SlideShare a Scribd company logo
1 of 5
ANTI - VIRUS   POWER POINT PRESENTATION
TOP TEN ANTI-VIRUS TOP TEN ANTI-VIRUS BIT DEFENDER KASPERSKY NOD 32 AVAST! AVG ANTIVIRS  SYMANTEC McAfee THE SHIELD DELUXE PANDA  TREND MICRO F SECURE
USES OF ANTI- VIRUS Antivirus (or anti-virus) software is used to prevent, detect, and remove malware, including computer virus, worms and Trojan horses. Such programs may also prevent and remove adware, spyware, and other forms of malware. A variety of strategies are typically employed. Signature-based detection involves searching for known malicious patterns in exactable code. However, it is possible for a user to be infected with new malware for which no signature exists yet
CLOUD ANTI-VIRUS SOFTWARE        CLOUD ANTIVIRUS In CloudAV is a cloud computing antivirus developed as a product of scientists of the University of Michigan. Current antivirus software a new document or program is scanned with only one virus detector at a time. CloudAV would be able to send programs or documents to a network cloud where it will use multiple antivirus and behavioral detection simultaneously. It is more thorough and also has the ability to check the new document or programs access history.
Each time a computer or device receives a new document or program, that item is automatically detected and sent to the antivirus cloud for analysis  The CloudAV system uses 12 different detectors that act together to tell the PC whether the item is safe to open

More Related Content

What's hot

INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013
INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013
INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013IBM Security
 
Preventing Known and Unknown Threats
Preventing Known and Unknown ThreatsPreventing Known and Unknown Threats
Preventing Known and Unknown ThreatsOPSWAT
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & preventionKhaleel Assadi
 
Anti virus slide show presentation
Anti virus slide show presentationAnti virus slide show presentation
Anti virus slide show presentationHaseebIbnMoheb
 
Tech ThrowDown: Invincea FreeSpace vs EMET 5.0
Tech ThrowDown:Invincea FreeSpace vs EMET 5.0Tech ThrowDown:Invincea FreeSpace vs EMET 5.0
Tech ThrowDown: Invincea FreeSpace vs EMET 5.0Invincea, Inc.
 
Kaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya Connect 2011 - Malwarebytes - Marcin KleczynskiKaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya Connect 2011 - Malwarebytes - Marcin KleczynskiKaseya
 
Antivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methodsAntivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methodsSomanath Kavalase
 
Virus and Anti virus
Virus and Anti virusVirus and Anti virus
Virus and Anti virusFaisal Hassan
 
The Lazy Attacker: Defending Against Broad-based Cyber Attacks
The Lazy Attacker: Defending Against Broad-based Cyber AttacksThe Lazy Attacker: Defending Against Broad-based Cyber Attacks
The Lazy Attacker: Defending Against Broad-based Cyber AttacksAlienVault
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-MalwareArpit Mittal
 
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer supportbozzerapide
 
Vulnerability Prioritization and Prediction
Vulnerability Prioritization and PredictionVulnerability Prioritization and Prediction
Vulnerability Prioritization and PredictionJonathan Cran
 

What's hot (20)

Virus
VirusVirus
Virus
 
computer virus
computer virus computer virus
computer virus
 
INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013
INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013
INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013
 
Preventing Known and Unknown Threats
Preventing Known and Unknown ThreatsPreventing Known and Unknown Threats
Preventing Known and Unknown Threats
 
Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
Anti virus slide show presentation
Anti virus slide show presentationAnti virus slide show presentation
Anti virus slide show presentation
 
The Various Classes of Antivirus!
The Various Classes of Antivirus!The Various Classes of Antivirus!
The Various Classes of Antivirus!
 
Anti virus
Anti virusAnti virus
Anti virus
 
Security
SecuritySecurity
Security
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Tech ThrowDown: Invincea FreeSpace vs EMET 5.0
Tech ThrowDown:Invincea FreeSpace vs EMET 5.0Tech ThrowDown:Invincea FreeSpace vs EMET 5.0
Tech ThrowDown: Invincea FreeSpace vs EMET 5.0
 
Anti Virus Software
Anti Virus SoftwareAnti Virus Software
Anti Virus Software
 
Kaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya Connect 2011 - Malwarebytes - Marcin KleczynskiKaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
 
Antivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methodsAntivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methods
 
Virus and Anti virus
Virus and Anti virusVirus and Anti virus
Virus and Anti virus
 
The Lazy Attacker: Defending Against Broad-based Cyber Attacks
The Lazy Attacker: Defending Against Broad-based Cyber AttacksThe Lazy Attacker: Defending Against Broad-based Cyber Attacks
The Lazy Attacker: Defending Against Broad-based Cyber Attacks
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer support
 
Vulnerability Prioritization and Prediction
Vulnerability Prioritization and PredictionVulnerability Prioritization and Prediction
Vulnerability Prioritization and Prediction
 

Viewers also liked

Watchguard presentation tech day el salvador
Watchguard presentation tech day el salvadorWatchguard presentation tech day el salvador
Watchguard presentation tech day el salvadorJose Molina
 
