SlideShare a Scribd company logo
ANTIVIRUS PROGRAMS

           PRESENTED
                   BY
                        ILAKIA
INTRODUCTION

One of the most high profile threats to information integrity is
Network viruses. Network viruses are software that behaves like
biological viruses—they attach themselves to a host and replicate,
spreading the infection. For a computer program to be classified as
a virus, it simply must replicate itself. In this paper (Antivirus
programs and Security Terms), I am presenting what are terms and
viruses,   worms,   security   terms   which    are   provide    in
E-Commerce website to from hackers.
VIRUS

A self-replicating program.

A piece of software code that inserts itself into a host,
including the operating systems, in order to propagate; it
requires that its host program be run to activate it

Often Viruses require a host, and their goal is to infect other
files so that the virus can live longer.
WORMS
A software program that runs independently, consuming the
resources of its host in order to maintain itself, that is capable
of propagating a complete working version of itself onto
another machine.
Worms are insidious because they rely less (or not at all) upon
human behavior in order to spread themselves from one
computer to others.

Especially JAVA – BASED applets found on web sites could
easily contain viruses.
TORJAN HORSE

A program that appears to have a useful function but that
contains a hidden function that presents a security risk.

A new variant of a Trojan program that stole tens of thousands of
stolen identities from 125 countries that the victims believed were
collected by a legitimate company
THE NATURE OF VIRUSES
 A computer virus carries in its instructional code the capability
   for making copies of itself.
 The typical virus takes temporary control of a computer’s disk
   OS.
 Whenever the infected computer comes into contact with an
   uninfected piece of software, a fresh copy of the virus passes
   into the new program.
 The infection can be spread from computer to computer by
   unsuspecting user, who access the website and send programs
   on a network.
 The virus can do anything that other program do;
 The only difference is that it attaches itself to another program
   and executes secretly every time when the host program is run.
 Unfortunately, after a virus is executing, it can perform any
   function, such as erasing files and programs.
 The simple virus only infect the programs might work something
   like this:
 Find the first program instruction.

 Replace it with a jump to the memory location following the
   last instruction in program.

 Insert a copy of the virus code at that location.

 Have the virus simulate the instruction replace by jump.

 Jump back to the second instruction of the host program.

 Finish executing the host program.
COUNTERING THE THREAT
      OF VIRUS

 The basic solution for the thread of viruses is prevention:

   do not allow a virus to get into the system in the first place.

 This goal is impossible to achieve, although prevention can

   reduce the number of successful viral attacks.

 The next best approach is to do following:
 DETECTION
After the infection has occurred, determine that it
        has occurred and locate the virus.
 PURGING
Remove the virus from all infected systems so that
        the disease cannot spread further.
 RECOVERY
Recover any lost data or programs from the user
                 host system
SECURITY TEAMS
 The issue of network and internet security have become
increasingly more important as more and more businesses and people
go on-line.

 Teams of people have formed to assist on solving hacker attacks
and to disseminate information on security attacks and how to
prevent them.
 Two such teams are

       Computer Emergency Response Team (CERT)

       Forum of Incident Response and Security Teams
         (FIRST)
COMPUTER EMERGENCY
 RESPONSE TEAM (CERT)
 The Computer Emergency Response Team (CERT) exists as a
point of contact for suspect security problems related to the
Internet.

 CERT can help determine the scope of the threat and
recommend and appropriate response.

 A World Wide         Web page supplied by the Software
Engineering Institute Posts CERT advisories.
 The Web Page is located at http://www.sei.cmu.edu.

 CERT can also be accessed via anonymous FTP from
info.cert.org.

 If you choose, you can also be added to Cert’s mailing list;
send mail to cert-advisory-request@cert.org.
FORUM OF INCIDENT RESPONSE AND
    SECURITY TEAMS (FIRST)

 Security threats are problem that affect computers and networks
around the world.

 FIRST is made up of a variety of Computer Emergency Response
Teams including teams from government, business and academic sectors.

 FIRST plan to cultivate cooperation and coordination between teams
in a attempt to decrease reaction time to security incidents and promote
information sharing among team members.

