SlideShare a Scribd company logo
@infosectrain
ANTIVIRUS
LET THE BATTLE BEGIN!
FIREWALL
Choose Your Cybersecurity Guardian
www.infosectrain.com
@infosectrain #
l
e
a
r
n
t
o
r
i
s
e
Controls the entry and exit points of the cyber
fortress.
Signature moves: Packet Filtering, Proxy
Services, and Stateful Inspection.
Firewall, the Gatekeeper!
Specializing in identifying and vanquishing
malware..
Signature moves: Signature-Based
Detection, Behavioral Analysis, and Heuristic
Power.
Antivirus, the Defender!
STRENGTHS
Effective against various
types of malware
ANTIVIRUS
Controls network access
with precision
Real-time scanning for
constant vigilance
Monitors and filters
incoming/outgoing
traffic
Behavioral analysis to
catch tricky threats
Acts as a barrier against
unauthorized access
FIREWALL
www.infosectrain.com
@infosectrain #
l
e
a
r
n
t
o
r
i
s
e
WEAKNESSES
May not be as effective
against network-based
attacks
ANTIVIRUS
Less effective against
specific malware types
Relies on signature
databases, may miss
new threats
May not inspect
encrypted traffic
thoroughly
Limited control over
unauthorized access
Limited in detecting
malware embedded in
files
FIREWALL
www.infosectrain.com
@infosectrain #
l
e
a
r
n
t
o
r
i
s
e
FOUND THIS USEFUL?
To Get More Insights Through Our FREE
Courses | Workshops | eBooks | Checklists | Mock Tests
LIKE SHARE FOLLOW

More Related Content

Similar to Antivirus Vs Firewall

Malware forensic
Malware forensicMalware forensic
Malware forensic
SumeraHangi
ย 
Computer security 7.pptx
Computer security 7.pptxComputer security 7.pptx
Computer security 7.pptx
Khappiyo
ย 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
Cisco Security
ย 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdf
ssusera0b94b
ย 
Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0
Arjunsinh Sindhav
ย 
Unit 5.pptx
Unit 5.pptxUnit 5.pptx
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
Sweta Sharma
ย 
SonicWALL - Skytek - VnPro.pptx
SonicWALL - Skytek - VnPro.pptxSonicWALL - Skytek - VnPro.pptx
SonicWALL - Skytek - VnPro.pptx
ssuser813dcd
ย 
CS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdfCS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdf
Kakai Catalan
ย 
Building Fortified Walls Role of Firewall Safeguarding Your Company.pptx
Building Fortified Walls Role of Firewall Safeguarding Your Company.pptxBuilding Fortified Walls Role of Firewall Safeguarding Your Company.pptx
Building Fortified Walls Role of Firewall Safeguarding Your Company.pptx
BluechipComputerSyst
ย 
Firewall
FirewallFirewall
Firewall
sajeena81
ย 
Managing Cyber Security Risks
Managing Cyber Security RisksManaging Cyber Security Risks
Managing Cyber Security Risks
David Kondrup
ย 
BEST CYBERSECURITY EXTENSIONS.pdf
BEST CYBERSECURITY EXTENSIONS.pdfBEST CYBERSECURITY EXTENSIONS.pdf
BEST CYBERSECURITY EXTENSIONS.pdf
infosecTrain
ย 
Unmasking Scam Websites: Ways to Safe Surfing
Unmasking Scam Websites: Ways to Safe SurfingUnmasking Scam Websites: Ways to Safe Surfing
Unmasking Scam Websites: Ways to Safe Surfing
SoftwareDeals
ย 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
Sweta Leena Panda
ย 
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
Mohammed Abdul Lateef
ย 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
SMSumon8
ย 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
ANJUMOHANANU
ย 
The Power of Web Application Firewalls (WAFs) in Protecting Your Web App.pptx
The Power of Web Application Firewalls (WAFs) in Protecting Your Web App.pptxThe Power of Web Application Firewalls (WAFs) in Protecting Your Web App.pptx
The Power of Web Application Firewalls (WAFs) in Protecting Your Web App.pptx
BluechipComputerSyst
ย 
ppt by Mehak (Decoding Firewalls Types, Functions, And How To Select The Best...
ppt by Mehak (Decoding Firewalls Types, Functions, And How To Select The Best...ppt by Mehak (Decoding Firewalls Types, Functions, And How To Select The Best...
ppt by Mehak (Decoding Firewalls Types, Functions, And How To Select The Best...
Bluechip Gulf IT Services
ย 

