Free Essay

Firewalls & Anti Virus

In:

Submitted By bb03110825
Words 943
Pages 4
Firewalls help protect a network from malicious intent that can disrupt/totally destroy data or even your hard drive. There are hardware and software versions of firewalls.
• Software firewalls – programs that examine data pockets on a network to determine whether to forward them to their destination or block them. An example of this is two-way firewall is Zone Alarm.
• Hardware firewalls – protect the entire network typically found in broadband routers. It uses packet filtering to examine the header of the packet to determine its source and destination. This information is compared to a set of pre-defined or user created rules which determine whether the packet is to be forwarded or dropped. An example of a hardware firewalls are Linksys and Cisco routers.
Anti-virus software is software used to prevent, detect and remove malware such as worms, Trojan horses, computer viruses and hijackers. Examples include Microsoft Security Essentials and Windows Defender.
Disaster recovery is a process, policy, and/or procedure related to preparing for recovery or continuation of the technology infrastructure. This is vital to an organization after a natural or human-induced disaster. It is a subset of business continuity, focuses on the IT or technology systems that support business functions. The most common strategies for data protection are:
1. Backup recorded to a tape and sent off-site at regular intervals.
2. Backups make to a disk on site and automatically copied to offsite disks or made directly to offsite disks.
3. Replication of data to an offsite location, which overcomes the need to restore the data, often making use of storage area network technology.
4. Use of high availability systems which keep both the data and system replicated offsite. This enables continuous access to systems and data even after a disaster.
Periodic testing of backup restores is very important. It is needed to ensure the system works and your backup data is preserved and can be reached quickly to recover when something happens to your main backup location.
Cold sites are locations that are leased or bought. They come prewired for power with generators for backup and are ready for the hardware if there is a need to make the sites operational. This kind of site is the least expensive type of backup.
Hot sites are duplicates of the original site of the organization. They have full computer systems as well as near-complete backups of user data. Real time synchronization between the two sites may be used to completely mirror the data environment of the original site using wide area network links and specialized software. They exist so that the original organization can relocate after a disaster with minimal losses to normal operations. It will be up and running within a matter of hours or even less. This type of backup is the most expensive to operate.
Warm sites will have hardware connectivity already established on a smaller scale than the original production. They have backups on hand but may not be complete, maybe several days to a week old. An example would be backup tapes sent to the site by courier.
Full backup is the starting point for all other backups and contains all the data in the folders and files that have been selected to be backed up. Since full backup stores all files and folders frequent full backups result in faster, simpler restore operations and offer the best solution in data protection.
Differentials save the data input since the last full backup and has the advantage that a maximum of only two data sets are needed to restore the data. First you must perform a full backup, after that each differential backup made will contain all the changes since the last full backup.
Incremental backups make it more feasible to store backups from more points in time by organizing the data into increments of change between points in time. This eliminates the need to store duplicate copies of unchanged data. A full backup is made which serves as a reference point of an incremental backup set.
• Panda offers a free edition or paid versions which have trial offers.
• Norton offers paid versions with free trials.
• McAfee offers paid versions with 30 day free trials and free virus scan services.
• AVG offers free versions and paid versions with 30 day free trials.
• Kaspersky offers paid versions with 30 day free trials.
Trojan horse is a non-self-replicating type of malware which appears to perform a desirable function but instead drops a malicious payload, often including a backdoor allowing unauthorized access to the infected computer. They do not attempt to inject themselves into other files like a virus but may steal information and harm computers. They look like a sort of “social engineering” presenting themselves as harmless, useful gifts in order to persuade people to use them on their computers.
Drive by downloads are unintended downloads of computer software from the internet. This can be done in two different ways:
• Downloads which a person authorized but without understanding the consequences of the download. An example would be a download which installed an unknown executable program such as Active X or Java applet.
• Any download that happens without the person’s knowledge. This is often a computer virus, spyware, malware or crimeware. They may happen when visiting a website, viewing an email or clicking on a deceptive pop up window.
Malicious email attachments are deliberately drafted to cause problems on the server or the client. This could be due to the message containing a virus or the message being crafted in such a way as to take advantage of a weakness in the receiving mail client.

