SlideShare a Scribd company logo
1 of 25
• NAME: Peer Umair
Firdous
• Group: 157a
Introduction to Antivirus Programs
• Antivirus software is a type of program
designed and developed to protect computers
from malware like viruses, computer worms,
spyware, botnets, rootkits, key loggers and
such. Antivirus programs function to scan,
detect and remove viruses from your
computer
What is a computer virus?
• In more technical terms, a computer virus is a
type of malicious code or program written to
alter the way a computer operates and is
designed to spread from one computer to
another. A virus operates by inserting or
attaching itself to a legitimate program or
document that supports macros in order to
execute its code
Types of Viruses ?
1. Boot sector virus
This type of virus can take control when you start — or boot — your computer. One way it can
spread is by plugging an infected USB drive into your computer.
2. Web scripting virus
This type of virus exploits the code of web browsers and web pages. If you access such a web
page, the virus can infect your computer.
3. Browser hijacker
This type of virus “hijacks” certain web browser functions, and you may be automatically directed
to an unintended website.
4. Resident virus
This is a general term for any virus that inserts itself in a computer system’s memory. A resident
virus can execute anytime when an operating system loads.
5. Direct action virus
This type of virus comes into action when you execute a file containing a virus. Otherwise, it
remains dormant.
Types of Viruses ?
6. Polymorphic virus
A polymorphic virus changes its code each time an infected file is executed. It does
this to evade antivirus programs.
7. File infector virus
This common virus inserts malicious code into executable files — files used to perform
certain functions or operations on a system.
8. Multipartite virus
This kind of virus infects and spreads in multiple ways. It can infect both program files
and system sectors.
9. Macro virus
Macro viruses are written in the same macro language used for software applications.
Such viruses spread when you open an infected document, often through email
attachments.
What are Antivirus Programs?
Antivirus software is a type of security software
designed to protect users from multiple types of
malware, not just viruses.
The software is a risk management tool that
scans devices regularly and on-demand for
known malware and suspicious behavior
associated with malware. Antimalware software
is similar to antivirus software but tends to be
more specific to the malware it defends against.
When malware is detected by antivirus software,
the user will be alerted to the threat and the
malware will be deleted. Sometimes the
antivirus will ask the user first before deletion.
Asking first is a useful attribute when the
detection of malware is a false positive, which is
a possibility when the antivirus uses certain
detection techniques.
Types of Antivirus Programs?
• System monitoring antivirus
• This antivirus protection can monitor
software and computer systems for behavior
that is suspect or atypical of the user.
• For instance, alerts are created when a user
connects to unfamiliar sites or attempts to
access a large number of files, or when there’s
a significant increase in data usage.
Types of Antivirus Programs?
• Machine learning antivirus
• Another form of protection can be machine learning
techniques, which monitor “normal” computer or
network behaviors. The machine learning antivirus
software is able to limit activities by programs or
computers if they look suspicious.
• More specifically, machine learning detection
implements algorithms to facilitate malware detection
that is broader in scope. This type of antivirus
protection is beneficial because it works in tandem
with other antivirus applications to provide multiple
layers of protection.
Types of Antivirus Programs?
• Malware signature antivirus
• Malware signature antivirus software detects
malware signatures, which are digital fingerprints
of malicious software. Antivirus protection can
scan for specific malicious codes, identify specific
viruses, and disable these programs.
• While malware signature antivirus protection is
key for detecting and eradicating known viruses,
one limitation is its inability to address new
viruses. The antivirus product simply doesn’t
contain these new virus signatures.
cyber attacks?
• A cyber attack is an assault launched by cybercriminals
using one or more computers against a single or
multiple computers or networks. A cyber attack can
maliciously disable computers, steal data, or use a
breached computer as a launch point for other attacks.
Cybercriminals use a variety of methods to launch a
cyber attack, including malware, phishing,
ransomware, denial of service, among other methods.
The security solutions in today’s market offer varying degrees of protection
against cyber attacks, which you can use at least for a level of primary
protection. These are:
Encryption Software: This software can help encrypt and protect all your
sensitive data such as customer information, financial statements,
employee records, and client information.
Data Backup Solutions: Data Backup Solutions can help backup all your
business-critical data. In the event of any information loss or compromise,
you can quickly retrieve the data from the alternate backup location.
Password Security Software: With a password security software, you
can set up a two-step authentication or password security for your internal
programs to reduce the probability of hacking of passwords.
Antivirus Software: An antivirus software can be your primary defense
against most types of malware.
Firewalls: Firewalls can help provide an added layer of protection to any
hardware or software. Firewalls can help prevent an unauthorized user
from accessing a computer or network.
360 SECURITY
• 360 Total Security is a program developed by
Qihoo 360, an internet security company
based in China. 360 Safeguard's focus is on
stopping malware such as computer
viruses and trojan horses, and providing
security patches for Microsoft Windows. 360
Safeguard trojan horse scanner is cloud-based.
A heuristics engine is built into the scanner.
• What features does 360 Total Security
Provide?
• Some interesting applications contained
within this framework include protection
against online shopping hackers, blocking
potential key loggers and ensuring that an
existing webcam is not hacked for nefarious
purposes. More features are likely to be made
available as new concerns emerge
• Will 360 Total Security protect my system
against ransomware?
• Ransomware is an emerging threat and it
needs to be taken seriously. This system is
able to detect and thwart the majority of
these viruses. All versions provide this level of
protection. Users can therefore determine
whether or not their systems may be at risk.
• What antivirus engines does 360 Total
Security employ?
• This package works in synergy with
Bitdefender and Avira. These are two of the
most powerful engines on the market today,
so we can be assured of superior levels of
coverage (particularly with more advanced
threats). The free version also utilizes these
effective tools.
Interface of 360 Security:
Link to Download 360 Security:
https://www.360totalsecurity.com/en/
Cybersecurity

