SlideShare utilise les cookies pour améliorer les fonctionnalités et les performances, et également pour vous montrer des publicités pertinentes. Si vous continuez à naviguer sur ce site, vous acceptez l’utilisation de cookies. Consultez nos Conditions d’utilisation et notre Politique de confidentialité.
SlideShare utilise les cookies pour améliorer les fonctionnalités et les performances, et également pour vous montrer des publicités pertinentes. Si vous continuez à naviguer sur ce site, vous acceptez l’utilisation de cookies. Consultez notre Politique de confidentialité et nos Conditions d’utilisation pour en savoir plus.
Presented by: Ajit Kumar Pradhan 090101ITR006 7th Sem IT
After INTERNET has evolved it had given asophisticate increase on the general computeruser as well as the malicious code writer, whohas changed the backbone of internetarchitecture for their futuristic use & producedbillions of malicious codes throughout the web.For defending these many billions of advancetechnological codes we use a outdatedtechnology called as Antivirus. Is it sufficient ?Lets see……
In 1969 the term ‘virus’ – Dr. David Gerrold. In 1971 ‘Creeper virus‘ detected by-ARPANET. In between 1974-79 some virus like Webbit ,Animal ,Shockwave rider. "Elk Cloner" first personal computer virus "in the wild“ in 1981.
Claimed by John McAfee in 1983. Mr. Fred Cohen published 1st educational paper on viruses in 1984. The first documented signature based antivirus s/w produced by Bernd Fix in 1987. In late 1987 two released based on heuristic analysis Flushot Plus by Ross Greenberg and Anti4us by Erwin Lanting. In 1988 a mailing list named VIRUS-L formed for better research in field of viruses. From 1988 -2007 strategic development occurs.
100-200 billions of viruses believed to exist “in the wild”. “Infinite amounts” in zoos. At least 300 new malicious programs (Worms, Trojans, Spyware, Hacker tools, Root-kits ) released per day. 2- 3 millions of undetectable programs exists from early 19th centuries.
It is software used to prevent, detect and remove Malicious programs. Provides computer security implemented by software methodology.
No common malware definition No common repository Out-of date signatures
High rate of production of new advanced virus. Traditional techniques like digital signature analysis. Lake of up-to-date knowledge. Unexpected renewal costs for providing service. Rogue security applications Problems caused by false positives System and interoperability related issues. Damage happens to ordinary files.
According to an FBI survey, major businesses lose $12 million annually dealing with virus incidents. A recent Yankee Group report stated that 99% of companies had AV technology installed, yet 62% of companies suffered successful virus attacks. According to AusCERT, Australia’s Computer Emergency Response Team, the two most technological and deployed AV products fail to prevent 80% of new threats.
Try to use a good up-to-date antivirus product. Learn about malicious virus infection procedure Up to date with virus definitions. Use your commonsense while using system
As we are entering to a new era of technologywhere no Antivirus is appropriate forprotecting our confidentiality, because of thefeatured brain of malicious code writers. Forprotecting our privacy we have to up to dateour brain with the technology.