Similar Documents

Premium Essay

Kaspersky - Anti Virus

...considered to be external factors over which you have essentially no control. 2. FROM THE KL'S STANDPOINT, HOW WOULD YOU SEGMENT THE POTENTIAL MARKET FOR ANTI-VIRUS PRODUCTS? EVALUATE KL'S PERFORMANCES IN EACH OF THE SEGMENTS. Market segmentation is a marketing strategy that involves dividing a broad target market into subsets of consumers who have common needs and applications for the relevant goods and services. In relation to KL brand, their customer’s needs are similar, despite the country they live in. However, their behaviour can be different due to demographic reasons and therefore the brand should approach the consumers from different continents and countries differently, in order to not only meet their demand but also to know better each kind of customer. Its objective is Student’s name: Inês Joaquim, number 19562374 Teacher’s name: Gregor Pfajfar Page | 1 INTERNATIONAL BUSINESS LJUBLJANA, 5TH MARCH 2013 precisely match the expectations of customers to identify market niches. Despite almost every anti-virus products are similar to each other, by adopting this attitude, the company shows that they care about matching their consumer’s expectations. Beyond of geographical and demographical reasons the brand should also consider those customers who are experts or interested in software and anti-virus issues, these may represent a segment of the potential market. For those kinds of customers their marketing strategy as well as way to approach them must be surely...

Words: 1105 - Pages: 5

Free Essay

Kaspersky Lab

...Kaspersky Lab: from Russia with anti-virus I will analyze the study case by putting focus on three important questions and points. First I will perform the internal and external environment analysis that Kaspersky Lab faced in year 2011. The internal environment can further be categorized in strengths and weaknesses of the company. It is inevitably that such a successful, fast growing company relies on many strengths. KL had initiatives and tendency to attract and retain qualified employees. Their skills and competences helped to delivering high-quality services and products. The products and services offered are technologically superior. Beside quality, their abilities also contribute to early detection of various threats. It was the first company to identify major shift in hackers behavior. The company ability to motivate and reward its employees is just a one piece of the strength puzzle. Another key strength is innovation. The constant updates and their pace with the changes and trends in the market is a key advantage over the other competitors. Furthermore, KL was the first company to introduce hourly anti-virus updates, leaving the competitors lacking with only daily updates. An important strength which helped KL to be successful in foreign emerging markets were the localized solutions. KL has great ability to launch products which will satisfy the needs of a certain market. Another strength is their webpage, which offers free trials, information and guidance for the customers...

Words: 1437 - Pages: 6

Free Essay

Student

...Net-Worm.Win32.Kido.ih Detected | Feb 20 2009 07:04 GMT | Released | Apr 02 2009 16:24 GMT | Published | Feb 20 2009 07:04 GMT | Manual description Auto description This description was created by experts at Kaspersky Lab. It contains the most accurate information available about this program. Manual description Auto description This is a description which has been automatically generated following analysis of this program on a test machine. This description may contain incomplete or inaccurate information. Technical Details Payload Removal instructions Technical Details This network worm spreads via local networks and removable storage media. The program itself is a Windows PE DLL file. The worm components vary in size from 155KB to 165KB. It is packed using UPX. Installation The worm copies its executable file with random names as shown below: %System%\<rnd> %Program Files%\Internet Explorer\<rnd>.dll %Program Files%\Movie Maker\<rnd>.dll %All Users Application Data%\<rnd>.dll %Temp%\<rnd>.dll %Temp%\<rnd>.tmp <rnd> is a random string of symbols. In order to ensure that the worm is launched next time the system is started, it creates a system service which launches the worm’s executable file each time Windows is booted. The following registry key will be created: [HKLM\SYSTEM\CurrentControlSet\Services\netsvcs] ...

Words: 1158 - Pages: 5

Premium Essay

Nt1330 Unit 2 Assignment 1

...purpose of anti-virus protection is to detect malicious software; it does this by scanning files and software though the database, this is known as definition files. Anti-virus protection will protect the computer from malicious software and viruses. Malicious software is self-replicating so that anti-virus protection is used to stop this kind of software replicating. A virus will make the computer shut down, so anti-virus protection is put in place to prevent this from happening. There are different forms of viruses which anti-virus software prevents; these include adwok, malware and worms. Adwok are advertisements which users may see on websites they visit, for example you may visit a website like eBay, and then when you go on to...