Similar to Antivirus Vs Firewall (20)

Malware forensic
Malware forensicMalware forensic
Malware forensic
ย 
Computer security 7.pptx
Computer security 7.pptxComputer security 7.pptx
Computer security 7.pptx
ย 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
ย 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdf
ย 
Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0
ย 
Unit 5.pptx
Unit 5.pptxUnit 5.pptx
Unit 5.pptx
ย 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
ย 
SonicWALL - Skytek - VnPro.pptx
SonicWALL - Skytek - VnPro.pptxSonicWALL - Skytek - VnPro.pptx
SonicWALL - Skytek - VnPro.pptx
ย 
CS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdfCS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdf
ย 
Building Fortified Walls Role of Firewall Safeguarding Your Company.pptx
Building Fortified Walls Role of Firewall Safeguarding Your Company.pptxBuilding Fortified Walls Role of Firewall Safeguarding Your Company.pptx
Building Fortified Walls Role of Firewall Safeguarding Your Company.pptx
ย 
Firewall
FirewallFirewall
Firewall
ย 
Managing Cyber Security Risks
Managing Cyber Security RisksManaging Cyber Security Risks
Managing Cyber Security Risks
ย 
BEST CYBERSECURITY EXTENSIONS.pdf
BEST CYBERSECURITY EXTENSIONS.pdfBEST CYBERSECURITY EXTENSIONS.pdf
BEST CYBERSECURITY EXTENSIONS.pdf
ย 
Unmasking Scam Websites: Ways to Safe Surfing
Unmasking Scam Websites: Ways to Safe SurfingUnmasking Scam Websites: Ways to Safe Surfing
Unmasking Scam Websites: Ways to Safe Surfing
ย 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
ย 
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
ย 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
ย 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
ย 
The Power of Web Application Firewalls (WAFs) in Protecting Your Web App.pptx
The Power of Web Application Firewalls (WAFs) in Protecting Your Web App.pptxThe Power of Web Application Firewalls (WAFs) in Protecting Your Web App.pptx
The Power of Web Application Firewalls (WAFs) in Protecting Your Web App.pptx
ย 
ppt by Mehak (Decoding Firewalls Types, Functions, And How To Select The Best...
ppt by Mehak (Decoding Firewalls Types, Functions, And How To Select The Best...ppt by Mehak (Decoding Firewalls Types, Functions, And How To Select The Best...
ppt by Mehak (Decoding Firewalls Types, Functions, And How To Select The Best...
ย 

