SlideShare una empresa de Scribd logo
ANTI VIRUS
Presented To:
PIR AMAD ALI SHAH
PRESENTED BY
 FURQAN UMER KHAN B-18261
 M. SOHAIB AFZAAL B-17545
Content
 INTRODUCTION
 HISTORY
 ANTIVIRUS TYPES
 ANTIVIRUS SOFTWARE
 ANTIVIRUS SOFTWARE TYPES
 ANTIVIRUS PROGRAM
What is Anti-Virus
 Antivirus or anti-virus software (often abbreviated as AV),
sometimes known as anti-malware software, is computer
software used to prevent, detect and remove malicious
software.
 Antivirus software was originally developed to detect and
remove computer viruses.
 In particular, modern antivirus software can protect from:
malicious browser helper objects (BHOs), browser hijackers,
ransomware, keyloggers, backdoors, rootkits, trojan horses,
worms, malicious LSPs, dialers, fraudtools, adware and
spyware.
 Some products also include protection from other computer
threats, such as infected and malicious URLs, spam, scam
and phishing attacks, online identity (privacy), online
banking attacks, social engineering techniques, advanced
persistent threat (APT) and botnet DDoS attacks
History
 In the early 1980s, Internet security was
practically nonexistent. No large-scale
attacks had ever been attempted, and
network-based vulnerabilities were rarely,
if ever, exploited. T
 his changed in the late 1980s with the
Morris Worm, the first known large-scale
attack propagated via the Internet.
 Today, spyware, viruses, trojan attacks,
worms, and malware are all common
occurrences affecting nearly every
computer user at least once.
Anti-Virus Types
1. Firewall software: Analyzes incoming and outgoing data
packets on a network; that is, all the information sent and
received through the computer's network connection.
2. Network layer firewalls: are called packet filters. These
firewalls are the simplest of firewalls, and only allow
information packets to pass through the firewall if the
packet matches a specific set of rules.
3. Proxy servers: act as a firewall in that they inspect
incoming packets for specific applications and block all
other requests.
4. Application Layer Firewalls: These firewalls inspect all
packets for specific protocols, such as FTP and browser
traffic.
Antivirus Software
 Antivirus software identifies, prevents, and removes
malware from a computer system.
 Malware is any number of viruses and software bits
that intend to harm the computer or steal
information, such as viruses, adware, rootkits,
backdoors, hijackers, keyloggers, spyware, trojans,
and worms.
 Modern antivirus software employs several methods
to detect and remove malware. However, no
antivirus software can detect and prevent all possible
malware.
Types of Antivirus Software
1. Signature Based Detection: The antivirus software can
then scan each file on the computer's hardware and memory
and compare the entire file, as well as small sections of
each file, against the virus signature database.
2. Heuristics: To help protect computers against new and
unknown malware, heuristic detection algorithms were
created.
3. Rootkit Detection: Rootkits are a particularly nasty form
of malware.
4. Real Time Protection: Most antivirus software provides
real-time protection, often under any number of clever
synonyms such as resident shield, background guard,
autoprotect, and so on.
5. Antispyware: software often provides real-time
protection, just like most antivirus software does.
Additionally, just like most antivirus software,
antispyware software relies on up to date spyware
signature definition files to work properly.
Antivirus Program
Conclusion
 Antivirus and security software has become an essential
part of modern computer use.
 Firewalls inspect the data flowing between the computer
and the Internet and attempt to filter out information
packets that seek to exploit vulnerabilities.
 Antivirus software has become quite sophisticated, often
involving signature-based detection methods, heuristic
detection methods, rootkit detection, and real-time
scanning to prevent computers from being infected with
malware.
 Antispyware software specifically protects the computer
from spyware, which can slow down the computer's
performance.

Más contenido relacionado

La actualidad más candente

Computer security risks
Computer security risksComputer security risks
Computer security risks
Aasim Mushtaq
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
Sardar Kaukaz
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
Nitish Xavier Tirkey
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
Maryam Malik
 
Antivirus
AntivirusAntivirus
Antivirus
ava & araf co.
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
shohrabkhan
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
hazirma
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
Mohak Jain
 
Computer virus
Computer virusComputer virus
Computer virus
Priti Singh
 
Computer Software & its Types
Computer Software & its Types Computer Software & its Types
Computer Software & its Types
Muhammad Hammad Waseem
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
Eva Harshita
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
Kriti kohli
 
Introduction to software
Introduction to softwareIntroduction to software
Introduction to software
San Diego Continuing Education
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
aritradutta22
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
Vikas Chandwani
 
