SANDBO New age Security X Presented By:- Ashish Gautam 6059
Preface The term security always plays animportant role in our lives ,where it is theage of computers so security plays an evenbigger role. The latest and most sophisticatedtechnology emerged recently is Sand Boxtechnology.
About Sand BoxIn computer security, a sandbox is a securitymechanism for separating running programs.It is often used to execute untestedcode,untrusted users and untrusted websitesin a virtual Environment . Any action take bysuspicious virus present in these will noteffect our System.
Working of SANDBOX TechnologyAuto Sandbox offers three options for userswhenever suspicious application isidentified and prompted to run in safevirtualized environment: 1. execute the filewithin the virtual AutoSandbox, 2. run itoutside the sandbox or 3. cancel running theapplication entirely.
Working of SANDBOX TechnologyWhen user allows to run suspiciousprogram in the Sandbox, the program willrun as usual but operations like filesopened/created/renamed and read/writesfrom registry are monitored and virtualized,that means stored only in the sandbox andno permanent changes will be saved touser’s system.
VIRUS SCANNERS VS SANDBOXSand Box scans the actions the virus code takes and not the name or characteristics of the virus.Sandbox cannot replace anti-virus scanners as identification, disinfection and removal of viruses can only be done by virus scanners.Both work complementary to each others for providing a fully secured environment .
FEATURES OF SANDBOXFirst in the world Norman is the first anti-virus company in the world to present this new technology .User friendly It can detect unknown viruses with a minimal risk of false alarms.Sophisticated technology The method is based on the basic function of a computer virus replication.
WITHOUT SANDBOX ?If the sandbox agent does not protect your computer,hostile applets could access all the files andresources that are available on your computer.Recently corporate networks and computers connectsto the internet have been attacked and have reporteddamages from illegal access from the outside.Malicious mobile code (java as well as other executables )is increasingly being used to issue these attacks. Withoutsophisticated knowledge like sandbox the rate of threatsincreases enormously.
LIST OF COMMON ATTACKSDeleting of filesTheft of information and dataRemote access via the internetManipulation of your connectionDangerous calls to the system