SlideShare une entreprise Scribd logo
1  sur  27
A S E M I N A R
ANTIVIRUS SOFTWARE
INTRODUCTION
 Antivirus software is defined as a software used to
prevent, detect and remove all sorts of malware such
as computer viruses, hijackers, Trojan horses, etc.
HISTORY
 Most of the viruses in early and mid 1980’s had
limited self-reproduction and spread initially by
storage devices such as floppy disks, before internet
connection was wide spread.
 The first anti-virus introduced was Flushshot plus
and Anti4us in 1987.
 John McAfee and Eugene Kaspersky found their own
antivirus software and later setup their companies in
1988.
IDENTIFICATION METHODS
There are various methods used by antivirus software
to identify malware:
 Signature based tools: Most commonly used method
to identify viruses and other malware, antivirus
software compares the contents of a file to a
directory of virus signatures. The entire file is
searched both as whole as well as in pieces.
They are considered very basic and insufficient to
be counter today’s malware practices.
IDENTIFICATION METHODS
 Heuristics: It is the most required detection method
present in antivirus software.
Heuristic is a technique designed for solving a
problem more quickly when classic methods are too
slow or fail.
Some anti-viruses are difficult to detect as they
start of as a single infection and later change into
many variants. Heuristics is a method invented to
counter them.
IDENTIFICATION METHODS
 Root kit detection: Root kit is one of the dangerous
malware designed to gain administration-level
control over the computer without detection.
They change the way operating systems function
and tamper the antivirus software, leaving it
ineffective.
The latest antivirus software are being added with
root kit detection.
IDENTIFICATION METHODS
 Real-time protection: Background
guard, Auto-protect , Risky-website
testing, etc are some other antivirus
protection provided by antivirus
software.
POPULAR ANTIVIRUSES
 Kaspersky Lab
 McAfee Virus Scan
 Avira Antivirus Software
 Avast! Antivirus Software
 AVG Antivirus and Internet Security
 Norton Antivirus Software
 Panda Antivirus Software
PROS OF ANTIVIRUS SOFTWARE
Protection from Malware.
Protection from Spyware and Identity Theft.
Protection from Spam.
Protects Important Documents.
Provides legal implication.
ISSUES OF ANTIVIRUS SOFTWARE
Unexpected renewal costs: Some commercial
antivirus software end-user license agreements
include a clause that the subscription will be
automatically renewed, and the purchaser’s credit
card automatically billed, at the renewal time
without explicit approval.
For e.g., McAfee requires users to unsubscribe at
least 60 days before the expiration of the present
subscription.
ISSUES OF ANTIVIRUS SOFTWARE
Rouge security applications: Some apparent
antivirus programs are actually malware
masquerading as legitimate software, such as
WinFixer, MS Antivirus, and Mac Defender.
ISSUES OF ANTIVIRUS SOFTWARE
Problems caused by false positives: A “false
positive” is when antivirus software identifies a non-
malicious file as virus. It can cause serious problems.
For e.g., if an antivirus program is configured to
immediately delete or quarantine infected files, a
false positive in an essential file can render an OS or
some applications useless.
ISSUES OF ANTIVIRUS SOFTWARE
System and interoperability related issues:
Running multiple antivirus programs concurrently
can degrade performance and create conflicts.
However, using a concept called multi-
scanning, several companies (including G Data and
Microsoft) have created applications which can
multiple engines concurrently.
ISSUES OF ANTIVIRUS SOFTWARE
Effectiveness: The effectiveness of antivirus
software has decreased. Detection rates for threats
had dropped from 40-50% in 2006 to 20-30% in
2007.
The problem is magnified by changing intent of
the authors.
ISSUES OF ANTIVIRUS SOFTWARE
New viruses: Anti-virus programs are not always
effective against new viruses.
Even those that use non-signature-based
methods that should detect viruses.
ISSUES OF ANTIVIRUS SOFTWARE
Root-kits: Root-kits have full administrative access to
the computer and are invisible to users and are hidden
from running processes in the task manager.
Root-kits can modify the inner workings of an
operating system and tamper with anti-virus programs.
ISSUES OF ANTIVIRUS SOFTWARE
Damaged files: Files which have been damaged by
computer viruses are normally damaged beyond
recovery.
Antivirus software removes the virus code from the file
during disinfection, but this does not always restore the
file in undamaged state.
ISSUES OF ANTIVIRUS SOFTWARE
Firmware Issues:
Active antivirus
software can interfere
with a firmware update
process.
Any writable firmware
in the computer can be
infected with a
malicious code.
CONCLUSION
 Anti-virus software is very useful to day-to-day users
to protect their storage devices and computers from
malware.
 There is much antivirus software available in the
market with it’s own pros and cons.
 The antivirus software has many issues that need to
be dealt with.
 Other than antivirus software, there are many other
methods available to protect devices such as network
firewall, specialist tools, etc.
REFERENCES
 Antivirus Software, Wikipedia.
 Comparison of Antivirus Software, Wikipedia.
 The Art of Computer Virus Research and
Defense, Peter Szor.
THANK YOU

