CSCU Module 03 Protecting Systems Using Antiviruses.pdf

August 21, 2018 | Author: Sandeep Roy | Category: Antivirus Software, Computer Virus, Spyware, Malware, Secure Communication
Share Embed Donate


Short Description

Download CSCU Module 03 Protecting Systems Using Antiviruses.pdf...

Description

Protecting Systems Using  Antiviruses  Antivir uses Module 3

Simplifying Security. Simplifying  Security.

1

Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

3 March 2011, Thursday

Market for Antivirus Becoming Aggressive in North IT Market The need for protecting valuable data pushing the demand for antivirus products in Northern region. With explosion in the use of networks of networks and also increased use of internet of internet has definitely created a new conduit for computer viruses to spread at a rapid rate. Earlier viruses used executable files and would typically be no more than an annoyance by displaying harmless phrases. The latest viruses are much more sophisticated and able to cause extensive and irreparable damage to files. Some viruses are able to spread themselves to other computers on the Internet or network causing widespread damage to many systems. Thus to counterattack these problems and to keep up with the accompanying rise of malicious of malicious web activity a number of vendors of vendors are busy rolling out layers of updates of updates of Antivirus. of Antivirus. We at ITPV, contemplated in the Northern region about how the Antivirus vendors are doing, what is the demand, which segment is booming and whats the future of this of this technology. http://www.itvarnews.net 

2

Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

3 March 2011, Thursday

Market for Antivirus Becoming Aggressive in North IT Market The need for protecting valuable data pushing the demand for antivirus products in Northern region. With explosion in the use of networks of networks and also increased use of internet of internet has definitely created a new conduit for computer viruses to spread at a rapid rate. Earlier viruses used executable files and would typically be no more than an annoyance by displaying harmless phrases. The latest viruses are much more sophisticated and able to cause extensive and irreparable damage to files. Some viruses are able to spread themselves to other computers on the Internet or network causing widespread damage to many systems. Thus to counterattack these problems and to keep up with the accompanying rise of malicious of malicious web activity a number of vendors of vendors are busy rolling out layers of updates of updates of Antivirus. of Antivirus. We at ITPV, contemplated in the Northern region about how the Antivirus vendors are doing, what is the demand, which segment is booming and whats the future of this of this technology. http://www.itvarnews.net 

2

Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Module Objectives The Most Dangerous Computer Viruses of All of  All Time

How to Test if Antivirus if  Antivirus is Working?

Introduction to Antivirus Software

Choosing the Best Antivirus Software

How Does Antivirus Software Work?

Configuring McAfee Antivirus

Antivirus Software 2011

Configuring Kaspersky PURE

Steps to Install Antivirus on Your Computer

Antivirus Security Checklist

3

Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Module Flow Introduction to Antivirus Software

How Does Antivirus Software Work?

Steps to Install Antivirus

Choosing the Best Antivirus Software

Configuring McAfee Antivirus

Configuring Kaspersky PURE

4

Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

The Most Dangerous Computer Viruses of  All Time In the past few years, numerous PCs have been infected by computer viruses and there have been computer viruses that affected the global economic growth drastically The top 10 most destructive computer viruses of all time according to techweb:

CIH (1998) Estimated Damage: 20 to 80 million dollars worldwide, countless amounts of PC data destroyed. Unleashed from Taiwan in June of 1998

Blaster (2003) Estimated Damage: 2 to 10 billion dollars, hundreds of  thousands of infected PCs Sobig.F (2003) Estimated Damage: 5 to 10 billion dollars, over 1 million PCs infected

Melissa (1999) Estimated Damage: 300 to 600 million dollars ILOVEYOU (2000) Estimated Damage: 10 to 15 billion dollars

Bagle (2004) Estimated Damage: Tens of millions of dollars and counting

Code Red (2001) Estimated Damage: 2 billion and 600 million dollars (2.6B $)

MyDoom (2004) Estimated Damage: At its peak, slowed global Internet performance by 10 percent and Web load times by up to 50 percent

SQL Slammer (2003) Estimated Damage: Because SQL Slammer erupted on a Saturday, the damage was low in dollars and cents. However, it hit 500,000 servers world wide and actually shut down South Korea’s online capacity for 12 hours

Sasser (2004) Estimated Damage: Tens of millions of dollars

5

Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Introduction to Antivirus Software A computer connected to the Internet is always at high risk, and it is always recommended to install antivirus software on the system A computer virus can degrade the performance of a computer and can delete the stored computer data An antivirus program protects the computer against viruses, worms, spywares, Trojans, etc.

