A computer virus is a computer program that can copy itself and infect a computer. virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.
Viruses can be transmitted as attachments to an e-mail note or in a downloaded file, or be present on a diskette or CD. The immediate source of the e-mail note, downloaded file, or diskette you've received is usually unaware that it contains a virus.
A virus that replicates itself by resending itself as an e-mail attachment or as part of a network message is known as a worm.
File infector
Some file infector viruses attach themselves to program files, usually selected .COM or .EXE files. Some can infect any program. When the program is loaded, the virus is loaded as well. Other file infector viruses arrive as wholly-contained programs or scripts sent as an attachment to an e-mail note.
Micro virus
These are among the most common viruses, and they tend to do the least damage. Macro viruses infect your Microsoft Word application and typically insert unwanted words or phrases.
Computer Worm
A computer worm is a self-replicating malware computer program, which uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. This is due to security shortcomings on the target computer. Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.
Trojan Horse & trojan
A Trojan horse, or Trojan, is a destructive program that masquerades as an application. The software initially appears to perform a desirable function for the user prior to installation and/or execution, but (perhaps in addition to the expected function) steals information or harms the system. Unlike viruses or worms, Trojan horses do not replicate themselves, but they can be just as destructive.
Malware
Malware, short for malicious software, consists of programming (code, scripts, active content, and other software) designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access to system resources, and other abusive behavior
Spyware
Spyware is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically, spyware is secretly installed on the user's personal computer. Sometimes, however, spywares such as key loggers are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users.
Antivirus
“Antivirus" is protective software designed to defend your computer against malicious software. Malicious software, or "malware" includes: viruses, Trojans, keyloggers, hijackers, dialers, and other code that vandalizes or steals your computer contents. In order to be an effective defense, your antivirus software needs to run in the background at all times, and should be kept updated so it recognizes new versions of malicious software.
Antivirus products
On Demand scan
A type of antivirus program that actively scans your computer system for viruses only when prompted to do so by the computer user, or by scheduling it as a time-specific task. On-demand scanners, while used to scan hard drives can also be used to check removable storage devices before copying from those devices onto your system. Contrast with on-access scanner.
Scheduled Scan
The scheduled scan feature allows you to configure scans which will be run automatically at a specific date / time. Scheduled scans can also be run periodically. This allows you to run a particular scan at day wise or Weekly or Monthly
Diff between a scheduled and a manual scan
A manual scan is targeted at a single computer. A scheduled scan is targeted at all clients within the group that have been selected for scanning in the Console. Unlike scheduled scanning, manual scanning does not allow you to change the scanning parameters before you run the scan; the current selected settings in the "Scheduled Scanning Options" panel are used. If you do not want to use the default settings, we recommend using a scheduled scan rather than the "Scan" icon.
Real-time protection, On-Access Scan or Auto protect
Real-time protection, On-Access scanning, background guard, resident shield, auto protect, and other synonyms refer to the automatic protection provided by most antivirus, antispyware, and other antimalware programs, which is arguably their most important feature. This monitors computer systems for suspicious activity such as computer viruses, spyware, adware, and other malicious objects in 'real-time', in other words while data is coming into the computer (for example when inserting a CD, opening an email, or browsing the web) or when a file already on the computer is opened or executed, in other words loaded into the computer's active memory.
This means all data in files already on the computer is analyzed each time that the user attempts to access the files. This can prevent infection by not yet activated malware that entered the computer unrecognized before the antivirus received an update. Real-time protection and its synonyms are used in contrast to the expression “On-demand scan" or similar expressions that mean a user-activated scan of part or all of a computer.
Scan Action
Clean : Clean the files from Virus.
Delete : Delete the entire file affected with Virus.
Quarantine : To move an infected file, such as a virus, into an area where it cannot cause more harm. Antivirus software's come with quarantine options so that the user also can keep track of virus activity.
Application Control
IT application or program controls are fully automated (i.e., performed automatically by the systems) designed to ensure the complete and accurate processing of data, from input through output. These controls vary based on the business purpose of the specific application. These controls may also help ensure the privacy and security of data transmitted between applications.
Categories of IT application controls may include:
Completeness checks - controls that ensure all records were processed from initiation to completion.