Contenu connexe

Tendances

Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's typesAakash Baloch
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virusKriti kohli
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusMaryam Malik
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses Mohak Jain
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virusLeonor Costa
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From MalwareINFONAUTICS GmbH
 
Computer Viruses
Computer VirusesComputer Viruses
Computer VirusesAnnies Minu
 

Tendances (20)

Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Antivirus
AntivirusAntivirus
Antivirus
 
Computer security
Computer securityComputer security
Computer security
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 

En vedette

Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentationshohrabkhan
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?culltdueet65
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus softwarekhalid umer
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virusYogesh Singh Rawat
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPTEva Harshita
 
anti-virus
anti-virusanti-virus
anti-virusnandocas
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpointkmtschida
 

En vedette (15)

Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?
 
Anti Virus Software
Anti Virus SoftwareAnti Virus Software
Anti Virus Software
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Anti Virus Software
Anti Virus SoftwareAnti Virus Software
Anti Virus Software
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Computer virus
Computer virusComputer virus
Computer virus
 
anti-virus
anti-virusanti-virus
anti-virus
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpoint
 
Avira Antivirus2
Avira Antivirus2Avira Antivirus2
Avira Antivirus2
 

Similaire à Antivirus software

11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirussinghhp10699
 
How do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfHow do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfBlogger
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirussandipslides
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirussandipslides
 
Antivirus And Malware Protection
Antivirus And Malware ProtectionAntivirus And Malware Protection
Antivirus And Malware Protectionreasonsecurity
 
How Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfHow Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfBlogger
 
antivirus software.pptx
antivirus software.pptxantivirus software.pptx
antivirus software.pptxdianemullin2
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
Virus and Anti virus
Virus and Anti virusVirus and Anti virus
Virus and Anti virusFaisal Hassan
 
Kaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya Connect 2011 - Malwarebytes - Marcin KleczynskiKaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya Connect 2011 - Malwarebytes - Marcin KleczynskiKaseya
 

Similaire à Antivirus software (20)

11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
Anti virus software
Anti virus softwareAnti virus software
Anti virus software
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
How do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfHow do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdf
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirus
 
Antivirus
AntivirusAntivirus
Antivirus
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirus
 
Antivirus And Malware Protection
Antivirus And Malware ProtectionAntivirus And Malware Protection
Antivirus And Malware Protection
 
How Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfHow Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdf
 
antivirus software.pptx
antivirus software.pptxantivirus software.pptx
antivirus software.pptx
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Virus and Anti virus
Virus and Anti virusVirus and Anti virus
Virus and Anti virus
 
Software Antivirus.pdf
Software Antivirus.pdfSoftware Antivirus.pdf
Software Antivirus.pdf
 
Software Antivirus.ppt
Software Antivirus.pptSoftware Antivirus.ppt
Software Antivirus.ppt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Avast! antivirus protection
Avast! antivirus protectionAvast! antivirus protection
Avast! antivirus protection
 
Computer Virus_Athi-1.pdf
Computer Virus_Athi-1.pdfComputer Virus_Athi-1.pdf
Computer Virus_Athi-1.pdf
 
Kaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya Connect 2011 - Malwarebytes - Marcin KleczynskiKaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
 
Ch. 3 computer virus
Ch. 3 computer virusCh. 3 computer virus
Ch. 3 computer virus
 
Antivirus
AntivirusAntivirus
Antivirus
 

Plus de Shreya Singireddy

Plus de Shreya Singireddy (10)

Simplify Your Analytics Strategy
Simplify Your Analytics StrategySimplify Your Analytics Strategy
Simplify Your Analytics Strategy
 
Making Advanced Analytics Work for You
Making Advanced Analytics Work for YouMaking Advanced Analytics Work for You
Making Advanced Analytics Work for You
 
What People Analytics Can’t Capture
What People Analytics Can’t CaptureWhat People Analytics Can’t Capture
What People Analytics Can’t Capture
 
The New Patterns of Innovation
The New Patterns of InnovationThe New Patterns of Innovation
The New Patterns of Innovation
 
Marketers flunk the Big Data test
Marketers flunk the Big Data testMarketers flunk the Big Data test
Marketers flunk the Big Data test
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Firewalls
FirewallsFirewalls
Firewalls
 
Clouds
CloudsClouds
Clouds
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Firewalls
FirewallsFirewalls
Firewalls
 

Dernier

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Dernier (20)