More from priyanshamadhwal2

๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž
๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž
๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž
priyanshamadhwal2
ย 
๐“๐จ ๐ ๐ซ๐š๐ฌ๐ฉ ๐‘๐ข๐ฌ๐ค ๐ข๐ง ๐๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌ ๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ
๐“๐จ ๐ ๐ซ๐š๐ฌ๐ฉ ๐‘๐ข๐ฌ๐ค ๐ข๐ง ๐๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌ ๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ๐“๐จ ๐ ๐ซ๐š๐ฌ๐ฉ ๐‘๐ข๐ฌ๐ค ๐ข๐ง ๐๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌ ๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ
๐“๐จ ๐ ๐ซ๐š๐ฌ๐ฉ ๐‘๐ข๐ฌ๐ค ๐ข๐ง ๐๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌ ๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ
priyanshamadhwal2
ย 
IT_ Risk_ Identification_ CRISC_ Mind_ Map
IT_ Risk_ Identification_ CRISC_ Mind_ MapIT_ Risk_ Identification_ CRISC_ Mind_ Map
IT_ Risk_ Identification_ CRISC_ Mind_ Map
priyanshamadhwal2
ย 
Top_ 10_ Privacy_ Enhancing_ Technologies
Top_ 10_ Privacy_ Enhancing_ TechnologiesTop_ 10_ Privacy_ Enhancing_ Technologies
Top_ 10_ Privacy_ Enhancing_ Technologies
priyanshamadhwal2
ย 
Three core principles of CIA Triad confidentiality, integrity and availability
Three core principles of CIA Triad confidentiality, integrity and availabilityThree core principles of CIA Triad confidentiality, integrity and availability
Three core principles of CIA Triad confidentiality, integrity and availability
priyanshamadhwal2
ย 
Responsibilities of Data Protection Board DPB
Responsibilities of Data Protection Board DPBResponsibilities of Data Protection Board DPB
Responsibilities of Data Protection Board DPB
priyanshamadhwal2
ย 
Most Important Events IDs In Security Operations Center
Most Important Events IDs In Security Operations CenterMost Important Events IDs In Security Operations Center
Most Important Events IDs In Security Operations Center
priyanshamadhwal2
ย 
CISO 90 Days Plan Practical and Simple Roadmap
CISO 90 Days Plan Practical and Simple RoadmapCISO 90 Days Plan Practical and Simple Roadmap
CISO 90 Days Plan Practical and Simple Roadmap
priyanshamadhwal2
ย 
Types Of Network Attacks Safeguard your network against cyber threats
Types Of Network Attacks Safeguard your network against cyber threatsTypes Of Network Attacks Safeguard your network against cyber threats
Types Of Network Attacks Safeguard your network against cyber threats
priyanshamadhwal2
ย 
๐”๐ง๐ฅ๐จ๐œ๐ค ๐ญ๐ก๐ž ๐๐จ๐ฐ๐ž๐ซ ๐จ๐Ÿ ๐’๐ž๐œ๐ฎ๐ซ๐ž ๐‚๐จ๐๐ข๐ง๐ 
๐”๐ง๐ฅ๐จ๐œ๐ค ๐ญ๐ก๐ž ๐๐จ๐ฐ๐ž๐ซ ๐จ๐Ÿ ๐’๐ž๐œ๐ฎ๐ซ๐ž ๐‚๐จ๐๐ข๐ง๐ ๐”๐ง๐ฅ๐จ๐œ๐ค ๐ญ๐ก๐ž ๐๐จ๐ฐ๐ž๐ซ ๐จ๐Ÿ ๐’๐ž๐œ๐ฎ๐ซ๐ž ๐‚๐จ๐๐ข๐ง๐ 