More Related Content

What's hot

Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber AttackWebinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Aujas
 

What's hot (20)

IT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest ThreatIT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest Threat
 
Cybersecurity…real world solutions
Cybersecurity…real world solutions Cybersecurity…real world solutions
Cybersecurity…real world solutions
 
Anatomy of a Ransomware Event
Anatomy of a Ransomware EventAnatomy of a Ransomware Event
Anatomy of a Ransomware Event
 
Ransomware Detection: Don’t Pay Up. Backup.
Ransomware Detection:  Don’t Pay Up. Backup.Ransomware Detection:  Don’t Pay Up. Backup.
Ransomware Detection: Don’t Pay Up. Backup.
 
Triangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughTriangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enough
 
Cambodia CERT Seminar: Incident response for ransomeware attacks
Cambodia CERT Seminar: Incident response for ransomeware attacksCambodia CERT Seminar: Incident response for ransomeware attacks
Cambodia CERT Seminar: Incident response for ransomeware attacks
 
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
 
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Planning your 2015 Threat Detection Strategy with a Broken Crystal BallPlanning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
 
AI for Ransomware Detection & Prevention Insights from Patents
AI for Ransomware Detection & Prevention Insights from PatentsAI for Ransomware Detection & Prevention Insights from Patents
AI for Ransomware Detection & Prevention Insights from Patents
 
Ransomware
RansomwareRansomware
Ransomware
 
Take the Ransom Out of Ransomware
Take the Ransom Out of RansomwareTake the Ransom Out of Ransomware
Take the Ransom Out of Ransomware
 
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than EverNew USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
 
Cyber Attack Survival: Are You Ready?
Cyber Attack Survival:  Are You Ready?Cyber Attack Survival:  Are You Ready?
Cyber Attack Survival: Are You Ready?
 
Cybersecurity: How to Protect Your Firm from a Cyber Attack
Cybersecurity: How to Protect Your Firm from a Cyber AttackCybersecurity: How to Protect Your Firm from a Cyber Attack
Cybersecurity: How to Protect Your Firm from a Cyber Attack
 
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber AttackWebinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
 
Demo how to detect ransomware with alien vault usm_gg
Demo  how to detect ransomware with alien vault usm_ggDemo  how to detect ransomware with alien vault usm_gg
Demo how to detect ransomware with alien vault usm_gg
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
 
Cerdant Security State of the Union
Cerdant Security State of the UnionCerdant Security State of the Union
Cerdant Security State of the Union
 
Cyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSCyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoS
 
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESRansomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
 

Similar to Cybersecurity

Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
hiiraa
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Cimab Butt
 

Similar to Cybersecurity (20)

Computer Virus_Athi-1.pdf
Computer Virus_Athi-1.pdfComputer Virus_Athi-1.pdf
Computer Virus_Athi-1.pdf
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
information about virus
information about virusinformation about virus
information about virus
 
How Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfHow Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdf
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
Firewall
FirewallFirewall
Firewall
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Security threats explained
Security threats explained Security threats explained
Security threats explained
 
How do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfHow do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdf
 
Antivirus
AntivirusAntivirus
Antivirus
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?
 
