Your SlideShare is downloading. ×
  • Like
Solution4
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply
Published

 

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
628
On SlideShare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
14
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Internet and Antivirus
    • Presented by
          • Nazran Dawn
  • 2. Agenda
    • Internet
    • History of internet
    • Common uses of the Internet
    • Internet Threats
    • Antivirus
    • Antivirus Design Principles
    • Top Antivirus in 2007
    • 5 reasons to use Antivirus
    • Conclusion
  • 3. Internet
    • The Internet is a worldwide, publicly accessible network of interconnected computer networks that transmit data by packet switching using the standard Internet Protocol (IP).
  • 4. Internet (cont)
    • It is a "network of networks" that consists of millions of smaller domestic, academic, business, and government networks, which together carry various information and services, such as electronic mail, online chat, file transfer, and the interlinked Web pages and other documents of the World Wide Web.
            • http:// en.wikipedia.org/wiki/Internet
  • 5. History of internet
      • In February 1958, United States to create the Advanced Research Projects Agency, known as ARPA.
      • U.S. Air Force lead a project to implement a network that recommended packet switching
      • The first TCP/IP-wide area network was operational by January 1, 1983,
  • 6. History of internet (cont)
      • United States' National Science Foundation (NSF) constructed a university network backbone that would later become the NSFNet.
      • The network gained a public face in the 1990s
      • By 1996 the word "Internet" was coming into common daily usage, often refer to the World Wide Web
  • 7. Common uses of the Internet
    • E-mail
        • Sending electronic text messages between parties in a way analogous to mailing letters
    • The World Wide Web
        • A way of accessing information over the medium of the Internet
    • Remote access
        • Allows computer users to connect to other computers and information stores easily
  • 8. Internet uses (cont)
    • Collaboration
        • Internet 'chat'
        • Instant messaging
        • Tele conference
    • File sharing
        • A computer file can be e-mailed to colleagues and friends as an attachment
  • 9. Internet uses (cont)
    • Streaming media
        • Video chat rooms, video conferencing , web cams
    • Voice telephony (VoIP)
        • Internet phone Exp. Vonage, Skype
  • 10. Internet Threats
    • Virus
    • Spyware
    • Web bug (HTML-enabled email)
    • Phishing
    • Trojan horse
    • Spam
  • 11. Virus
    • A program or piece of code that is loaded onto user’s computer without user’s knowledge and runs against user’s wishes. Viruses can also replicate themselves.
  • 12. Spyware
      • Spyware is computer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed permission.
      • Example :
        • CoolWebSearch , CoolWebSearch , Zango
  • 13. Web bug
    • A web bug is any one of a number of techniques used to track who is reading a web page or e-mail, when, and from what computer. Web bugs are used by e-mail marketers, spammers and phishers.
  • 14. Phishing
    • In computing, phishing is a criminal activity to acquire sensitive information, such as usernames, passwords and credit card details, by masked as a trustworthy entity in an electronic communication.
  • 15. Trojan horse
    • Trojan horse is a program that installs malicious software while under the appearance of doing something else. Examples include various implementations of weather alerting programs, computer clock setting software, and peer-to-peer file sharing utilities
  • 16. Spam
    • Spamming is the abuse of electronic messaging systems to indiscriminately send unwelcome bulk messages. The most widely recognized form of spam is e-mail spam. This term is applied to similar abuses in other media.
  • 17. Antivirus
    • What is Antivirus software?
      • Antivirus software is a computer program that detects, prevents, and takes action to disarm or remove malicious software programs, such as viruses and worms. You can help protect your computer against viruses by using antivirus software
            • http://www.microsoft.com/protect/computer/basics/antivirus.mspx
  • 18. Antivirus (cont)
    • We can help protect your computer against viruses by using antivirus software
    Private network Internet Security perimeter Packet-filtering router
  • 19. Why we need Antivirus?
    • If your computer is not protected when you connect to the internet, your computer could be effected by virus, spy ware.
      • Modern antivirus is a software package of firewall, antivirus, anti-spyware.
      • Some antivirus also have internet explorer toolbar include popup blocker, anti spam, anti fishing and email filtering.
  • 20. History of Antivirus
        • The first publicly known neutralization of a wild PC virus was performed by European Bernt Fix (also Bernd) in early 1987. Fix neutralized an infection of the Vienna virus. First edition of Polish antivirus software mks_vir started in 1987.. Fall 1988 also saw antivirus software Dr. Solomon's Anti-Virus Toolkit released by Briton Alan Solomon. By December 1990 the market had matured to the point of nineteen separate antivirus products being on sale including Norton AntiVirus and ViruScan from McAfee
            • http://en.wikipedia.org/wiki/Anti-virus_software#History
  • 21. Antivirus Design Principles
    • Attempt to repair the file by removing the virus itself from the file
    • Quarantine the file (such that the file remains inaccessible to other programs and its virus can no longer spread)
    • Delete the infected file
  • 22. Antivirus Design Principles (cont)
  • 23. Top Antivirus in 2007
    • Norton Antivirus 2007
    • Mcafee VirusScan Plus
    • Trend Micro Internet Security
    • AVG Anti-Virus
  • 24. Norton Antivirus 2007
    • Key features
      • Detects and removes viruses and spyware
      • Prevents virus-infected emails from spreading
      • Includes protection updates and new product features as available throughout the renewable service period
      • Price: $39.99 USD
  • 25. Mcafee VirusScan Plus
    • Key features
      • Offers 3 in 1 PC Protection from viruses, hackers and spyware so you can surf the Web safely.
      • Prevents multi-pronged attacks by integrating anti-virus, firewall, and anti-spyware technologies.
      • Price: 29.99 USD
  • 26. Trend Micro Internet Security
    • Key features
      • Antivirus Security
      • Spyware Protection
      • Personal Firewall
      • Fraud Defense
      • Price: $49.95
  • 27. AVG Anti-Virus
    • Key features
      • A tool for scanning your hard drive and e-mail
      • Real-time shield to prevent infections
      • AVG Virus Vault for safe handling of infected files.
      • Price: free to use
  • 28. 5 reasons to use Antivirus
    • Regular antivirus scanning
      • To help keep you safe from viruses, worms, and Trojans, Antivirus automatically scans the files and folders on your computer, including e-mail attachments as you open them.
  • 29. 5 reasons to use Antivirus (cont)
    • Continuous firewall monitoring
      • Firewalls monitor two way traffic. This means that both inbound and outbound traffic is controlled. The firewall is also updated continually to help protect you
  • 30. 5 reasons to use Antivirus (cont)
    • Enhanced protection from spyware
      • Today's Antivirus have antispyware technology helps protect your computer from spyware programs that secretly monitor your activities or pop-ups that negatively impact your computer's security and performance.
  • 31. 5 reasons to use Antivirus (cont)
    • Easy file backup and restore
      • With Antivirus you can make copies of important files and documents and store them on a CD, DVD, or an external hard drive in case of an emergency.
  • 32. 5 reasons to use Antivirus (cont)
    • Continuously updated
      • Antivirus could updates itself automatically to help ensure that your virus, firewall, and spyware protection is always up to date and ready to help protect you from the latest threats.
  • 33. Conclusion
    • Basic rules of using any security system:
      • Know what you want to protect
        • Use the simplest protection that protects it
      • Train your users
      • Don’t trust everything
        • Attacks may come from everywhere
      • Stay alert
  • 34. References
    • http://en.wikipedia.org/wiki/Anti-virus_software
    • http://www.microsoft.com/protect/computer/basics/antivirus.mspx
    • http://antivirus-software.6starreviews.com/