 The FIRST is made up of the following teams.
CERT-NT    SURFnet Response      Netherlands
           Team
AUSCERT    Australian Computer Australia
           Emergency Response
           Team
DFN-CERT   German Federal        USA
           Networks CERT
CIAC       DOE Computer          USA
           Incident Advisory
           Capability
NASIRC     NASA Automated        USA
           Systems Incident
           Response Capability
VA                  U.S. Veterans Health   USA
                    Administration
SWITCH-CERT         Swiss Academic and     Switzerland
                    Research Network
                    CERT
SUNSeT              Stanford University    USA
                    Security Team
PCERT               Purdue University      USA
                    Computer
                    Emergency Response
                    Team
CERT Coordination   CERT Coordination      USA
Center              Center
SECURITY TIPS

 Use protection software "anti-virus software" and keep it up to
  date.
 Don't open email from unknown sources.
 Use hard-to-guess passwords.
 Protect your computer from Internet intruders -- use "firewalls".
 Don't share access to your computers with strangers. Learn about file
   sharing risks.
 Back up your computer data.
Antivirus programs and Security Teams in E-Commerce by Ilakia

More Related Content

What's hot

A presentation on forward engineering
A presentation on forward engineeringA presentation on forward engineering
A presentation on forward engineering
GTU
 
Morphological operations
Morphological operationsMorphological operations
Intoduction to software engineering part 1
Intoduction to software engineering part 1Intoduction to software engineering part 1
Intoduction to software engineering part 1
Rupesh Vaishnav
 
Amenaza seguridad informatica
Amenaza  seguridad informaticaAmenaza  seguridad informatica
Amenaza seguridad informatica
ninguna
 
Software project management Software economics
Software project management Software economicsSoftware project management Software economics
Software project management Software economics
REHMAT ULLAH
 
Security auditing architecture
Security auditing architectureSecurity auditing architecture
Security auditing architecture
Vishnupriya T H
 
Knowledge based systems
Knowledge based systemsKnowledge based systems
Knowledge based systems
Yowan Rdotexe
 
Evolving role of Software,Legacy software,CASE tools,Process Models,CMMI
Evolving role of Software,Legacy software,CASE tools,Process Models,CMMIEvolving role of Software,Legacy software,CASE tools,Process Models,CMMI
Evolving role of Software,Legacy software,CASE tools,Process Models,CMMI
nimmik4u
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
Sheetal Verma
 
Metrics for project size estimation
Metrics for project size estimationMetrics for project size estimation
Metrics for project size estimation
Nur Islam
 
Neural network
Neural networkNeural network
Neural network
Silicon
 
cyber quiz
cyber quizcyber quiz
cyber quiz
Himank_Singh
 
3.abstract (computer forensic)
3.abstract (computer forensic)3.abstract (computer forensic)
3.abstract (computer forensic)
JIEMS Akkalkuwa
 
Comparing Software Quality Assurance Techniques And Activities
Comparing Software Quality Assurance Techniques And ActivitiesComparing Software Quality Assurance Techniques And Activities
Comparing Software Quality Assurance Techniques And Activities
Lemia Algmri
 
Free Space Management, Efficiency & Performance, Recovery and NFS
Free Space Management, Efficiency & Performance, Recovery and NFSFree Space Management, Efficiency & Performance, Recovery and NFS
Free Space Management, Efficiency & Performance, Recovery and NFS
United International University
 
Target language in compiler design
Target language in compiler designTarget language in compiler design
Target language in compiler design
Muhammad Haroon
 
Unit 4
Unit 4Unit 4
Image Restoration (Digital Image Processing)
Image Restoration (Digital Image Processing)Image Restoration (Digital Image Processing)
Image Restoration (Digital Image Processing)
Kalyan Acharjya
 
Chapter 2. Digital Image Fundamentals.pdf
Chapter 2. Digital Image Fundamentals.pdfChapter 2. Digital Image Fundamentals.pdf
Chapter 2. Digital Image Fundamentals.pdf
DngThanh44
 
Malware and security
Malware and securityMalware and security
Malware and security
Gurbakash Phonsa
 

What's hot (20)

A presentation on forward engineering
A presentation on forward engineeringA presentation on forward engineering
A presentation on forward engineering
 
Morphological operations
Morphological operationsMorphological operations
Morphological operations
 
Intoduction to software engineering part 1
Intoduction to software engineering part 1Intoduction to software engineering part 1
Intoduction to software engineering part 1
 
Amenaza seguridad informatica
Amenaza  seguridad informaticaAmenaza  seguridad informatica
Amenaza seguridad informatica
 