6

Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Need for Antivirus Program Today in the digital domain, loads of data is stored on computers and it has become significant to protect the data

When a PC is connected to the Internet, the PC has to combat different malicious programs such as viruses, worms, Trojans, spyware, adware

Cyber criminals such as attackers and hackers use these malicious programs as tools to steal important information such as personal data stored on the computer

These programs pose a severe threat to the computer and may destroy its functionality in different ways

Malicious programs pave their way into one’s PC through email attachments and spam email, through USB drives, visiting a fraudulent website, etc.

Due to the invasion of malicious programs in cyberspace, antivirus programs have become necessary for computers

If your computer has a good antivirus program installed, then the PC is protected and combat all types of malicious programs

7

Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Module Flow Introduction to Antivirus Software

How Does Antivirus Software Work?

Choosing the Best Antivirus Software

Steps to Install Antivirus

Configuring McAfee Antivirus

Configuring Kaspersky PURE

8

Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

How Does Antivirus Software Work? Most of the commercial antivirus software uses two techniques: Uses virus dictionary to look for known viruses while examining files Detects suspicious behavior from any computer program

Virus Dictionary Approach

Suspicious Behavior Approach

While examining the files the antivirus software refers to the dictionary of known viruses identified by the author of antivirus software

The antivirus software monitors the behavior of all the programs instead of  identifying the known viruses

If a bit of code in the file matches with that of any virus in the dictionary, then the antivirus software can either delete the file, repair the file by removing the virus, or quarantine it

Whenever a program with suspicious behavior is found the software alerts the user and asks what to do

9

Other Ways to Detect Viruses Antivirus software will try to emulate the beginning of  each new executable code that is being executed before transferring control to the executable If the program seems to be a virus or using self ‐modifying code then it immediately examines the other executable programs

Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

 Antivirus Software 2011

http://www.mcafee.com

http://free.avg.com

http://www.symantec.com

http://www.avast.com

http://www.kaspersky.com

http://www.vipreantivirus.com

http://www.comodo.com

http://www.bitdefender.com

http://www.pctools.com

http://www.eccouncil.org

10

Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Module Flow Introduction to Antivirus Software

How Does Antivirus Software Work?

Choosing the Best Antivirus Software

Steps to Install Antivirus

Configuring McAfee Antivirus

Configuring Kaspersky PURE

11

Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Choosing the Best Antivirus Software When purchasing an antivirus software, look for the various features and how they can best serve your needs The most important things to be considered are: Antivirus Scanning Antivirus Detection Accuracy Check for antivirus software that scans and detects viruses accurately and detects the majority of threats

Scanning Speed Check whether the antivirus software can perform the task quickly and efficiently

Resource Utilization Ensure that the antivirus software uses minimal system resources and does not affect system performance when performing a scan

12

Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Choosing the Best Antivirus Software Hacker Blocking This feature prevents other users from gaining unauthorized access and steal important data such as passwords and other confidential information

Bidirectional Firewall

Automatic Updates

Check whether the antivirus software is equipped with a software firewall or not to scan the both incoming and outgoing traffic

This feature keeps the user abreast of the latest online threats without the user having to visit the vendor’s website to stay up to date

Technical Support Look for good technical support so that issues are solved easily

Spyware Detection & Prevention

Parental Controls

Check for antispyware components to keep spyware at bay

Check for the parental control feature in the antivirus program that helps children browse the Internet safely

Email Scanning

Easy Installation (and Easy to Use)

E‐mail Protection can monitor POP and SMTP ports and ensures that your computer doesn't contain a threat to your computer

The anti virus software should be user friendly and easy‐to‐use

On Demand and Scheduled Scanning This options lets you schedule a scan according to user specified time. User schedule the scan daily, weekly or monthly

13

Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Module Flow Introduction to Antivirus Software

How Does Antivirus Software Work?

Choosing the Best Antivirus Software

Steps to Install Antivirus

Configuring McAfee Antivirus

Configuring Kaspersky PURE

14

Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Steps to Install Antivirus on Your Computer 1

Most of the antiviruses follow a wizard‐driven installation process and necessary components are installed in the system by default

2

Download the antivirus and launch the installation of  antivirus by double clicking the setup file

3

Agree to the legal agreement that might appear, click "I agree", and then click "Next" to continue

4

Review all the settings and click next until installation is finished

5

Once the installation process is finished, restart your computer

15

Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

How to Test if Antivirus is Working? Step‐by‐step procedure to test the antivirus program 1.

Open a notepad and copy the following code onto it, and save the notepad. X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR‐STANDARD‐ANTIVIRUS‐TEST‐FILE!$H+H*

2.

Rename the file from New Text Document.TXT to myfile.com

3.