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

Antivirus software

  • 1. A S E M I N A R ANTIVIRUS SOFTWARE
  • 2. INTRODUCTION  Antivirus software is defined as a software used to prevent, detect and remove all sorts of malware such as computer viruses, hijackers, Trojan horses, etc.
  • 3. HISTORY  Most of the viruses in early and mid 1980’s had limited self-reproduction and spread initially by storage devices such as floppy disks, before internet connection was wide spread.  The first anti-virus introduced was Flushshot plus and Anti4us in 1987.  John McAfee and Eugene Kaspersky found their own antivirus software and later setup their companies in 1988.
  • 4. IDENTIFICATION METHODS There are various methods used by antivirus software to identify malware:  Signature based tools: Most commonly used method to identify viruses and other malware, antivirus software compares the contents of a file to a directory of virus signatures. The entire file is searched both as whole as well as in pieces. They are considered very basic and insufficient to be counter today’s malware practices.
  • 5.
  • 6. IDENTIFICATION METHODS  Heuristics: It is the most required detection method present in antivirus software. Heuristic is a technique designed for solving a problem more quickly when classic methods are too slow or fail. Some anti-viruses are difficult to detect as they start of as a single infection and later change into many variants. Heuristics is a method invented to counter them.
  • 7.
  • 8. IDENTIFICATION METHODS  Root kit detection: Root kit is one of the dangerous malware designed to gain administration-level control over the computer without detection. They change the way operating systems function and tamper the antivirus software, leaving it ineffective. The latest antivirus software are being added with root kit detection.
  • 9.
  • 10. IDENTIFICATION METHODS  Real-time protection: Background guard, Auto-protect , Risky-website testing, etc are some other antivirus protection provided by antivirus software.
  • 11. POPULAR ANTIVIRUSES  Kaspersky Lab  McAfee Virus Scan  Avira Antivirus Software  Avast! Antivirus Software  AVG Antivirus and Internet Security  Norton Antivirus Software  Panda Antivirus Software
  • 12.
  • 13. PROS OF ANTIVIRUS SOFTWARE Protection from Malware. Protection from Spyware and Identity Theft. Protection from Spam. Protects Important Documents. Provides legal implication.
  • 14. ISSUES OF ANTIVIRUS SOFTWARE Unexpected renewal costs: Some commercial antivirus software end-user license agreements include a clause that the subscription will be automatically renewed, and the purchaser’s credit card automatically billed, at the renewal time without explicit approval. For e.g., McAfee requires users to unsubscribe at least 60 days before the expiration of the present subscription.
  • 15.
  • 16. ISSUES OF ANTIVIRUS SOFTWARE Rouge security applications: Some apparent antivirus programs are actually malware masquerading as legitimate software, such as WinFixer, MS Antivirus, and Mac Defender.
  • 17. ISSUES OF ANTIVIRUS SOFTWARE Problems caused by false positives: A “false positive” is when antivirus software identifies a non- malicious file as virus. It can cause serious problems. For e.g., if an antivirus program is configured to immediately delete or quarantine infected files, a false positive in an essential file can render an OS or some applications useless.
  • 18. ISSUES OF ANTIVIRUS SOFTWARE System and interoperability related issues: Running multiple antivirus programs concurrently can degrade performance and create conflicts. However, using a concept called multi- scanning, several companies (including G Data and Microsoft) have created applications which can multiple engines concurrently.
  • 19.
  • 20. ISSUES OF ANTIVIRUS SOFTWARE Effectiveness: The effectiveness of antivirus software has decreased. Detection rates for threats had dropped from 40-50% in 2006 to 20-30% in 2007. The problem is magnified by changing intent of the authors.
  • 21. ISSUES OF ANTIVIRUS SOFTWARE New viruses: Anti-virus programs are not always effective against new viruses. Even those that use non-signature-based methods that should detect viruses.
  • 22. ISSUES OF ANTIVIRUS SOFTWARE Root-kits: Root-kits have full administrative access to the computer and are invisible to users and are hidden from running processes in the task manager. Root-kits can modify the inner workings of an operating system and tamper with anti-virus programs.
  • 23. ISSUES OF ANTIVIRUS SOFTWARE Damaged files: Files which have been damaged by computer viruses are normally damaged beyond recovery. Antivirus software removes the virus code from the file during disinfection, but this does not always restore the file in undamaged state.
  • 24. ISSUES OF ANTIVIRUS SOFTWARE Firmware Issues: Active antivirus software can interfere with a firmware update process. Any writable firmware in the computer can be infected with a malicious code.
  • 25. CONCLUSION  Anti-virus software is very useful to day-to-day users to protect their storage devices and computers from malware.  There is much antivirus software available in the market with it’s own pros and cons.  The antivirus software has many issues that need to be dealt with.  Other than antivirus software, there are many other methods available to protect devices such as network firewall, specialist tools, etc.
  • 26. REFERENCES  Antivirus Software, Wikipedia.  Comparison of Antivirus Software, Wikipedia.  The Art of Computer Virus Research and Defense, Peter Szor.