Virus & Antivirus
Virus & AntivirusVirus & Antivirus
Virus & Antivirus
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 

More from UmairFirdous (12)

1 introd-n.pptxhggvbyyttrreewwqqsssdfgjjj
1 introd-n.pptxhggvbyyttrreewwqqsssdfgjjj1 introd-n.pptxhggvbyyttrreewwqqsssdfgjjj
1 introd-n.pptxhggvbyyttrreewwqqsssdfgjjj
 
Opthalmology Kotha bole aur kya kar rahey h
Opthalmology Kotha bole aur kya kar rahey hOpthalmology Kotha bole aur kya kar rahey h
Opthalmology Kotha bole aur kya kar rahey h
 
disorderofpuberty.pptx
disorderofpuberty.pptxdisorderofpuberty.pptx
disorderofpuberty.pptx
 
Biliary Dyskinesia.pptx
Biliary Dyskinesia.pptxBiliary Dyskinesia.pptx
Biliary Dyskinesia.pptx
 
hypothyroidism.pptx
hypothyroidism.pptxhypothyroidism.pptx
hypothyroidism.pptx
 
Acute Pancreatitis.ppt
Acute Pancreatitis.pptAcute Pancreatitis.ppt
Acute Pancreatitis.ppt
 
1.pptx
1.pptx1.pptx
1.pptx
 
chestandabdominaltrauma-190114100000.pdf
chestandabdominaltrauma-190114100000.pdfchestandabdominaltrauma-190114100000.pdf
chestandabdominaltrauma-190114100000.pdf
 
folicaciddeficiency-230725062219-7281efe9.pdf
folicaciddeficiency-230725062219-7281efe9.pdffolicaciddeficiency-230725062219-7281efe9.pdf
folicaciddeficiency-230725062219-7281efe9.pdf
 
361_ASHUTOSH.pptx
361_ASHUTOSH.pptx361_ASHUTOSH.pptx
361_ASHUTOSH.pptx
 
Mohammad_Umar_Pathphysiology_ppt.pptx
Mohammad_Umar_Pathphysiology_ppt.pptxMohammad_Umar_Pathphysiology_ppt.pptx
Mohammad_Umar_Pathphysiology_ppt.pptx
 
Dar_Shahid_Yousuf_Iws.pptx
Dar_Shahid_Yousuf_Iws.pptxDar_Shahid_Yousuf_Iws.pptx
Dar_Shahid_Yousuf_Iws.pptx
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Cybersecurity