Words: 1817 - Pages: 8

Free Essay

Topic Seminar

...accounts, software, and information in the World Wide Web. To explain the potential threats of hackers, virus, and malwares and how can we prevent it. To Understand: 1. To know the latest threats of hackers on people’s lives 2. Harmful effects of Malware, Virus and etc. to your device 3. The precautions of using the internet D. Length of time (1.5-2 hours) II. Seminar Rationale A. Why is it important to learn and understand the importance of internet security? There are hundreds thousands hacker attacks in the Philippines alone, and unsecured networks can leave you exposed to any types of virus. So it is important to learn and understand internet security so we can be sure next time we click that browser we’ll be safe. We can also learn very important things about different types of security such as firewalls and anti-virus software against any threat. Not only that, it can also help other IT programmers to make their own anti-virus. * Different ways on applying internet security It can be also applied on mobile or tablet operating systems since it has access on the net to let users know it can be attacked even using these types of device. It will let them know that they can still be protected using firewall and anti-virus software on their mobile devices. * To know the dangers of the internet The internet has a lot of harmful virus that can destroy your hardware, not just by downloading but also by connecting through a network. It is...

Words: 533 - Pages: 3

Free Essay

Evaluating the Security of Computer Networks

...Evaluating the Security of Computer Networks Security in Systems Architecture and Applications SE579 2 Table of Contents Evaluating the Security of Computer Networks I. Vulnerabilities A. Design Flaws B. Poor Security Management C. Incorrect Implementation II. Firewalls A. Packet Filtering B. Circuit Level Gateway Proxy Server C. Application Gateway III. Antivirus A. Scans IV. Intrusion Detection Systems V. Disadvantages VI. Conclusion 3 One of the major computing challenges in today’s economy is the lack of adequate security over the information computer networks, and internet applications in which business, government, and economy depend on. Businesses have become more dependent on information. The gathering, organizing, managing, finding, and analyzing of information are crucial to businesses. Computer viruses created by hackers cost businesses $55 billion in 2003. In 2011, a single instance of hacking on the Play Station cost Sony more than $170 million, while Google lost $500,000 due to hacking in 2005.(Coyne) 2003 Single instances of hacking may cost as much as $600,000 to $7m a day for...

Words: 2281 - Pages: 10

Premium Essay

Security Updates for Malware

...Malware and Anti-virus Protection Security for the remote sites needs to be a top priority, due to the recent Malware infection at one of the sites this is an area that needs to be addressed. The Anti-virus software on the client computers is another issue that needs to be updated. After discussing the situation with the different employees, the following recommendations should be implemented to ensure the future security of each of the sites. Recommendations include firewalls, software security for viruses and malware, and remote access for automatic updates. Firewalls are programs that keep out hackers, viruses, and worms from reaching the computers of employees. There are 2 types of firewalls, a hardware firewall and a software firewall. Commercial software firewalls are usually more powerful than those that come with the operating system. These are installed on each computer from a CD or by downloading it from the internet. Hardware firewalls is a physical device that attaches to the computer and is configured through a cable connection. A hardware router installed between client computers and the internet will help with external security issues. A software firewall should also be installed on each computer to prevent the spread of viruses that might infect the network if a computer becomes infected. Firewalls work by closing ports that are unused by the computers and regulating the traffic in ports that are used by the computer. Several firewalls programs are available...

Words: 1342 - Pages: 6

Premium Essay

Remote Access

...to the organizational network or computer systems and to prevent compromise or loss of data. Approval Any remote access using either dial-in, VPN, or any other remote access to the organizational network must be reviewed and approved by the appropriate supervisor. All employees by default will have account settings set to deny remote access. Only upon approval will the account settings be changed to allow remote access. Remote Computer Requirements 1. The anti-virus product is required to be operating on the computer at all times in real time protection mode. 2. The anti-virus library definitions shall be updated at least once per day. 3. Anti-virus scans shall be done a minimum of once per week. No one should be able to stop anti-virus definition updates and anti-virus scans except for domain administrators. 2. The computer must be protected by a firewall at all times when it is connected to the internet. Several popular choices include Zone Alarm, the Windows XP firewall, and Norton Personal firewall. Remote Connection Requirements The remote user shall use either dial-In or virtual private networking (VPN). Dial-In is typically used when the user in in a local calling area. VPN is typically used when the user would need to dial a long distance number to connect with a dial-in connection. VPN uses a local connection to an internet service provider (ISP) and creates a tunnel through the local ISP connection to the organizational network. This section specifies...