влад титов продвижение в социальных сетях
влад титов продвижение в социальных сетяхвлад титов продвижение в социальных сетях
влад титов продвижение в социальных сетяхRuslan Khamitov
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 

Viewers also liked (7)

Watchguard presentation tech day el salvador
Watchguard presentation tech day el salvadorWatchguard presentation tech day el salvador
Watchguard presentation tech day el salvador
 
влад титов продвижение в социальных сетях
влад титов продвижение в социальных сетяхвлад титов продвижение в социальных сетях
влад титов продвижение в социальных сетях
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Antivirus
AntivirusAntivirus
Antivirus
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 

Similar to ANTI - VIRUS

Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
Stay Secure: Unveiling the Power of Antivirus Software
Stay Secure: Unveiling the Power of Antivirus SoftwareStay Secure: Unveiling the Power of Antivirus Software
Stay Secure: Unveiling the Power of Antivirus SoftwareSoftwareDeals
 
antivirus software.pptx
antivirus software.pptxantivirus software.pptx
antivirus software.pptxdianemullin2
 
Antivirus And Malware Protection
Antivirus And Malware ProtectionAntivirus And Malware Protection
Antivirus And Malware Protectionreasonsecurity
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools ollyabraham
 
Maranan chap2 lab2
Maranan chap2 lab2Maranan chap2 lab2
Maranan chap2 lab2maranan_zyra
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirussinghhp10699
 
An analysis of how antivirus methodologies are utilized in protecting compute...
An analysis of how antivirus methodologies are utilized in protecting compute...An analysis of how antivirus methodologies are utilized in protecting compute...
An analysis of how antivirus methodologies are utilized in protecting compute...UltraUploader
 
How do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfHow do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfBlogger
 
How Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfHow Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfBlogger
 
Presentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptxPresentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptxitsamuamit11
 
does avast remove malware
does avast remove malwaredoes avast remove malware
does avast remove malwaressuser1eca7d
 
malwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfmalwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfitsamuamit11
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksDiane M. Metcalf
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareTeodoro Cipresso
 

Similar to ANTI - VIRUS (20)

Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Stay Secure: Unveiling the Power of Antivirus Software
Stay Secure: Unveiling the Power of Antivirus SoftwareStay Secure: Unveiling the Power of Antivirus Software
Stay Secure: Unveiling the Power of Antivirus Software
 
antivirus software.pptx
antivirus software.pptxantivirus software.pptx
antivirus software.pptx
 
Antivirus And Malware Protection
Antivirus And Malware ProtectionAntivirus And Malware Protection
Antivirus And Malware Protection
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools
 
Antivirus
AntivirusAntivirus
Antivirus
 
Maranan chap2 lab2
Maranan chap2 lab2Maranan chap2 lab2
Maranan chap2 lab2
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
Avast! antivirus protection
Avast! antivirus protectionAvast! antivirus protection
Avast! antivirus protection
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
An analysis of how antivirus methodologies are utilized in protecting compute...
An analysis of how antivirus methodologies are utilized in protecting compute...An analysis of how antivirus methodologies are utilized in protecting compute...
An analysis of how antivirus methodologies are utilized in protecting compute...
 
How do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfHow do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdf
 
How Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfHow Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdf
 
Presentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptxPresentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptx
 
does avast remove malware
does avast remove malwaredoes avast remove malware
does avast remove malware
 
malwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfmalwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdf
 
Anti virus
Anti virusAnti virus
Anti virus
 
Anti virus software
Anti virus softwareAnti virus software
Anti virus software
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise Networks
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting Malware
 

ANTI - VIRUS

  • 1. ANTI - VIRUS POWER POINT PRESENTATION
  • 2. TOP TEN ANTI-VIRUS TOP TEN ANTI-VIRUS BIT DEFENDER KASPERSKY NOD 32 AVAST! AVG ANTIVIRS SYMANTEC McAfee THE SHIELD DELUXE PANDA TREND MICRO F SECURE
  • 3. USES OF ANTI- VIRUS Antivirus (or anti-virus) software is used to prevent, detect, and remove malware, including computer virus, worms and Trojan horses. Such programs may also prevent and remove adware, spyware, and other forms of malware. A variety of strategies are typically employed. Signature-based detection involves searching for known malicious patterns in exactable code. However, it is possible for a user to be infected with new malware for which no signature exists yet
  • 4. CLOUD ANTI-VIRUS SOFTWARE CLOUD ANTIVIRUS In CloudAV is a cloud computing antivirus developed as a product of scientists of the University of Michigan. Current antivirus software a new document or program is scanned with only one virus detector at a time. CloudAV would be able to send programs or documents to a network cloud where it will use multiple antivirus and behavioral detection simultaneously. It is more thorough and also has the ability to check the new document or programs access history.
  • 5. Each time a computer or device receives a new document or program, that item is automatically detected and sent to the antivirus cloud for analysis The CloudAV system uses 12 different detectors that act together to tell the PC whether the item is safe to open