๐”๐ง๐ฅ๐จ๐œ๐ค ๐ญ๐ก๐ž ๐๐จ๐ฐ๐ž๐ซ ๐จ๐Ÿ ๐’๐ž๐œ๐ฎ๐ซ๐ž ๐‚๐จ๐๐ข๐ง๐ 
priyanshamadhwal2
ย 
Level up your Email Security DKIM, SPF and DMARC
Level up your Email Security DKIM, SPF and DMARCLevel up your Email Security DKIM, SPF and DMARC
Level up your Email Security DKIM, SPF and DMARC
priyanshamadhwal2
ย 
How to protect yourself from online account takeovers
How to protect yourself from online account takeoversHow to protect yourself from online account takeovers
How to protect yourself from online account takeovers
priyanshamadhwal2
ย 
๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ž๐œ๐จ๐ฆ๐ž ๐š๐ง ๐ˆ๐“ ๐€๐ฎ๐๐ข๐ญ๐จ๐ซ: ๐€ ๐’๐ญ๐ž๐ฉ-๐›๐ฒ-๐’๐ญ๐ž๐ฉ ๐†๐ฎ๐ข๐๐ž
๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ž๐œ๐จ๐ฆ๐ž ๐š๐ง ๐ˆ๐“ ๐€๐ฎ๐๐ข๐ญ๐จ๐ซ: ๐€ ๐’๐ญ๐ž๐ฉ-๐›๐ฒ-๐’๐ญ๐ž๐ฉ ๐†๐ฎ๐ข๐๐ž๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ž๐œ๐จ๐ฆ๐ž ๐š๐ง ๐ˆ๐“ ๐€๐ฎ๐๐ข๐ญ๐จ๐ซ: ๐€ ๐’๐ญ๐ž๐ฉ-๐›๐ฒ-๐’๐ญ๐ž๐ฉ ๐†๐ฎ๐ข๐๐ž
๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ž๐œ๐จ๐ฆ๐ž ๐š๐ง ๐ˆ๐“ ๐€๐ฎ๐๐ข๐ญ๐จ๐ซ: ๐€ ๐’๐ญ๐ž๐ฉ-๐›๐ฒ-๐’๐ญ๐ž๐ฉ ๐†๐ฎ๐ข๐๐ž
priyanshamadhwal2
ย 
DNS _Cache_ Poisoning_ attack_Data_ Security
DNS _Cache_ Poisoning_ attack_Data_ SecurityDNS _Cache_ Poisoning_ attack_Data_ Security
DNS _Cache_ Poisoning_ attack_Data_ Security
priyanshamadhwal2
ย 
Understanding Types Of Ransomware and how to protect against it
Understanding Types Of Ransomware and how to protect against itUnderstanding Types Of Ransomware and how to protect against it
Understanding Types Of Ransomware and how to protect against it
priyanshamadhwal2
ย 
Audit Scenario Based Interview Questions
Audit Scenario Based Interview QuestionsAudit Scenario Based Interview Questions
Audit Scenario Based Interview Questions
priyanshamadhwal2
ย 
Everything about APT 29 ๐“๐ก๐ž ๐‚๐จ๐ณ๐ฒ ๐๐ž๐š๐ซ ๐„๐ง๐ข๐ ๐ฆ๐š
Everything about APT 29 ๐“๐ก๐ž ๐‚๐จ๐ณ๐ฒ ๐๐ž๐š๐ซ ๐„๐ง๐ข๐ ๐ฆ๐šEverything about APT 29 ๐“๐ก๐ž ๐‚๐จ๐ณ๐ฒ ๐๐ž๐š๐ซ ๐„๐ง๐ข๐ ๐ฆ๐š
Everything about APT 29 ๐“๐ก๐ž ๐‚๐จ๐ณ๐ฒ ๐๐ž๐š๐ซ ๐„๐ง๐ข๐ ๐ฆ๐š
priyanshamadhwal2
ย 
Certified Information Privacy Technologist Certification Training
Certified Information Privacy Technologist Certification TrainingCertified Information Privacy Technologist Certification Training
Certified Information Privacy Technologist Certification Training
priyanshamadhwal2
ย 
Security Operations Center scenario Interview based Questions
Security Operations Center scenario Interview based QuestionsSecurity Operations Center scenario Interview based Questions
Security Operations Center scenario Interview based Questions
priyanshamadhwal2
ย 
Data protection Officier Online Training
Data protection Officier Online TrainingData protection Officier Online Training
Data protection Officier Online Training
priyanshamadhwal2
ย 

