SlideShare a Scribd company logo
A S E M I N A R
ANTIVIRUS SOFTWARE
INTRODUCTION
 Antivirus software is defined as a software used to
prevent, detect and remove all sorts of malware such
as computer viruses, hijackers, Trojan horses, etc.
HISTORY
 Most of the viruses in early and mid 1980’s had
limited self-reproduction and spread initially by
storage devices such as floppy disks, before internet
connection was wide spread.
 The first anti-virus introduced was Flushshot plus
and Anti4us in 1987.
 John McAfee and Eugene Kaspersky found their own
antivirus software and later setup their companies in
1988.
IDENTIFICATION METHODS
There are various methods used by antivirus software
to identify malware:
 Signature based tools: Most commonly used method
to identify viruses and other malware, antivirus
software compares the contents of a file to a
directory of virus signatures. The entire file is
searched both as whole as well as in pieces.
They are considered very basic and insufficient to
be counter today’s malware practices.
IDENTIFICATION METHODS
 Heuristics: It is the most required detection method
present in antivirus software.
Heuristic is a technique designed for solving a
problem more quickly when classic methods are too
slow or fail.
Some anti-viruses are difficult to detect as they
start of as a single infection and later change into
many variants. Heuristics is a method invented to
counter them.
IDENTIFICATION METHODS
 Root kit detection: Root kit is one of the dangerous
malware designed to gain administration-level
control over the computer without detection.
They change the way operating systems function
and tamper the antivirus software, leaving it
ineffective.
The latest antivirus software are being added with
root kit detection.
IDENTIFICATION METHODS
 Real-time protection: Background
guard, Auto-protect , Risky-website
testing, etc are some other antivirus
protection provided by antivirus
software.
POPULAR ANTIVIRUSES
 Kaspersky Lab
 McAfee Virus Scan
 Avira Antivirus Software
 Avast! Antivirus Software
 AVG Antivirus and Internet Security
 Norton Antivirus Software
 Panda Antivirus Software
PROS OF ANTIVIRUS SOFTWARE
Protection from Malware.
Protection from Spyware and Identity Theft.
Protection from Spam.
Protects Important Documents.
Provides legal implication.
ISSUES OF ANTIVIRUS SOFTWARE
Unexpected renewal costs: Some commercial
antivirus software end-user license agreements
include a clause that the subscription will be
automatically renewed, and the purchaser’s credit
card automatically billed, at the renewal time
without explicit approval.
For e.g., McAfee requires users to unsubscribe at
least 60 days before the expiration of the present
subscription.
ISSUES OF ANTIVIRUS SOFTWARE
Rouge security applications: Some apparent
antivirus programs are actually malware
masquerading as legitimate software, such as
WinFixer, MS Antivirus, and Mac Defender.
ISSUES OF ANTIVIRUS SOFTWARE
Problems caused by false positives: A “false
positive” is when antivirus software identifies a non-
malicious file as virus. It can cause serious problems.
For e.g., if an antivirus program is configured to
immediately delete or quarantine infected files, a
false positive in an essential file can render an OS or
some applications useless.
ISSUES OF ANTIVIRUS SOFTWARE
System and interoperability related issues:
Running multiple antivirus programs concurrently
can degrade performance and create conflicts.
However, using a concept called multi-
scanning, several companies (including G Data and
Microsoft) have created applications which can
multiple engines concurrently.
ISSUES OF ANTIVIRUS SOFTWARE
Effectiveness: The effectiveness of antivirus
software has decreased. Detection rates for threats
had dropped from 40-50% in 2006 to 20-30% in
2007.
The problem is magnified by changing intent of
the authors.
ISSUES OF ANTIVIRUS SOFTWARE
New viruses: Anti-virus programs are not always
effective against new viruses.
Even those that use non-signature-based
methods that should detect viruses.
ISSUES OF ANTIVIRUS SOFTWARE
Root-kits: Root-kits have full administrative access to
the computer and are invisible to users and are hidden
from running processes in the task manager.
Root-kits can modify the inner workings of an
operating system and tamper with anti-virus programs.
ISSUES OF ANTIVIRUS SOFTWARE
Damaged files: Files which have been damaged by
computer viruses are normally damaged beyond
recovery.
Antivirus software removes the virus code from the file
during disinfection, but this does not always restore the
file in undamaged state.
ISSUES OF ANTIVIRUS SOFTWARE
Firmware Issues:
Active antivirus
software can interfere
with a firmware update
process.
Any writable firmware
in the computer can be
infected with a
malicious code.
CONCLUSION
 Anti-virus software is very useful to day-to-day users
to protect their storage devices and computers from
malware.
 There is much antivirus software available in the
market with it’s own pros and cons.
 The antivirus software has many issues that need to
be dealt with.
 Other than antivirus software, there are many other
methods available to protect devices such as network
firewall, specialist tools, etc.
REFERENCES
 Antivirus Software, Wikipedia.
 Comparison of Antivirus Software, Wikipedia.
 The Art of Computer Virus Research and
Defense, Peter Szor.
THANK YOU

