2. ANTIVIRUS
• Antivirus software is a program that actively searches for,
protects against, detects and removes viruses and malware,
such as trojans, adware and worms.
• An antivirus software checks every file that you download.
Whether it's a Word document, a ZIP file, a spreadsheet or
EXE file
• Antivirus software runs in the background, though, policing
everything
• If your antivirus software finds anything suspicious, it flags it
and lets you know. Then you can have the software
quarantine the virus or delete it.
3. KESPERSKY ANTIVIRUS
• Kaspersky Anti-Virus features include real-time protection,
detection and removal of viruses, trojans, worms, spyware,
adware, keyloggers, malicious tools and auto-dialers, as well
as detection and removal of rootkits. It also includes
instantaneous automatic updates via the "Kaspersky Security
Network" service.
• According to Kaspersky, "Kaspersky Security Network service
allows users of Kaspersky Lab security products from around
the world to help facilitate malware identification and reduce
the time it takes to provide protection against new (“in the
wild”) security risks targeting your computer.
4. FIREWALL
• In computing, a firewall is a network security system that
monitors and controls the incoming and outgoing
network traffic based on predetermined security rules.A
firewall typically establishes a barrier between a trusted,
secure internal network and untrusted outside network,
such as the Internet.
• Firewall appliances may also offer other functionality to
the internal network they protect, such as acting as a
DHCPor VPN server for that network.
5. CYBEROAM FIREWALL
• Cyberoam Technologies, a Sophos Company, is a global Network
Security appliances provider, with presence in more than 125
countries. The company offers User Identity-based network security
in its Firewalls/ Unified Threat Management appliances, allowing
visibility and granular control into users' activities in business
networks. For SOHO, SMB and large enterprise networks, this
ensures security built around the network user for protection against
APTs, insider threats, malware, hacker, and other sophisticated
network attacks.
• Cyberoam’s product range offers network security solution (Firewall
and UTM appliances), centralized security management (Cyberoam
Central Console appliances), centralized visibility (Cyberoam iView
), and Cyberoam NetGenie for home and small office networks.
6. ENCRYPTION
• In cryptography, encryption is the process of encoding a
message or information in such a way that only
authorized parties can access it. Encryption does not
itself prevent interference, but denies the intelligible
content to a would-be interceptor. In an encryption
scheme, the intended information or message, referred
to as plaintext, is encrypted using an encryption
algorithm – a cipher – generating ciphertext that can only
be read if decrypted. For technical reasons,
7. SOPHOS ENCRYPTION
• Sophos Group is a British security software and
hardware company. Sophos develops products for
communication endpoint, encryption, network security,
email security, mobile security and unified threat
management. Sophos is primarily focused on providing
security software to the mid market and pragmatic
enterprise from 100 to 5000 Seat organisations. Whilst
not a primary focus, Sophos also protects home users,
through a free anti virus software (Sophos Home)
intended to demonstrate product functionality.
8. WIFI ROUTERS
• A wireless router is the router found in a wireless local
area network (WLAN) for home and small office
networks. It enables Internet and local network access.
Typically, the wireless router is directly connected to a
wired or wireless WAN. Users connected to the wireless
router are able to access the LAN as well as the external
WAN, such as the Internet.
9. ARUBA ROUTERS
• Aruba, a Hewlett Packard Enterprise Company, is a
vendor of data networking solutions for enterprises and
businesses worldwide. Aruba Networks was founded in
2002 and is focused on bringing Wi-Fi wireless LAN
mobility solutions to enterprise networks.
10. IAS (INTERNET AUTHENTICATION SERVICE)
• Internet Authentication Service (IAS) is the Microsoft
implementation of a Remote Authentication Dial-in User
Service (RADIUS) server and proxy. IAS performs
centralized connection authentication, authorization,
accounting, and auditing (AAAA) for many types of
network access including wireless, authenticating switch,
and remote access dial-up and virtual private network
(VPN) connections
11. DIFFERENCE B/W ROUTERS & ACCESS POINT
• A Router is a device that routes packets across networks.
Thats all it does. If data from one computer is trying to get to
another computer that is not on the same logical network it
must be 'routed' to that network. Your home network is
different then your ISP's network thus a router is always the
last device that sits between you and your ISP.
• An Access Point is a device that allows other devices to
connect wirelessly. Its nothing more then an antenna. Access
points can be purchased on their own and plugged into a
wired switch or router to grant users wireless connectivity to
that device.
12. GOOGLE/GMAIL ADMIN CONSOLE
• The Google Admin Console is a management tool
provided by Google for G Suite administrators. It allows
administrators to maintain all their G Suite services from
one dashboard. With the Google Admin Console,
administrators can configure settings for G Suite, monitor
the usage of their domains, create user accounts, and
more.
• Some of the most common controls you will probably
use are Users, Groups, Admin Roles, Apps and Reports.
Other controls that are also included are Company
Profile, Domains, Billing, Security, Support, Migration,
Device Management, and App Engine Apps