Computer virus
 Computer virus Computer virus
Computer virus
Kawsar Ahmed
 
Types of malware
Types of malwareTypes of malware
Types of malware
techexpert2345
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
Amjad Bhutto
 
Computer virus
Computer virusComputer virus
Computer virus
Walden University
 

La actualidad más candente (20)

Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Antivirus
AntivirusAntivirus
Antivirus
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Software & its Types
Computer Software & its Types Computer Software & its Types
Computer Software & its Types
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
Introduction to software
Introduction to softwareIntroduction to software
Introduction to software
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 

Destacado

Avast! antivirus protection
Avast! antivirus protectionAvast! antivirus protection
Anti Virus Software
Anti Virus SoftwareAnti Virus Software
Anti Virus Software
Pradeepkrajyaguru
 
Roll Laptop
Roll LaptopRoll Laptop
Roll Laptop
IF Engineer 2
 
Normative theory
Normative theoryNormative theory
Normative theory
Muhammad Sohaib Afzaal
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
Divyesh Rakholiya
 
Uses and gratifications theory
Uses and gratifications theoryUses and gratifications theory
Uses and gratifications theory
Muhammad Sohaib Afzaal
 
Uses and Gratifications Theory
Uses and Gratifications TheoryUses and Gratifications Theory
Uses and Gratifications Theory
Zoe Lorenz
 

Destacado (7)

Avast! antivirus protection
Avast! antivirus protectionAvast! antivirus protection
Avast! antivirus protection
 
Anti Virus Software
Anti Virus SoftwareAnti Virus Software
Anti Virus Software
 
Roll Laptop
Roll LaptopRoll Laptop
Roll Laptop
 
Normative theory
Normative theoryNormative theory
Normative theory
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Uses and gratifications theory
Uses and gratifications theoryUses and gratifications theory
Uses and gratifications theory
 
Uses and Gratifications Theory
Uses and Gratifications TheoryUses and Gratifications Theory
Uses and Gratifications Theory
 

Similar a Anti virus

Computer basic maintenance
Computer basic maintenanceComputer basic maintenance
Computer basic maintenance
ralphabarquez1
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools
ollyabraham
 
Security threats explained
Security threats explained Security threats explained
Security threats explained
Abhijeet Karve
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
UmairFirdous
 
information about virus
information about virusinformation about virus
information about virus
toshan badiye
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
Satria Ady Pradana
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
PragatiKachhi1
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.pdf
Module 5.pdfModule 5.pdf
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
AsadbekAbdumannopov
 
Firewall
FirewallFirewall
Firewall
sajeena81
 
Computer Virus_Athi-1.pdf
Computer Virus_Athi-1.pdfComputer Virus_Athi-1.pdf
Computer Virus_Athi-1.pdf
AthiraKrishnan57
 
Computer virus
Computer virusComputer virus
Computer virus
Kaushik Vemani Venkata
 
Cyber security
Cyber security Cyber security
Cyber security
ankit yadav
 
Stay Secure: Unveiling the Power of Antivirus Software
Stay Secure: Unveiling the Power of Antivirus SoftwareStay Secure: Unveiling the Power of Antivirus Software
Stay Secure: Unveiling the Power of Antivirus Software
SoftwareDeals
 
How To Protect Your Computer
How To Protect Your ComputerHow To Protect Your Computer
How To Protect Your Computer
Dom Cole
 
Technical Report Writing Presentation
Technical Report Writing PresentationTechnical Report Writing Presentation
Technical Report Writing Presentation
Ghazanfar Latif (Gabe)
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
Muhammad FAHAD
 
Safe Computing At Home And Work
Safe Computing At Home And WorkSafe Computing At Home And Work
Safe Computing At Home And Work
John Steensen, MBA/TM, CISA, CRISC
 
Antivirus
AntivirusAntivirus
Antivirus
Pankaj Kumawat
 

Similar a Anti virus (20)

Computer basic maintenance
Computer basic maintenanceComputer basic maintenance
Computer basic maintenance
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools
 
Security threats explained
Security threats explained Security threats explained
Security threats explained
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
information about virus
information about virusinformation about virus
information about virus
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Firewall
FirewallFirewall
Firewall
 
Computer Virus_Athi-1.pdf
Computer Virus_Athi-1.pdfComputer Virus_Athi-1.pdf
Computer Virus_Athi-1.pdf
 