More Related Content

What's hot

Computer Virus
Computer VirusComputer Virus
Computer Virus
Rajah Anuragavan
 
Computer virus
Computer virusComputer virus
Computer virus
Shubham Kafle
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
aritradutta22
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Computer virus
Computer virusComputer virus
Computer virus
Priti Singh
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
zain Ul abadin
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Alfred George
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
shashank kurakula
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
Mahamudul Hassan Niaz
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
Vikas Chandwani
 
Computer virus
Computer virusComputer virus
Computer virusHemn Amin
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
Sowjanya Sampathkumar
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
Eva Harshita
 
MALWARE
MALWAREMALWARE
MALWARE
Anupam Das
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
SimiAttri
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
Leonor Costa
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
Saud G
 

What's hot (20)

Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Computer virus
Computer virusComputer virus
Computer virus
 
What is malware
What is malwareWhat is malware
What is malware
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
MALWARE
MALWAREMALWARE
MALWARE
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 

Viewers also liked

Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
shohrabkhan
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?
culltdueet65
 
Anti Virus Software
Anti Virus SoftwareAnti Virus Software
Anti Virus Software
Fatima Reema Sarael
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
khalid umer
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
Shreya Singireddy
 
Anti Virus Software
Anti Virus SoftwareAnti Virus Software
Anti Virus Software
Pradeepkrajyaguru
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
Divyesh Rakholiya
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virusYogesh Singh Rawat
 
anti-virus
anti-virusanti-virus
anti-virusnandocas
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpointkmtschida
 

Viewers also liked (14)

Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?
 
Anti Virus Software
Anti Virus SoftwareAnti Virus Software
Anti Virus Software
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Anti Virus Software
Anti Virus SoftwareAnti Virus Software
Anti Virus Software
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
anti-virus
anti-virusanti-virus
anti-virus
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpoint
 
Avira Antivirus2
Avira Antivirus2Avira Antivirus2
Avira Antivirus2
 

Similar to Antivirus software

11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
singhhp10699
 
Anti virus software
Anti virus softwareAnti virus software
Anti virus software
harsh gajipara
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
UmairFirdous
 
How do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfHow do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdf
Blogger
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirus
sandipslides
 
Antivirus
AntivirusAntivirus
Antivirus
Meti Liona
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirus
sandipslides
 
Antivirus And Malware Protection
Antivirus And Malware ProtectionAntivirus And Malware Protection
Antivirus And Malware Protection
reasonsecurity
 
How Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfHow Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdf
Blogger
 
antivirus software.pptx
antivirus software.pptxantivirus software.pptx
antivirus software.pptx
dianemullin2
 
Virus and Anti virus
Virus and Anti virusVirus and Anti virus
Virus and Anti virus
Faisal Hassan
 
Software Antivirus.pdf
Software Antivirus.pdfSoftware Antivirus.pdf
Software Antivirus.pdf
Expertprinter Solutions
 
Software Antivirus.ppt
Software Antivirus.pptSoftware Antivirus.ppt
Software Antivirus.ppt
Expertprinter Solutions
 
Computer Virus_Athi-1.pdf
Computer Virus_Athi-1.pdfComputer Virus_Athi-1.pdf
Computer Virus_Athi-1.pdf
AthiraKrishnan57
 
Kaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya Connect 2011 - Malwarebytes - Marcin KleczynskiKaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya Connect 2011 - Malwarebytes - Marcin KleczynskiKaseya
 
Ch. 3 computer virus
Ch. 3 computer virusCh. 3 computer virus
Ch. 3 computer virus
Computer Science
 
Malware
MalwareMalware
Malware Protection Week5Part4-IS Revision Fall2013 .docx
Malware Protection  Week5Part4-IS Revision Fall2013 .docxMalware Protection  Week5Part4-IS Revision Fall2013 .docx
Malware Protection Week5Part4-IS Revision Fall2013 .docx
infantsuk
 

Similar to Antivirus software (20)

11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
Anti virus software
Anti virus softwareAnti virus software
Anti virus software
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
How do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfHow do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdf
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirus
 
Antivirus
AntivirusAntivirus
Antivirus
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirus
 
Antivirus And Malware Protection
Antivirus And Malware ProtectionAntivirus And Malware Protection
Antivirus And Malware Protection
 
How Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfHow Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdf
 
antivirus software.pptx
antivirus software.pptxantivirus software.pptx
antivirus software.pptx
 
Virus and Anti virus
Virus and Anti virusVirus and Anti virus
Virus and Anti virus
 
Software Antivirus.pdf
Software Antivirus.pdfSoftware Antivirus.pdf
Software Antivirus.pdf
 
Software Antivirus.ppt
Software Antivirus.pptSoftware Antivirus.ppt
Software Antivirus.ppt
 
Avast! antivirus protection
Avast! antivirus protectionAvast! antivirus protection
Avast! antivirus protection
 
Computer Virus_Athi-1.pdf
Computer Virus_Athi-1.pdfComputer Virus_Athi-1.pdf
Computer Virus_Athi-1.pdf
 
Kaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya Connect 2011 - Malwarebytes - Marcin KleczynskiKaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
 
Ch. 3 computer virus
Ch. 3 computer virusCh. 3 computer virus
Ch. 3 computer virus
 
Antivirus
AntivirusAntivirus
Antivirus
 
Malware
MalwareMalware
Malware
 
Malware Protection Week5Part4-IS Revision Fall2013 .docx
Malware Protection  Week5Part4-IS Revision Fall2013 .docxMalware Protection  Week5Part4-IS Revision Fall2013 .docx
Malware Protection Week5Part4-IS Revision Fall2013 .docx
 

More from Shreya Singireddy

Simplify Your Analytics Strategy
Simplify Your Analytics StrategySimplify Your Analytics Strategy
Simplify Your Analytics Strategy
Shreya Singireddy
 
Making Advanced Analytics Work for You
Making Advanced Analytics Work for YouMaking Advanced Analytics Work for You
Making Advanced Analytics Work for You
Shreya Singireddy
 
What People Analytics Can’t Capture
What People Analytics Can’t CaptureWhat People Analytics Can’t Capture
What People Analytics Can’t Capture
Shreya Singireddy
 
The New Patterns of Innovation
The New Patterns of InnovationThe New Patterns of Innovation
The New Patterns of Innovation
Shreya Singireddy
 
Marketers flunk the Big Data test
Marketers flunk the Big Data testMarketers flunk the Big Data test
Marketers flunk the Big Data test
Shreya Singireddy
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
Shreya Singireddy
 
Firewalls
FirewallsFirewalls
Clouds
CloudsClouds
Computer forensics
Computer forensicsComputer forensics
Computer forensics
Shreya Singireddy
 
Firewalls
FirewallsFirewalls

More from Shreya Singireddy (10)

Simplify Your Analytics Strategy
Simplify Your Analytics StrategySimplify Your Analytics Strategy
Simplify Your Analytics Strategy
 
Making Advanced Analytics Work for You
Making Advanced Analytics Work for YouMaking Advanced Analytics Work for You
Making Advanced Analytics Work for You
 
What People Analytics Can’t Capture
What People Analytics Can’t CaptureWhat People Analytics Can’t Capture
What People Analytics Can’t Capture
 
The New Patterns of Innovation
The New Patterns of InnovationThe New Patterns of Innovation
The New Patterns of Innovation
 
Marketers flunk the Big Data test
Marketers flunk the Big Data testMarketers flunk the Big Data test
Marketers flunk the Big Data test
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Firewalls
FirewallsFirewalls
Firewalls
 
Clouds
CloudsClouds
Clouds
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Firewalls
FirewallsFirewalls
Firewalls
 

Recently uploaded

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 

Recently uploaded (20)