  • 1. • NAME: Peer Umair Firdous • Group: 157a
  • 2.
  • 3.
  • 4. Introduction to Antivirus Programs • Antivirus software is a type of program designed and developed to protect computers from malware like viruses, computer worms, spyware, botnets, rootkits, key loggers and such. Antivirus programs function to scan, detect and remove viruses from your computer
  • 5. What is a computer virus? • In more technical terms, a computer virus is a type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another. A virus operates by inserting or attaching itself to a legitimate program or document that supports macros in order to execute its code
  • 6. Types of Viruses ? 1. Boot sector virus This type of virus can take control when you start — or boot — your computer. One way it can spread is by plugging an infected USB drive into your computer. 2. Web scripting virus This type of virus exploits the code of web browsers and web pages. If you access such a web page, the virus can infect your computer. 3. Browser hijacker This type of virus “hijacks” certain web browser functions, and you may be automatically directed to an unintended website. 4. Resident virus This is a general term for any virus that inserts itself in a computer system’s memory. A resident virus can execute anytime when an operating system loads. 5. Direct action virus This type of virus comes into action when you execute a file containing a virus. Otherwise, it remains dormant.
  • 7. Types of Viruses ? 6. Polymorphic virus A polymorphic virus changes its code each time an infected file is executed. It does this to evade antivirus programs. 7. File infector virus This common virus inserts malicious code into executable files — files used to perform certain functions or operations on a system. 8. Multipartite virus This kind of virus infects and spreads in multiple ways. It can infect both program files and system sectors. 9. Macro virus Macro viruses are written in the same macro language used for software applications. Such viruses spread when you open an infected document, often through email attachments.
  • 8.
  • 9. What are Antivirus Programs? Antivirus software is a type of security software designed to protect users from multiple types of malware, not just viruses. The software is a risk management tool that scans devices regularly and on-demand for known malware and suspicious behavior associated with malware. Antimalware software is similar to antivirus software but tends to be more specific to the malware it defends against. When malware is detected by antivirus software, the user will be alerted to the threat and the malware will be deleted. Sometimes the antivirus will ask the user first before deletion. Asking first is a useful attribute when the detection of malware is a false positive, which is a possibility when the antivirus uses certain detection techniques.
  • 10. Types of Antivirus Programs? • System monitoring antivirus • This antivirus protection can monitor software and computer systems for behavior that is suspect or atypical of the user. • For instance, alerts are created when a user connects to unfamiliar sites or attempts to access a large number of files, or when there’s a significant increase in data usage.
  • 11. Types of Antivirus Programs? • Machine learning antivirus • Another form of protection can be machine learning techniques, which monitor “normal” computer or network behaviors. The machine learning antivirus software is able to limit activities by programs or computers if they look suspicious. • More specifically, machine learning detection implements algorithms to facilitate malware detection that is broader in scope. This type of antivirus protection is beneficial because it works in tandem with other antivirus applications to provide multiple layers of protection.
  • 12. Types of Antivirus Programs? • Malware signature antivirus • Malware signature antivirus software detects malware signatures, which are digital fingerprints of malicious software. Antivirus protection can scan for specific malicious codes, identify specific viruses, and disable these programs. • While malware signature antivirus protection is key for detecting and eradicating known viruses, one limitation is its inability to address new viruses. The antivirus product simply doesn’t contain these new virus signatures.
  • 13.
  • 14.
  • 15. cyber attacks? • A cyber attack is an assault launched by cybercriminals using one or more computers against a single or multiple computers or networks. A cyber attack can maliciously disable computers, steal data, or use a breached computer as a launch point for other attacks. Cybercriminals use a variety of methods to launch a cyber attack, including malware, phishing, ransomware, denial of service, among other methods.
  • 16.
  • 17. The security solutions in today’s market offer varying degrees of protection against cyber attacks, which you can use at least for a level of primary protection. These are: Encryption Software: This software can help encrypt and protect all your sensitive data such as customer information, financial statements, employee records, and client information. Data Backup Solutions: Data Backup Solutions can help backup all your business-critical data. In the event of any information loss or compromise, you can quickly retrieve the data from the alternate backup location. Password Security Software: With a password security software, you can set up a two-step authentication or password security for your internal programs to reduce the probability of hacking of passwords. Antivirus Software: An antivirus software can be your primary defense against most types of malware. Firewalls: Firewalls can help provide an added layer of protection to any hardware or software. Firewalls can help prevent an unauthorized user from accessing a computer or network.
  • 18.
  • 19. 360 SECURITY • 360 Total Security is a program developed by Qihoo 360, an internet security company based in China. 360 Safeguard's focus is on stopping malware such as computer viruses and trojan horses, and providing security patches for Microsoft Windows. 360 Safeguard trojan horse scanner is cloud-based. A heuristics engine is built into the scanner.
  • 20. • What features does 360 Total Security Provide? • Some interesting applications contained within this framework include protection against online shopping hackers, blocking potential key loggers and ensuring that an existing webcam is not hacked for nefarious purposes. More features are likely to be made available as new concerns emerge
  • 21. • Will 360 Total Security protect my system against ransomware? • Ransomware is an emerging threat and it needs to be taken seriously. This system is able to detect and thwart the majority of these viruses. All versions provide this level of protection. Users can therefore determine whether or not their systems may be at risk.
  • 22. • What antivirus engines does 360 Total Security employ? • This package works in synergy with Bitdefender and Avira. These are two of the most powerful engines on the market today, so we can be assured of superior levels of coverage (particularly with more advanced threats). The free version also utilizes these effective tools.
  • 23. Interface of 360 Security:
  • 24. Link to Download 360 Security: https://www.360totalsecurity.com/en/