Computer virus
Computer virusComputer virus
Computer virus
 
Cyber security
Cyber security Cyber security
Cyber security
 
Stay Secure: Unveiling the Power of Antivirus Software
Stay Secure: Unveiling the Power of Antivirus SoftwareStay Secure: Unveiling the Power of Antivirus Software
Stay Secure: Unveiling the Power of Antivirus Software
 
How To Protect Your Computer
How To Protect Your ComputerHow To Protect Your Computer
How To Protect Your Computer
 
Technical Report Writing Presentation
Technical Report Writing PresentationTechnical Report Writing Presentation
Technical Report Writing Presentation
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
 
Safe Computing At Home And Work
Safe Computing At Home And WorkSafe Computing At Home And Work
Safe Computing At Home And Work
 
Antivirus
AntivirusAntivirus
Antivirus
 

Más de Muhammad Sohaib Afzaal

Culture advertisement from marketing ads
Culture advertisement from marketing adsCulture advertisement from marketing ads
Culture advertisement from marketing ads
Muhammad Sohaib Afzaal
 
Mughal Architecture Palaces
Mughal Architecture PalacesMughal Architecture Palaces
Mughal Architecture Palaces
Muhammad Sohaib Afzaal
 
Modernity
ModernityModernity
Conflict theory
Conflict theoryConflict theory
Conflict theory
Muhammad Sohaib Afzaal
 
Effects of the modernization process on human communication
Effects of the modernization process on human communicationEffects of the modernization process on human communication
Effects of the modernization process on human communication
Muhammad Sohaib Afzaal
 
Culture & types
Culture &  typesCulture &  types
Culture & types
Muhammad Sohaib Afzaal
 
Iconology
IconologyIconology
Postmodernism or the cultural logic of late capitalism
Postmodernism or the cultural logic of late capitalismPostmodernism or the cultural logic of late capitalism
Postmodernism or the cultural logic of late capitalism
Muhammad Sohaib Afzaal
 
Hybrid cultures,
Hybrid cultures,Hybrid cultures,
Hybrid cultures,
Muhammad Sohaib Afzaal
 
Firewall
FirewallFirewall
News agencies & press laws
News agencies &  press lawsNews agencies &  press laws
News agencies & press laws
Muhammad Sohaib Afzaal
 
American online
American onlineAmerican online
American online
Muhammad Sohaib Afzaal
 
Development of Reuters
Development of ReutersDevelopment of Reuters
Development of Reuters
Muhammad Sohaib Afzaal
 
Impact of media
Impact of mediaImpact of media
Impact of media
Muhammad Sohaib Afzaal
 
Conspiracy Theory
Conspiracy TheoryConspiracy Theory
Conspiracy Theory
Muhammad Sohaib Afzaal
 
Press council of pakistan ordinance, 2002
Press council of pakistan ordinance, 2002Press council of pakistan ordinance, 2002
Press council of pakistan ordinance, 2002
Muhammad Sohaib Afzaal
 
Pemra
PemraPemra
Theatre
TheatreTheatre
Use of learning
Use of learningUse of learning
Use of learning
Muhammad Sohaib Afzaal
 
Media globalization through localization
Media globalization through localizationMedia globalization through localization
Media globalization through localization
Muhammad Sohaib Afzaal
 

Más de Muhammad Sohaib Afzaal (20)

Culture advertisement from marketing ads
Culture advertisement from marketing adsCulture advertisement from marketing ads
Culture advertisement from marketing ads
 
Mughal Architecture Palaces
Mughal Architecture PalacesMughal Architecture Palaces
Mughal Architecture Palaces
 
Modernity
ModernityModernity
Modernity
 
Conflict theory
Conflict theoryConflict theory
Conflict theory
 
Effects of the modernization process on human communication
Effects of the modernization process on human communicationEffects of the modernization process on human communication
Effects of the modernization process on human communication
 
Culture & types
Culture &  typesCulture &  types
Culture & types
 
Iconology
IconologyIconology
Iconology
 
Postmodernism or the cultural logic of late capitalism
Postmodernism or the cultural logic of late capitalismPostmodernism or the cultural logic of late capitalism
Postmodernism or the cultural logic of late capitalism
 
Hybrid cultures,
Hybrid cultures,Hybrid cultures,
Hybrid cultures,
 
Firewall
FirewallFirewall
Firewall
 
News agencies & press laws
News agencies &  press lawsNews agencies &  press laws
News agencies & press laws
 
American online
American onlineAmerican online
American online
 
Development of Reuters
Development of ReutersDevelopment of Reuters
Development of Reuters
 