Words: 569 - Pages: 3

Premium Essay

Intro to Computer Security

...CSS150 – Introduction to Information Security Phase 5 Individual Project Kenneth A. Crawford Dr. Shawn P. Murray June 23, 2013 Table of Contents Phase 1 Discussion Board 2 3 Phase 1 Individual Project 5 Phase 2 Discussion Board 8 Richmond Investments: Remote Access Policy 8 Phase 2 Individual Project 11 Richmond Investments: LAN-to-WAN, Internet, and Web Surfing Acceptable Use Policy 11 Phase 3 Discussion Board: Blaster Worm 17 Phase 3 Individual Project 19 Phase 4 Individual Project: 4 Methods to Keeping Systems Secure 22 1. Keep all software up to date: 22 2. Surf the web cautiously: 22 3. Be cautious with e-mail: 22 4. Anti-Virus Software: 23 Phase 5 Individual Project: 4 Methods to Keeping Systems Secure 24 1. Firewalls: 24 2. System Backups: 24 3. Passwords: 25 4. File Sharing: 26 References 27 Phase 1 Discussion Board 2 The “Internal Use Only” (IUO) data classification includes all data and information not intended for public access. The best way to describe this classification is all company and client information that we do not want to see in a newspaper or on the internet. Some examples of this are: Client lists, Client account numbers, Human Resource files, Payroll files, E-Mails, and many others. This data classification affects all seven IT domains. The first and most important IT domain that the IUO affects is the “User Domain”. The users have to be taught general security and proper use of the systems...

Words: 5085 - Pages: 21

Premium Essay

Nt1310 Unit 1 Term Paper

...that might lead ABC Logistics to installing software could be that the older existing software may have bugs that are preventing the user from using the software as it is intended to. An update may also be installed when there are new features added, such as added security features that increase the systems security. Also with anti virus software it can be important to update the software as soon as an update is available, this is because new viruses are always being created meaning that it is important to always have the latest anti-virus installed. Often when a computer has its operating system upgraded the programmes that are installed also need to be upgraded as they may not support the current version of operating system, this could mean that the older anti-virus software is not supported on the newer operating system and so a full upgrade is required to a newer anti virus. The risks associated with installing the antivirus software can be that during the installation the system can become slower, and affect your productivity, if you are...

Words: 847 - Pages: 4

Premium Essay

Computer Viruses

...Computer Virus A computer virus is a malicious piece of executable code that propagates typically by attaching itself to a host document that will generally be an executable file. ✓ Typical hosts for computer viruses are: – Executable files (such as the ‘.exe’ files in Windows machines) that may be sent around as email attachments – Boot sectors of disk partitions – Script files for system administration (such as the batch files in Windows machines, shell script files in Unix, etc.) – Documents that are allowed to contain macros (such as Microsoft Word documents, Excel spreadsheets, Access database files, etc.) ✓ Any operating system that allows third-party programs to run can support viruses. ✓ Because of the way permissions work in Unix/Linux systems, it is more difficult for a virus to wreak havoc in such machines. Let’s say that a virus embedded itself into one of your script files. The virus code will execute only with the permissions that are assigned to you. For example, if you do not have the permission to read or modify a certain system file, the virus code will, in general, be constrained by the same restriction. ✓ At the least, a virus will duplicate itself when it attaches itself to another host document, that is, to another executable file. But the important thing to note is that this copy does not have to be an exact replica of itself. In order to make more difficult the detection by pattern matching, the virus may alter itself...