Run the antivirus scan on this myfile.com file

4.

If  the antivirus is functioning properly, it generates a warning and immediately deletes the file

Note: Most antivirus will display a warning message in step 1

16

Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Module Flow Introduction to Antivirus Software

How Does Antivirus Software Work?

Choosing the Best Antivirus Software

Steps to Install Antivirus

Configuring McAfee Antivirus

Configuring Kaspersky PURE

17

Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Configuring McAfee Antivirus After selecting the Scan your PC option  Select any one of the available three scan types (Run a quick scan, Run a full scan, or Run a custom scan)

On the Main Security Center Console  click Real‐time Scanning  select  Scan your PC

18

Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Configuring McAfee Antivirus On the Main Security Center Console  click Real‐time Scanning  select Schedule Scan Settings and decide how often you want to scan  click Apply

After selecting the Schedule Scan Settings option  Real‐time Scanning Settings  select the file types, attachments, and locations that you want the antivirus to automatically scan and protect the computer from threats  click Apply

19

Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Module Flow Introduction to Antivirus Software

How Does Antivirus Software Work?

Choosing the Best Antivirus Software

Steps to Install Antivirus

Configuring McAfee Antivirus

Configuring Kaspersky PURE

20

Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Configuring Kaspersky PURE After successfully installing Kaspersky PURE, follow the steps to configure Kaspersky PURE Step 1: Activate the application For Kaspersky PURE to be fully functional, it needs to be activated

You can: Activate Commercial License with the purchased activation

code Activate Trial Version for the trial period of  30  days and get

acquainted with the possibilities of the program Activate Later, if you select activate later, the stage of   Kaspersky PURE activation will be skipped. The application

will be installed on your computer, but you will be able to update the application only once after its installation. To continue the activation process, click Next After the license is activated, click Next to proceed with the configuration

21

Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Configuring Kaspersky PURE

Step 2: System analysis The  Installation Wizard  analyzes the system information and creates rules for trusted applications that are included in the Windows operating system. Wait until the process is completed.

22

Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Configuring Kaspersky PURE Step 3: Completing installation When the installation is complete, Kaspersky PURE Configuration Wizard will prompt with a message The installation is complete:

Make sure the box Start Kaspersky PURE  is checked if you want to run the application immediately after the  Configuration Wizard is closed Clear the box Start Kaspersky PURE  if  you want to run the program later In order to close the  Configuration Wizard, click the  Finish button

23

Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Configuring Kaspersky PURE: Backup and Restore After configuring the Kaspersky PURE antivirus, launch the application and the program is ready for use

24

Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Configuring Kaspersky PURE: Backup and Restore To configure Backup, click Backup and Restore In Backup and Restore, click Create a backup task

25

Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Configuring Kaspersky PURE: Backup and Restore Select the location of the files and click Next  select the desired drive to store the backup files  click Next Specify a password to protect your data from unauthorized access and click Next

26

Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Configuring Kaspersky PURE: Backup and Restore Configure storing different versions of files and click  click Finish Next

27

Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Configuring Kaspersky PURE: Computer Protection Computer Protection components protect your computer against various threats, scan all system objects for viruses and vulnerabilities, and regularly update Kaspersky PURE antivirus databases and program modules

28

Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Configuring Kaspersky PURE: Parental Control To protect children and teenagers from threats related to computer and Internet usage, you should configure Parental Control settings for all users If you have no enabled password protection when installing the application at the first startup of Parental Control, it is recommended that you set a password to protect against unauthorized modification of the Control settings Now, you can enable Parental Control and impose restrictions on computer and Internet usage, and on instant messaging for all accounts on the computer

29

Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Kaspersky PURE: Administrative Tools Using the Administrative tools, a user can configure the operating system and eliminate system vulnerabilities to provide reliable data protection A user can: 1. Tune browser settings 2. Search for problems related to malware activity using the Microsoft Windows Settings Troubleshooting option 3. Permanently delete  data 4.   Delete  some unused data

5. Create a Rescue Disk to clean the system after a virus attack 6.   Erase user activity to protect the

privacy

30

Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Module Summary 

An antivirus program protects a computer against viruses, worms, spywares, and Trojans



A computer connected to the Internet is always at high risk and it is recommended to have antivirus software installed on the system

   Most



of the commercial antivirus software uses two techniques:



  Uses virus dictionary to look for known viruses while examining files



  Detects suspicious behavior from any computer program

In the virus dictionary approach, while examining the files, the antivirus software refers to the dictionary of known viruses identified by the software author

   Whenever

a program with suspicious behavior is found, the antivirus software alerts the user and asks what to do

31

Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF