Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading…
Transcript

Antivirus & Firewalls

Antivirus Software & Detection Techniques

Antivirus Software & Detection Techniques

  • A utility program that is used to protect from malware.

  • Scans can be on demand, scheduled of real-time.

  • Scans can be for the entire computer, a storage device, a folder or a file.

Detection Techniques

  • Signature detection identifies malware using a pattern (the signature) for the malware code that is compared to programs on your hard disk to identify the viruses.

  • Heuristic detection monitors the behaviour of programs to identify any suspicious behaviour and flags it as a possible virus.

Dealing with Threats

  • Once detected, users will have three options to choose from to deal with the malware:
  • Clean – removing the malware from the file, without removing the file itself.
  • Quarantine – this moves the malware to a secure location on the computer and prevents it from executing or spreading.
  • Delete – removing the file completely from the computer.

Firewalls & Filtering Techniques

Firewalls & Filtering Techniques

  • Either a hardware device or a utility program that monitors incoming and outgoing network traffic and blocks any traffic that it deems suspicious.

  • A hardware firewall is an actual physical device that will sit between your local area network and the internet.

  • A software firewall will be installed on each individual device.

Packet Filtering & Inspection

  • The firewall inspects each packet of data.

  • Compares the packet to pre-defined security rules.

  • If the packet is flagged by the rules, then it is prevented from passing through the firewall.

Application Level Awareness

  • An application firewall controls the input and output of packets to an application.

  • Hackers may attack a network directly at the application layer.

  • So, if an attacker gets past the network firewall, there is an added layer of protection.

Inbound & Outbound Rules

  • Used as part of the filtering performed in packet filtering and application filtering.

  • Will define what data should be accepted, rejected or dropped from entering or leaving the network or computer.
  • Accepted - allow the traffic through.
  • Rejected - do not allow the traffic through and send an “unreachable” reply.
  • Dropped - do not allow the traffic through and send no response.

Network Address

  • All devices on a network are assigned an IP address to uniquely identify them.

  • Network Address Translation allows us to to assign private IP addresses to our devices within our private network.

  • NAT adds security to the network by hiding our devices addresses from the outside world.
Learn more about creating dynamic, engaging presentations with Prezi