Words: 2382 - Pages: 10

Free Essay

E Commerce

...[MARCH 2016] Group No. 1: 1. Ngo Thi Mai Lan 2. Nguyen Ngoc Hao 3. Nguyen Thi Tho 4. Mai Thị Thu 5. Nguyen The Tu ASSIGNMENT FOR E-COMMERCE Questions: 1. What’s difference between the virus, worm, and Trojan horse? 2. How would you protect your firm against a Denial of Service (DoS) attack? 3. Explain why an e-commerce site might not want to report being target of cybercrimals? 4. Is a computer with anti-virus software protected from viruses? Why or why bother? 5. Why the value of stolen information which prices range in underground marketplace is so wide? Answer: 1. The difference between the virus, worm, and Trojan horse Viruses, Worms, and Trojan are all part of a class of software called malware. Malware or malicious code (malcode) is short for malicious software. It is code or software that is specifically designed to damage, disrupt, steal, or in general inflict some other “bad” or illegitimate action on data, hosts, or networks. There are many different classes of malware that have varying ways of infecting systems and propagating themselves. Malware can infect systems by being bundled with other programs or attached as macros to files. Others are installed by exploiting a known vulnerability in an operating system (OS), network device, or other software, such as a hole in a browser that only requires users to visit a website to infect their computers. The vast majority, however, are installed by some...

Words: 5058 - Pages: 21

Free Essay

Tb143 Lab 7 Security Basic

...Task 1: Firewall is software or hardware based network security system to protect between your computer network and the internet. Hardware firewalls are best suited to business and large networks, whereas Software firewalls are best suited for home use. Hardware firewalls is a small metal box so one could hook up to a computer network just like if you were to add a printer etc. Software firewalls gives you a level of protections from hackers and unwanted intrusions. Software firewalls packages has anti spam, antivirus, even anti-popup ads. There are also parental controls to manage what or certain websites your minor can visit. Barracuda Firewall is the newest Hardware. It has email, web, and network security. Barracuda provides intrusion prevention, virus scanning, content filtering, and reporting. Barracuda Firewall is perfect fit for small and medium sized businesses. Zone Alarm protect your PC from viruses and spyware, also has internet firewall, internet browser security and theft prevention, and email virus scan. This is example of a software firewall, great for home use. Task 2: Avg, and Panda offer Free anti-virus programs to protect your computer. Norton and Kaspersky offer trial run versions for a number of months then thereafter one could purchase the anti-virus program. Trojan horse programs is a type of file converters, but also it could install harmful programs such as spyware and rootkits. Malicious email attachments are a way for a sender to transmit files...

Words: 687 - Pages: 3

Premium Essay

Software Threat Analysis and Mitigation

...attacks can also overwrite software instructions (Gregory, 2010). Malicious software is a generalized term encompassing many forms of code with varying degrees of damage done to a host system. Some of the more common forms are viruses, worms, Trojan horses, spam, spyware/adware, and bots. All of these malicious codes attempt to gain access to your system to degrade your ability to perform as normal. Viruses attempt to corrupt your system so it is unusable, but must be activated by the user accessing a program with the virus attached. Worms are similar to viruses but do not require a user to access the infected program. Trojan horse files are code hiding behind a false name. Accessing the file will activate it and then the code will execute, stealing data, destroying files, are propagating itself by sending out false emails. An ongoing battle is waged against these forms of malicious code by anti-virus software programs. Purchasing, or downloading, an anti-virus package...

Words: 1151 - Pages: 5

Premium Essay

Network Security Essay

...INDIVIDUAL PROJECT 5 DARRIUS HUGHLEY 12-2-2012 Intro Even though there are some downfalls with having too strong of a firewall or polices; is not being able to access certain websites, databases, and not being able to access the internet or intranet at all that you normally access. The major downfall of having the proper network security is the cost of it. Examples of expenses are but not limited to software, sonic walls, firewalls, and even a trained professional to maintain it all. When it comes to security you will have to be numb about the expenses of it. Failure to keep your network secure and or well maintained could lead to costly consequences legal wise, and repairs. To avoid bad things from happening it would be wise to make this investment. Thesis Having a secured network is very crucial for today’s society. And also make sure that the network security is strong enough to prevent their information from being accessed by anyone other than them. Online privacy is another issue that we are facing as well. The Internet has given people the ability to shop, pay bills, and etc. And people and businesses need to make sure that their network are secured. Body Having a secured network will keep you safeguarded from threats. Threats such as security breaches, viruses and data loss are the main threats to a network. For example this virus called the Conflicker had affected late last year computers worldwide. What worries security experts is Conficker's ability...

Words: 1233 - Pages: 5