More from priyanshamadhwal2 (20)

๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž
๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž
๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž
ย 
๐“๐จ ๐ ๐ซ๐š๐ฌ๐ฉ ๐‘๐ข๐ฌ๐ค ๐ข๐ง ๐๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌ ๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ
๐“๐จ ๐ ๐ซ๐š๐ฌ๐ฉ ๐‘๐ข๐ฌ๐ค ๐ข๐ง ๐๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌ ๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ๐“๐จ ๐ ๐ซ๐š๐ฌ๐ฉ ๐‘๐ข๐ฌ๐ค ๐ข๐ง ๐๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌ ๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ
๐“๐จ ๐ ๐ซ๐š๐ฌ๐ฉ ๐‘๐ข๐ฌ๐ค ๐ข๐ง ๐๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌ ๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ
ย 
IT_ Risk_ Identification_ CRISC_ Mind_ Map
IT_ Risk_ Identification_ CRISC_ Mind_ MapIT_ Risk_ Identification_ CRISC_ Mind_ Map
IT_ Risk_ Identification_ CRISC_ Mind_ Map
ย 
Top_ 10_ Privacy_ Enhancing_ Technologies
Top_ 10_ Privacy_ Enhancing_ TechnologiesTop_ 10_ Privacy_ Enhancing_ Technologies
Top_ 10_ Privacy_ Enhancing_ Technologies
ย 
Three core principles of CIA Triad confidentiality, integrity and availability
Three core principles of CIA Triad confidentiality, integrity and availabilityThree core principles of CIA Triad confidentiality, integrity and availability
Three core principles of CIA Triad confidentiality, integrity and availability
ย 
Responsibilities of Data Protection Board DPB
Responsibilities of Data Protection Board DPBResponsibilities of Data Protection Board DPB
Responsibilities of Data Protection Board DPB
ย 
Most Important Events IDs In Security Operations Center
Most Important Events IDs In Security Operations CenterMost Important Events IDs In Security Operations Center
Most Important Events IDs In Security Operations Center
ย 
CISO 90 Days Plan Practical and Simple Roadmap
CISO 90 Days Plan Practical and Simple RoadmapCISO 90 Days Plan Practical and Simple Roadmap
CISO 90 Days Plan Practical and Simple Roadmap
ย 
Types Of Network Attacks Safeguard your network against cyber threats
Types Of Network Attacks Safeguard your network against cyber threatsTypes Of Network Attacks Safeguard your network against cyber threats
Types Of Network Attacks Safeguard your network against cyber threats
ย 
๐”๐ง๐ฅ๐จ๐œ๐ค ๐ญ๐ก๐ž ๐๐จ๐ฐ๐ž๐ซ ๐จ๐Ÿ ๐’๐ž๐œ๐ฎ๐ซ๐ž ๐‚๐จ๐๐ข๐ง๐ 
๐”๐ง๐ฅ๐จ๐œ๐ค ๐ญ๐ก๐ž ๐๐จ๐ฐ๐ž๐ซ ๐จ๐Ÿ ๐’๐ž๐œ๐ฎ๐ซ๐ž ๐‚๐จ๐๐ข๐ง๐ ๐”๐ง๐ฅ๐จ๐œ๐ค ๐ญ๐ก๐ž ๐๐จ๐ฐ๐ž๐ซ ๐จ๐Ÿ ๐’๐ž๐œ๐ฎ๐ซ๐ž ๐‚๐จ๐๐ข๐ง๐ 
๐”๐ง๐ฅ๐จ๐œ๐ค ๐ญ๐ก๐ž ๐๐จ๐ฐ๐ž๐ซ ๐จ๐Ÿ ๐’๐ž๐œ๐ฎ๐ซ๐ž ๐‚๐จ๐๐ข๐ง๐ 
ย 
Level up your Email Security DKIM, SPF and DMARC
Level up your Email Security DKIM, SPF and DMARCLevel up your Email Security DKIM, SPF and DMARC
Level up your Email Security DKIM, SPF and DMARC
ย 
How to protect yourself from online account takeovers
How to protect yourself from online account takeoversHow to protect yourself from online account takeovers
How to protect yourself from online account takeovers
ย 
๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ž๐œ๐จ๐ฆ๐ž ๐š๐ง ๐ˆ๐“ ๐€๐ฎ๐๐ข๐ญ๐จ๐ซ: ๐€ ๐’๐ญ๐ž๐ฉ-๐›๐ฒ-๐’๐ญ๐ž๐ฉ ๐†๐ฎ๐ข๐๐ž
๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ž๐œ๐จ๐ฆ๐ž ๐š๐ง ๐ˆ๐“ ๐€๐ฎ๐๐ข๐ญ๐จ๐ซ: ๐€ ๐’๐ญ๐ž๐ฉ-๐›๐ฒ-๐’๐ญ๐ž๐ฉ ๐†๐ฎ๐ข๐๐ž๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ž๐œ๐จ๐ฆ๐ž ๐š๐ง ๐ˆ๐“ ๐€๐ฎ๐๐ข๐ญ๐จ๐ซ: ๐€ ๐’๐ญ๐ž๐ฉ-๐›๐ฒ-๐’๐ญ๐ž๐ฉ ๐†๐ฎ๐ข๐๐ž
๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ž๐œ๐จ๐ฆ๐ž ๐š๐ง ๐ˆ๐“ ๐€๐ฎ๐๐ข๐ญ๐จ๐ซ: ๐€ ๐’๐ญ๐ž๐ฉ-๐›๐ฒ-๐’๐ญ๐ž๐ฉ ๐†๐ฎ๐ข๐๐ž
ย 
DNS _Cache_ Poisoning_ attack_Data_ Security
DNS _Cache_ Poisoning_ attack_Data_ SecurityDNS _Cache_ Poisoning_ attack_Data_ Security
DNS _Cache_ Poisoning_ attack_Data_ Security
ย 
Understanding Types Of Ransomware and how to protect against it
Understanding Types Of Ransomware and how to protect against itUnderstanding Types Of Ransomware and how to protect against it
Understanding Types Of Ransomware and how to protect against it
ย 
Audit Scenario Based Interview Questions
Audit Scenario Based Interview QuestionsAudit Scenario Based Interview Questions
Audit Scenario Based Interview Questions
ย 
Everything about APT 29 ๐“๐ก๐ž ๐‚๐จ๐ณ๐ฒ ๐๐ž๐š๐ซ ๐„๐ง๐ข๐ ๐ฆ๐š
Everything about APT 29 ๐“๐ก๐ž ๐‚๐จ๐ณ๐ฒ ๐๐ž๐š๐ซ ๐„๐ง๐ข๐ ๐ฆ๐šEverything about APT 29 ๐“๐ก๐ž ๐‚๐จ๐ณ๐ฒ ๐๐ž๐š๐ซ ๐„๐ง๐ข๐ ๐ฆ๐š
Everything about APT 29 ๐“๐ก๐ž ๐‚๐จ๐ณ๐ฒ ๐๐ž๐š๐ซ ๐„๐ง๐ข๐ ๐ฆ๐š
ย 
Certified Information Privacy Technologist Certification Training
Certified Information Privacy Technologist Certification TrainingCertified Information Privacy Technologist Certification Training
Certified Information Privacy Technologist Certification Training
ย 
Security Operations Center scenario Interview based Questions
Security Operations Center scenario Interview based QuestionsSecurity Operations Center scenario Interview based Questions
Security Operations Center scenario Interview based Questions
ย 
Data protection Officier Online Training
Data protection Officier Online TrainingData protection Officier Online Training
Data protection Officier Online Training
ย 