Impact of media
Impact of mediaImpact of media
Impact of media
 
Conspiracy Theory
Conspiracy TheoryConspiracy Theory
Conspiracy Theory
 
Press council of pakistan ordinance, 2002
Press council of pakistan ordinance, 2002Press council of pakistan ordinance, 2002
Press council of pakistan ordinance, 2002
 
Pemra
PemraPemra
Pemra
 
Theatre
TheatreTheatre
Theatre
 
Use of learning
Use of learningUse of learning
Use of learning
 
Media globalization through localization
Media globalization through localizationMedia globalization through localization
Media globalization through localization
 

Último

Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfTop Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
VALiNTRY360
 
Lecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptxLecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptx
TaghreedAltamimi
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
Quickdice ERP
 
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
mz5nrf0n
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
rodomar2
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
Alberto Brandolini
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
SOCRadar
 
SQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure MalaysiaSQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure Malaysia
GohKiangHock
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
XfilesPro
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
Green Software Development
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Łukasz Chruściel
 
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
dakas1
 
Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !
Marcin Chrost
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
Peter Muessig
 
Requirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional SafetyRequirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional Safety
Ayan Halder
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
Remote DBA Services
 

Último (20)

Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfTop Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
 
Lecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptxLecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptx
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
 
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
 
SQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure MalaysiaSQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure Malaysia
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
 
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
 
Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
 
Requirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional SafetyRequirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional Safety
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
 

Anti virus

  • 2. PRESENTED BY  FURQAN UMER KHAN B-18261  M. SOHAIB AFZAAL B-17545
  • 3. Content  INTRODUCTION  HISTORY  ANTIVIRUS TYPES  ANTIVIRUS SOFTWARE  ANTIVIRUS SOFTWARE TYPES  ANTIVIRUS PROGRAM
  • 4. What is Anti-Virus  Antivirus or anti-virus software (often abbreviated as AV), sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.  Antivirus software was originally developed to detect and remove computer viruses.  In particular, modern antivirus software can protect from: malicious browser helper objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraudtools, adware and spyware.  Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity (privacy), online banking attacks, social engineering techniques, advanced persistent threat (APT) and botnet DDoS attacks
  • 5. History  In the early 1980s, Internet security was practically nonexistent. No large-scale attacks had ever been attempted, and network-based vulnerabilities were rarely, if ever, exploited. T  his changed in the late 1980s with the Morris Worm, the first known large-scale attack propagated via the Internet.  Today, spyware, viruses, trojan attacks, worms, and malware are all common occurrences affecting nearly every computer user at least once.
  • 6. Anti-Virus Types 1. Firewall software: Analyzes incoming and outgoing data packets on a network; that is, all the information sent and received through the computer's network connection. 2. Network layer firewalls: are called packet filters. These firewalls are the simplest of firewalls, and only allow information packets to pass through the firewall if the packet matches a specific set of rules. 3. Proxy servers: act as a firewall in that they inspect incoming packets for specific applications and block all other requests. 4. Application Layer Firewalls: These firewalls inspect all packets for specific protocols, such as FTP and browser traffic.
  • 7. Antivirus Software  Antivirus software identifies, prevents, and removes malware from a computer system.  Malware is any number of viruses and software bits that intend to harm the computer or steal information, such as viruses, adware, rootkits, backdoors, hijackers, keyloggers, spyware, trojans, and worms.  Modern antivirus software employs several methods to detect and remove malware. However, no antivirus software can detect and prevent all possible malware.
  • 8. Types of Antivirus Software 1. Signature Based Detection: The antivirus software can then scan each file on the computer's hardware and memory and compare the entire file, as well as small sections of each file, against the virus signature database. 2. Heuristics: To help protect computers against new and unknown malware, heuristic detection algorithms were created. 3. Rootkit Detection: Rootkits are a particularly nasty form of malware. 4. Real Time Protection: Most antivirus software provides real-time protection, often under any number of clever synonyms such as resident shield, background guard, autoprotect, and so on.
  • 9.
  • 10. 5. Antispyware: software often provides real-time protection, just like most antivirus software does. Additionally, just like most antivirus software, antispyware software relies on up to date spyware signature definition files to work properly.
  • 12. Conclusion  Antivirus and security software has become an essential part of modern computer use.  Firewalls inspect the data flowing between the computer and the Internet and attempt to filter out information packets that seek to exploit vulnerabilities.  Antivirus software has become quite sophisticated, often involving signature-based detection methods, heuristic detection methods, rootkit detection, and real-time scanning to prevent computers from being infected with malware.  Antispyware software specifically protects the computer from spyware, which can slow down the computer's performance.