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 

Antivirus software

  • 1. A S E M I N A R ANTIVIRUS SOFTWARE
  • 2. INTRODUCTION  Antivirus software is defined as a software used to prevent, detect and remove all sorts of malware such as computer viruses, hijackers, Trojan horses, etc.
  • 3. HISTORY  Most of the viruses in early and mid 1980’s had limited self-reproduction and spread initially by storage devices such as floppy disks, before internet connection was wide spread.  The first anti-virus introduced was Flushshot plus and Anti4us in 1987.  John McAfee and Eugene Kaspersky found their own antivirus software and later setup their companies in 1988.
  • 4. IDENTIFICATION METHODS There are various methods used by antivirus software to identify malware:  Signature based tools: Most commonly used method to identify viruses and other malware, antivirus software compares the contents of a file to a directory of virus signatures. The entire file is searched both as whole as well as in pieces. They are considered very basic and insufficient to be counter today’s malware practices.
  • 5.
  • 6. IDENTIFICATION METHODS  Heuristics: It is the most required detection method present in antivirus software. Heuristic is a technique designed for solving a problem more quickly when classic methods are too slow or fail. Some anti-viruses are difficult to detect as they start of as a single infection and later change into many variants. Heuristics is a method invented to counter them.
  • 7.
  • 8. IDENTIFICATION METHODS  Root kit detection: Root kit is one of the dangerous malware designed to gain administration-level control over the computer without detection. They change the way operating systems function and tamper the antivirus software, leaving it ineffective. The latest antivirus software are being added with root kit detection.
  • 9.
  • 10. IDENTIFICATION METHODS  Real-time protection: Background guard, Auto-protect , Risky-website testing, etc are some other antivirus protection provided by antivirus software.
  • 11. POPULAR ANTIVIRUSES  Kaspersky Lab  McAfee Virus Scan  Avira Antivirus Software  Avast! Antivirus Software  AVG Antivirus and Internet Security  Norton Antivirus Software  Panda Antivirus Software
  • 12.
  • 13. PROS OF ANTIVIRUS SOFTWARE Protection from Malware. Protection from Spyware and Identity Theft. Protection from Spam. Protects Important Documents. Provides legal implication.
  • 14. ISSUES OF ANTIVIRUS SOFTWARE Unexpected renewal costs: Some commercial antivirus software end-user license agreements include a clause that the subscription will be automatically renewed, and the purchaser’s credit card automatically billed, at the renewal time without explicit approval. For e.g., McAfee requires users to unsubscribe at least 60 days before the expiration of the present subscription.
  • 15.
  • 16. ISSUES OF ANTIVIRUS SOFTWARE Rouge security applications: Some apparent antivirus programs are actually malware masquerading as legitimate software, such as WinFixer, MS Antivirus, and Mac Defender.
  • 17. ISSUES OF ANTIVIRUS SOFTWARE Problems caused by false positives: A “false positive” is when antivirus software identifies a non- malicious file as virus. It can cause serious problems. For e.g., if an antivirus program is configured to immediately delete or quarantine infected files, a false positive in an essential file can render an OS or some applications useless.
  • 18. ISSUES OF ANTIVIRUS SOFTWARE System and interoperability related issues: Running multiple antivirus programs concurrently can degrade performance and create conflicts. However, using a concept called multi- scanning, several companies (including G Data and Microsoft) have created applications which can multiple engines concurrently.
  • 19.
  • 20. ISSUES OF ANTIVIRUS SOFTWARE Effectiveness: The effectiveness of antivirus software has decreased. Detection rates for threats had dropped from 40-50% in 2006 to 20-30% in 2007. The problem is magnified by changing intent of the authors.
  • 21. ISSUES OF ANTIVIRUS SOFTWARE New viruses: Anti-virus programs are not always effective against new viruses. Even those that use non-signature-based methods that should detect viruses.
  • 22. ISSUES OF ANTIVIRUS SOFTWARE Root-kits: Root-kits have full administrative access to the computer and are invisible to users and are hidden from running processes in the task manager. Root-kits can modify the inner workings of an operating system and tamper with anti-virus programs.
  • 23. ISSUES OF ANTIVIRUS SOFTWARE Damaged files: Files which have been damaged by computer viruses are normally damaged beyond recovery. Antivirus software removes the virus code from the file during disinfection, but this does not always restore the file in undamaged state.
  • 24. ISSUES OF ANTIVIRUS SOFTWARE Firmware Issues: Active antivirus software can interfere with a firmware update process. Any writable firmware in the computer can be infected with a malicious code.
  • 25. CONCLUSION  Anti-virus software is very useful to day-to-day users to protect their storage devices and computers from malware.  There is much antivirus software available in the market with it’s own pros and cons.  The antivirus software has many issues that need to be dealt with.  Other than antivirus software, there are many other methods available to protect devices such as network firewall, specialist tools, etc.
  • 26. REFERENCES  Antivirus Software, Wikipedia.  Comparison of Antivirus Software, Wikipedia.  The Art of Computer Virus Research and Defense, Peter Szor.