A utility program that is used to protect from malware.
Scans can be on demand, scheduled of real-time.
Scans can be for the entire computer, a storage device, a folder or a file.
Detection Techniques
Signature detection identifies malware using a pattern (the signature) for the malware code that is compared to programs on your hard disk to identify the viruses.
Heuristic detection monitors the behaviour of programs to identify any suspicious behaviour and flags it as a possible virus.
Dealing with Threats
Once detected, users will have three options to choose from to deal with the malware:
Clean – removing the malware from the file, without removing the file itself.
Quarantine – this moves the malware to a secure location on the computer and prevents it from executing or spreading.
Delete – removing the file completely from the computer.
Firewalls & Filtering Techniques
Firewalls & Filtering Techniques
Either a hardware device or a utility program that monitors incoming and outgoing network traffic and blocks any traffic that it deems suspicious.
A hardware firewall is an actual physical device that will sit between your local area network and the internet.
A software firewall will be installed on each individual device.
Packet Filtering & Inspection
The firewall inspects each packet of data.
Compares the packet to pre-defined security rules.
If the packet is flagged by the rules, then it is prevented from passing through the firewall.
Application Level Awareness
An application firewall controls the input and output of packets to an application.
Hackers may attack a network directly at the application layer.
So, if an attacker gets past the network firewall, there is an added layer of protection.
Inbound & Outbound Rules
Used as part of the filtering performed in packet filtering and application filtering.
Will define what data should be accepted, rejected or dropped from entering or leaving the network or computer.
Accepted - allow the traffic through.
Rejected - do not allow the traffic through and send an “unreachable” reply.
Dropped - do not allow the traffic through and send no response.
Network Address
All devices on a network are assigned an IP address to uniquely identify them.
Network Address Translation allows us to to assign private IP addresses to our devices within our private network.
NAT adds security to the network by hiding our devices addresses from the outside world.