Recently uploaded

Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
ย 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
ย 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
blueshagoo1
ย 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
khuleseema60
ย 
Bossa Nโ€™ Roll Records by Ismael Vazquez.
Bossa Nโ€™ Roll Records by Ismael Vazquez.Bossa Nโ€™ Roll Records by Ismael Vazquez.
Bossa Nโ€™ Roll Records by Ismael Vazquez.
IsmaelVazquez38
ย 
Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 9 Cแบข Nฤ‚M - GLOBAL SUCCESS - Nฤ‚M HแปŒC 2024-2025 - ...
Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 9 Cแบข Nฤ‚M - GLOBAL SUCCESS - Nฤ‚M HแปŒC 2024-2025 - ...Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 9 Cแบข Nฤ‚M - GLOBAL SUCCESS - Nฤ‚M HแปŒC 2024-2025 - ...
Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 9 Cแบข Nฤ‚M - GLOBAL SUCCESS - Nฤ‚M HแปŒC 2024-2025 - ...
Nguyen Thanh Tu Collection
ย 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
ย 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
ย 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
ย 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
ย 
Stack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 MicroprocessorStack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 Microprocessor
JomonJoseph58
ย 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
ย 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
ย 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
ย 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
ย 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
ย 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
ย 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
ย 
Bร€I TแบฌP Dแบ Y THรŠM TIแบพNG ANH LแปšP 7 Cแบข Nฤ‚M FRIENDS PLUS SรCH CHร‚N TRแปœI SรNG Tแบ O ...
Bร€I TแบฌP Dแบ Y THรŠM TIแบพNG ANH LแปšP 7 Cแบข Nฤ‚M FRIENDS PLUS SรCH CHร‚N TRแปœI SรNG Tแบ O ...Bร€I TแบฌP Dแบ Y THรŠM TIแบพNG ANH LแปšP 7 Cแบข Nฤ‚M FRIENDS PLUS SรCH CHร‚N TRแปœI SรNG Tแบ O ...
Bร€I TแบฌP Dแบ Y THรŠM TIแบพNG ANH LแปšP 7 Cแบข Nฤ‚M FRIENDS PLUS SรCH CHร‚N TRแปœI SรNG Tแบ O ...
Nguyen Thanh Tu Collection
ย 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
ย 