Software project management Software economics
Software project management Software economicsSoftware project management Software economics
Software project management Software economics
 
Security auditing architecture
Security auditing architectureSecurity auditing architecture
Security auditing architecture
 
Knowledge based systems
Knowledge based systemsKnowledge based systems
Knowledge based systems
 
Evolving role of Software,Legacy software,CASE tools,Process Models,CMMI
Evolving role of Software,Legacy software,CASE tools,Process Models,CMMIEvolving role of Software,Legacy software,CASE tools,Process Models,CMMI
Evolving role of Software,Legacy software,CASE tools,Process Models,CMMI
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Metrics for project size estimation
Metrics for project size estimationMetrics for project size estimation
Metrics for project size estimation
 
Neural network
Neural networkNeural network
Neural network
 
cyber quiz
cyber quizcyber quiz
cyber quiz
 
3.abstract (computer forensic)
3.abstract (computer forensic)3.abstract (computer forensic)
3.abstract (computer forensic)
 
Comparing Software Quality Assurance Techniques And Activities
Comparing Software Quality Assurance Techniques And ActivitiesComparing Software Quality Assurance Techniques And Activities
Comparing Software Quality Assurance Techniques And Activities
 
Free Space Management, Efficiency & Performance, Recovery and NFS
Free Space Management, Efficiency & Performance, Recovery and NFSFree Space Management, Efficiency & Performance, Recovery and NFS
Free Space Management, Efficiency & Performance, Recovery and NFS
 
Target language in compiler design
Target language in compiler designTarget language in compiler design
Target language in compiler design
 
Unit 4
Unit 4Unit 4
Unit 4
 
Image Restoration (Digital Image Processing)
Image Restoration (Digital Image Processing)Image Restoration (Digital Image Processing)
Image Restoration (Digital Image Processing)
 
Chapter 2. Digital Image Fundamentals.pdf
Chapter 2. Digital Image Fundamentals.pdfChapter 2. Digital Image Fundamentals.pdf
Chapter 2. Digital Image Fundamentals.pdf
 
Malware and security
Malware and securityMalware and security
Malware and security
 

Viewers also liked

ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
abhijit chintamani
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
m8817
 
Virus
VirusVirus
386sum08ch8
386sum08ch8386sum08ch8
386sum08ch8
virtualmemory
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
Anuj Pawar
 
Unit 8 powerpoint complete
Unit 8 powerpoint completeUnit 8 powerpoint complete
Unit 8 powerpoint complete
danpeerice
 
Virus y antivirus
Virus y antivirusVirus y antivirus
Virus y antivirus
Cristian Tovar
 
Virus y-antivirus-ppt leonardo
Virus y-antivirus-ppt leonardoVirus y-antivirus-ppt leonardo
Virus y-antivirus-ppt leonardo
maikel maikelramirez
 
Eamonn O Raghallaigh The Major Security Issues In E Commerce
Eamonn O Raghallaigh   The Major Security Issues In E CommerceEamonn O Raghallaigh   The Major Security Issues In E Commerce
Eamonn O Raghallaigh The Major Security Issues In E Commerce
EamonnORagh
 
Computer Viruses and Protections
Computer Viruses and ProtectionsComputer Viruses and Protections
Computer Viruses and Protections
casyrichard
 
Hardware
HardwareHardware
Hardware
MrsNunn
 
Privacy and E-Commerce
Privacy and E-CommercePrivacy and E-Commerce
Privacy and E-Commerce
Aleksandr Yampolskiy
 
Counter Measures Of Virus
Counter Measures Of VirusCounter Measures Of Virus
Counter Measures Of Virus
shusrusha
 
Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce  Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce
Titas Ahmed
 
Copy of the benefits and barriers of e business1
Copy of the benefits and barriers of e business1Copy of the benefits and barriers of e business1
Copy of the benefits and barriers of e business1
nam126
 
Unit 8 ecommerce p1
Unit 8   ecommerce p1Unit 8   ecommerce p1
Unit 8 ecommerce p1
IronCheese
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
shashank kurakula
 
Intruders
IntrudersIntruders
Intruders
techn
 
Antivirus
AntivirusAntivirus
Antivirus
ava & araf co.
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
nikkinikhita
 

Viewers also liked (20)

ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
Virus
VirusVirus
Virus
 
386sum08ch8
386sum08ch8386sum08ch8
386sum08ch8
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
Unit 8 powerpoint complete
Unit 8 powerpoint completeUnit 8 powerpoint complete
Unit 8 powerpoint complete
 
Virus y antivirus
Virus y antivirusVirus y antivirus
Virus y antivirus
 
Virus y-antivirus-ppt leonardo
Virus y-antivirus-ppt leonardoVirus y-antivirus-ppt leonardo
Virus y-antivirus-ppt leonardo
 
Eamonn O Raghallaigh The Major Security Issues In E Commerce
Eamonn O Raghallaigh   The Major Security Issues In E CommerceEamonn O Raghallaigh   The Major Security Issues In E Commerce
Eamonn O Raghallaigh The Major Security Issues In E Commerce
 
Computer Viruses and Protections
Computer Viruses and ProtectionsComputer Viruses and Protections
Computer Viruses and Protections
 
Hardware
HardwareHardware
Hardware
 
Privacy and E-Commerce
Privacy and E-CommercePrivacy and E-Commerce
Privacy and E-Commerce
 
Counter Measures Of Virus
Counter Measures Of VirusCounter Measures Of Virus
Counter Measures Of Virus
 
Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce  Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce
 
Copy of the benefits and barriers of e business1
Copy of the benefits and barriers of e business1Copy of the benefits and barriers of e business1
Copy of the benefits and barriers of e business1
 
Unit 8 ecommerce p1
Unit 8   ecommerce p1Unit 8   ecommerce p1
Unit 8 ecommerce p1
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Intruders
IntrudersIntruders
Intruders
 
Antivirus
AntivirusAntivirus
Antivirus
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
 

Similar to Antivirus programs and Security Teams in E-Commerce by Ilakia

Issues and precautions related to ict
Issues and precautions related to ictIssues and precautions related to ict
Issues and precautions related to ict
makanaya
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
Vikas Chandwani
 
Presentation2
Presentation2Presentation2
Presentation2
Jeslynn
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
Maryam Malik
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
Satria Ady Pradana
 
Virus
VirusVirus
Virus
dddaou
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
Harshal Joshi
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
Satria Ady Pradana
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
zain Ul abadin
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
Virus project
Virus projectVirus project
Virus project
Shehrevar Davierwala
 
VIRUS BY CHIRO
VIRUS BY CHIROVIRUS BY CHIRO
VIRUS BY CHIRO
Takagi Kun
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
AnzaDar3
 
Technical Report Writing Presentation
Technical Report Writing PresentationTechnical Report Writing Presentation
Technical Report Writing Presentation
Ghazanfar Latif (Gabe)
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Rabab Munawar
 
Ch19
Ch19Ch19
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
Sagilasagi1
 
virus
virusvirus
Computer virus
Computer virusComputer virus
Computer virus
Hemn Amin
 
Virus
VirusVirus

Similar to Antivirus programs and Security Teams in E-Commerce by Ilakia (20)

Issues and precautions related to ict
Issues and precautions related to ictIssues and precautions related to ict
Issues and precautions related to ict
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Presentation2
Presentation2Presentation2
Presentation2
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
Virus
VirusVirus
Virus
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Virus project
Virus projectVirus project
Virus project
 
VIRUS BY CHIRO
VIRUS BY CHIROVIRUS BY CHIRO
VIRUS BY CHIRO
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Technical Report Writing Presentation
Technical Report Writing PresentationTechnical Report Writing Presentation
Technical Report Writing Presentation
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Ch19
Ch19Ch19
Ch19
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
virus
virusvirus
virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus
VirusVirus
Virus
 

Recently uploaded

Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
Chevonnese Chevers Whyte, MBA, B.Sc.
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
BoudhayanBhattachari
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
ssuser13ffe4
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 

Recently uploaded (20)

Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 

Antivirus programs and Security Teams in E-Commerce by Ilakia

  • 1. ANTIVIRUS PROGRAMS PRESENTED BY ILAKIA
  • 2. INTRODUCTION One of the most high profile threats to information integrity is Network viruses. Network viruses are software that behaves like biological viruses—they attach themselves to a host and replicate, spreading the infection. For a computer program to be classified as a virus, it simply must replicate itself. In this paper (Antivirus programs and Security Terms), I am presenting what are terms and viruses, worms, security terms which are provide in E-Commerce website to from hackers.
  • 3. VIRUS A self-replicating program. A piece of software code that inserts itself into a host, including the operating systems, in order to propagate; it requires that its host program be run to activate it Often Viruses require a host, and their goal is to infect other files so that the virus can live longer.
  • 4. WORMS A software program that runs independently, consuming the resources of its host in order to maintain itself, that is capable of propagating a complete working version of itself onto another machine.
  • 5. Worms are insidious because they rely less (or not at all) upon human behavior in order to spread themselves from one computer to others. Especially JAVA – BASED applets found on web sites could easily contain viruses.
  • 6. TORJAN HORSE A program that appears to have a useful function but that contains a hidden function that presents a security risk. A new variant of a Trojan program that stole tens of thousands of stolen identities from 125 countries that the victims believed were collected by a legitimate company
  • 7. THE NATURE OF VIRUSES  A computer virus carries in its instructional code the capability for making copies of itself.  The typical virus takes temporary control of a computer’s disk OS.  Whenever the infected computer comes into contact with an uninfected piece of software, a fresh copy of the virus passes into the new program.  The infection can be spread from computer to computer by unsuspecting user, who access the website and send programs on a network.
  • 8.  The virus can do anything that other program do;  The only difference is that it attaches itself to another program and executes secretly every time when the host program is run.  Unfortunately, after a virus is executing, it can perform any function, such as erasing files and programs.  The simple virus only infect the programs might work something like this:
  • 9.  Find the first program instruction.  Replace it with a jump to the memory location following the last instruction in program.  Insert a copy of the virus code at that location.  Have the virus simulate the instruction replace by jump.  Jump back to the second instruction of the host program.  Finish executing the host program.
  • 10. COUNTERING THE THREAT OF VIRUS  The basic solution for the thread of viruses is prevention: do not allow a virus to get into the system in the first place.  This goal is impossible to achieve, although prevention can reduce the number of successful viral attacks.  The next best approach is to do following:
  • 11.  DETECTION After the infection has occurred, determine that it has occurred and locate the virus.
  • 12.  PURGING Remove the virus from all infected systems so that the disease cannot spread further.
  • 13.  RECOVERY Recover any lost data or programs from the user host system
  • 14.
  • 15. SECURITY TEAMS  The issue of network and internet security have become increasingly more important as more and more businesses and people go on-line.  Teams of people have formed to assist on solving hacker attacks and to disseminate information on security attacks and how to prevent them.
  • 16.  Two such teams are  Computer Emergency Response Team (CERT)  Forum of Incident Response and Security Teams (FIRST)
  • 17. COMPUTER EMERGENCY RESPONSE TEAM (CERT)  The Computer Emergency Response Team (CERT) exists as a point of contact for suspect security problems related to the Internet.  CERT can help determine the scope of the threat and recommend and appropriate response.  A World Wide Web page supplied by the Software Engineering Institute Posts CERT advisories.
  • 18.  The Web Page is located at http://www.sei.cmu.edu.  CERT can also be accessed via anonymous FTP from info.cert.org.  If you choose, you can also be added to Cert’s mailing list; send mail to cert-advisory-request@cert.org.
  • 19. FORUM OF INCIDENT RESPONSE AND SECURITY TEAMS (FIRST)  Security threats are problem that affect computers and networks around the world.  FIRST is made up of a variety of Computer Emergency Response Teams including teams from government, business and academic sectors.  FIRST plan to cultivate cooperation and coordination between teams in a attempt to decrease reaction time to security incidents and promote information sharing among team members.  The FIRST is made up of the following teams.
  • 20. CERT-NT SURFnet Response Netherlands Team AUSCERT Australian Computer Australia Emergency Response Team DFN-CERT German Federal USA Networks CERT CIAC DOE Computer USA Incident Advisory Capability NASIRC NASA Automated USA Systems Incident Response Capability
  • 21. VA U.S. Veterans Health USA Administration SWITCH-CERT Swiss Academic and Switzerland Research Network CERT SUNSeT Stanford University USA Security Team PCERT Purdue University USA Computer Emergency Response Team CERT Coordination CERT Coordination USA Center Center
  • 22. SECURITY TIPS  Use protection software "anti-virus software" and keep it up to date.  Don't open email from unknown sources.  Use hard-to-guess passwords.  Protect your computer from Internet intruders -- use "firewalls".  Don't share access to your computers with strangers. Learn about file sharing risks.  Back up your computer data.