Essay On Antivirus Protection

792 Words2 Pages

III. Once Firewall protection has been verified, a good Antivirus program should be chosen according to the need of the company structure. Antivirus software is computer software used to prevent, detect and remove malicious computer viruses. Most Antivirus software also works against other types of malware, such browser hijackers, keyloggers, backdoors, rootkits, trojan horses, worms, malicious adware and spyware. There are numerous types of Antivirus protection software to choose from. Signature-based detection: relies upon signatures to identify malware. This can be very effective, but cannot defend against malware unless samples have already been obtained and signatures created. Because of this, signature-based approaches are not effective against new, unknown viruses. As new viruses are being created each day, the signature-based detection approach requires frequent updates of the virus signature dictionary (Landesman). Heuristics: Is a more sophisticated antivirus software using heuristic analysis to identify new malware or variants of known malware. Many viruses start as a single infection and through either mutation or refinements by other attackers, can grow into dozens of slightly different strains, called variants (Kaspersky). Generic detection refers to the detection and removal of multiple threats using a single virus definition. These signatures often contain non-contiguous code, using wildcard characters where differences lie. These wildcards allow the scanner to detect viruses even if they are padded with extra, meaningless code. A detection that uses this method is said to be "heuristic detection" (Kaspersky). Rootkit Detection; Antivirus software can attempt to detect rootkits, which are malware programs installe... ... middle of paper ... ...nd are installed throughout areas to be protected. 2. Server; The WIPS server centrally analyzes packets captured by sensors. 3. Console; The console provides the primary user interface into the system for administration and reporting. In a network WIPS implementation, Server, Sensors and the Console are all placed inside a private network and are not accessible from the internet. Sensors communicate with the Server over a private network using a private port. Since the Server resides on the private network, users can access the Console only from within the private network ("Data security standards"). While wireless intrusion detection and prevention are certainly needed in a medium sized business, the single most important key is the use of strong passwords. Passwords that are at least 13 characters long and use truly random letters, numbers and special characters.

More about Essay On Antivirus Protection

Open Document