Recently uploaded (20)

Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
ย 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
ย 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
ย 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
ย 
Bossa Nโ€™ Roll Records by Ismael Vazquez.
Bossa Nโ€™ Roll Records by Ismael Vazquez.Bossa Nโ€™ Roll Records by Ismael Vazquez.
Bossa Nโ€™ Roll Records by Ismael Vazquez.
ย 
Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 9 Cแบข Nฤ‚M - GLOBAL SUCCESS - Nฤ‚M HแปŒC 2024-2025 - ...
Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 9 Cแบข Nฤ‚M - GLOBAL SUCCESS - Nฤ‚M HแปŒC 2024-2025 - ...Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 9 Cแบข Nฤ‚M - GLOBAL SUCCESS - Nฤ‚M HแปŒC 2024-2025 - ...
Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 9 Cแบข Nฤ‚M - GLOBAL SUCCESS - Nฤ‚M HแปŒC 2024-2025 - ...
ย 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
ย 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
ย 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
ย 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
ย 
Stack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 MicroprocessorStack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 Microprocessor
ย 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
ย 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
ย 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
ย 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
ย 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
ย 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
ย 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
ย 
Bร€I TแบฌP Dแบ Y THรŠM TIแบพNG ANH LแปšP 7 Cแบข Nฤ‚M FRIENDS PLUS SรCH CHร‚N TRแปœI SรNG Tแบ O ...
Bร€I TแบฌP Dแบ Y THรŠM TIแบพNG ANH LแปšP 7 Cแบข Nฤ‚M FRIENDS PLUS SรCH CHร‚N TRแปœI SรNG Tแบ O ...Bร€I TแบฌP Dแบ Y THรŠM TIแบพNG ANH LแปšP 7 Cแบข Nฤ‚M FRIENDS PLUS SรCH CHร‚N TRแปœI SรNG Tแบ O ...
Bร€I TแบฌP Dแบ Y THรŠM TIแบพNG ANH LแปšP 7 Cแบข Nฤ‚M FRIENDS PLUS SรCH CHร‚N TRแปœI SรNG Tแบ O ...
ย 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
ย 

Antivirus Vs Firewall

  • 1. @infosectrain ANTIVIRUS LET THE BATTLE BEGIN! FIREWALL Choose Your Cybersecurity Guardian
  • 2. www.infosectrain.com @infosectrain # l e a r n t o r i s e Controls the entry and exit points of the cyber fortress. Signature moves: Packet Filtering, Proxy Services, and Stateful Inspection. Firewall, the Gatekeeper! Specializing in identifying and vanquishing malware.. Signature moves: Signature-Based Detection, Behavioral Analysis, and Heuristic Power. Antivirus, the Defender!
  • 3. STRENGTHS Effective against various types of malware ANTIVIRUS Controls network access with precision Real-time scanning for constant vigilance Monitors and filters incoming/outgoing traffic Behavioral analysis to catch tricky threats Acts as a barrier against unauthorized access FIREWALL www.infosectrain.com @infosectrain # l e a r n t o r i s e
  • 4. WEAKNESSES May not be as effective against network-based attacks ANTIVIRUS Less effective against specific malware types Relies on signature databases, may miss new threats May not inspect encrypted traffic thoroughly Limited control over unauthorized access Limited in detecting malware embedded in files FIREWALL www.infosectrain.com @infosectrain # l e a r n t o r i s e
  • 5. FOUND THIS USEFUL? To Get More Insights Through Our FREE Courses | Workshops | eBooks | Checklists | Mock Tests LIKE SHARE FOLLOW