVIRUS SOFTWARE  ANTIVIRUS SOFTWARE TYPES  ANTIVIRUS PROGRAM
  • 4. What is Anti-Virus  Antivirus or anti-virus software (often abbreviated as AV), sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.  Antivirus software was originally developed to detect and remove computer viruses.  In particular, modern antivirus software can protect from: malicious browser helper objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraudtools, adware and spyware.  Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity (privacy), online banking attacks, social engineering techniques, advanced persistent threat (APT) and botnet DDoS attacks
  • 5. History  In the early 1980s, Internet security was practically nonexistent. No large-scale attacks had ever been attempted, and network-based vulnerabilities were rarely, if ever, exploited. T  his changed in the late 1980s with the Morris Worm, the first known large-scale attack propagated via the Internet.  Today, spyware, viruses, trojan attacks, worms, and malware are all common occurrences affecting nearly every computer user at least once.
  • 6. Anti-Virus Types 1. Firewall software: Analyzes incoming and outgoing data packets on a network; that is, all the information sent and received through the computer's network connection. 2. Network layer firewalls: are called packet filters. These firewalls are the simplest of firewalls, and only allow information packets to pass through the firewall if the packet matches a specific set of rules. 3. Proxy servers: act as a firewall in that they inspect incoming packets for specific applications and block all other requests. 4. Application Layer Firewalls: These firewalls inspect all packets for specific protocols, such as FTP and browser traffic.
  • 7. Antivirus Software  Antivirus software identifies, prevents, and removes malware from a computer system.  Malware is any number of viruses and software bits that intend to harm the computer or steal information, such as viruses, adware, rootkits, backdoors, hijackers, keyloggers, spyware, trojans, and worms.  Modern antivirus software employs several methods to detect and remove malware. However, no antivirus software can detect and prevent all possible malware.
  • 8. Types of Antivirus Software 1. Signature Based Detection: The antivirus software can then scan each file on the computer's hardware and memory and compare the entire file, as well as small sections of each file, against the virus signature database. 2. Heuristics: To help protect computers against new and unknown malware, heuristic detection algorithms were created. 3. Rootkit Detection: Rootkits are a particularly nasty form of malware. 4. Real Time Protection: Most antivirus software provides real-time protection, often under any number of clever synonyms such as resident shield, background guard, autoprotect, and so on.
  • 9.
  • 10. 5. Antispyware: software often provides real-time protection, just like most antivirus software does. Additionally, just like most antivirus software, antispyware software relies on up to date spyware signature definition files to work properly.
  • 12. Conclusion  Antivirus and security software has become an essential part of modern computer use.  Firewalls inspect the data flowing between the computer and the Internet and attempt to filter out information packets that seek to exploit vulnerabilities.  Antivirus software has become quite sophisticated, often involving signature-based detection methods, heuristic detection methods, rootkit detection, and real-time scanning to prevent computers from being infected with malware.  Antispyware software specifically protects the computer from spyware, which can slow down the computer's performance.