Validity checks - controls that ensure only valid data is input or processed.
Identification - controls that ensure all users are uniquely and irrefutably identified.
Authentication - controls that provide an authentication mechanism in the application system.
Authorization - controls that ensure only approved business users have access to the application system.
Input controls - controls that ensure data integrity fed from upstream sources into the application system.
Device Control
Device Control is a policy-based endpoint security solution that enables network administrators to centrally control uploading and downloading activity through local computer devices. With Device Control you can lock out unauthorized users from USB and FireWire devices, Wi-Fi and Bluetooth adapters, CD-ROM and floppy drives, infrared, serial and parallel ports, local and network printers, PDAs, smartphones and many other plug-and-play devices.
Logs
Device Control is a policy-based endpoint security solution that enables network administrators to centrally control uploading and downloading activity through local computer devices. With Device Control you can lock out unauthorized users from USB and FireWire devices, Wi-Fi and Bluetooth adapters, CD-ROM and floppy drives, infrared, serial and parallel ports, local and network printers, PDAs, smartphones and many other plug-and-play devices.
Viruses can be transmitted as attachments to an e-mail note or in a downloaded file, or be present on a diskette or CD. The immediate source of the e-mail note, downloaded file, or diskette you've received is usually unaware that it contains a virus.
A virus that replicates itself by resending itself as an e-mail attachment or as part of a network message is known as a worm.
Virus is classified into seven types:
- File infectors
- System or boot-record infectors
- Macro viruses
- Computer worm
- Trojan horse, or Trojan
- Malware
- Spyware
File infector
Some file infector viruses attach themselves to program files, usually selected .COM or .EXE files. Some can infect any program. When the program is loaded, the virus is loaded as well. Other file infector viruses arrive as wholly-contained programs or scripts sent as an attachment to an e-mail note.
Micro virus
These are among the most common viruses, and they tend to do the least damage. Macro viruses infect your Microsoft Word application and typically insert unwanted words or phrases.
Computer Worm
A computer worm is a self-replicating malware computer program, which uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. This is due to security shortcomings on the target computer. Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.
Trojan Horse & trojan
A Trojan horse, or Trojan, is a destructive program that masquerades as an application. The software initially appears to perform a desirable function for the user prior to installation and/or execution, but (perhaps in addition to the expected function) steals information or harms the system. Unlike viruses or worms, Trojan horses do not replicate themselves, but they can be just as destructive.
Malware
Malware, short for malicious software, consists of programming (code, scripts, active content, and other software) designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access to system resources, and other abusive behavior
Spyware
Spyware is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically, spyware is secretly installed on the user's personal computer. Sometimes, however, spywares such as key loggers are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users.
Antivirus
“Antivirus" is protective software designed to defend your computer against malicious software. Malicious software, or "malware" includes: viruses, Trojans, keyloggers, hijackers, dialers, and other code that vandalizes or steals your computer contents. In order to be an effective defense, your antivirus software needs to run in the background at all times, and should be kept updated so it recognizes new versions of malicious software.
Antivirus products
- Symantec
- McAfee
- TrendMicro
- MicrosoftForeFont
- Sophos
- Avg
- Avast
On Demand scan
A type of antivirus program that actively scans your computer system for viruses only when prompted to do so by the computer user, or by scheduling it as a time-specific task. On-demand scanners, while used to scan hard drives can also be used to check removable storage devices before copying from those devices onto your system. Contrast with on-access scanner.
Scheduled Scan
The scheduled scan feature allows you to configure scans which will be run automatically at a specific date / time. Scheduled scans can also be run periodically. This allows you to run a particular scan at day wise or Weekly or Monthly
Diff between a scheduled and a manual scan
A manual scan is targeted at a single computer. A scheduled scan is targeted at all clients within the group that have been selected for scanning in the Console. Unlike scheduled scanning, manual scanning does not allow you to change the scanning parameters before you run the scan; the current selected settings in the "Scheduled Scanning Options" panel are used. If you do not want to use the default settings, we recommend using a scheduled scan rather than the "Scan" icon.
Real-time protection, On-Access Scan or Auto protect
Real-time protection, On-Access scanning, background guard, resident shield, auto protect, and other synonyms refer to the automatic protection provided by most antivirus, antispyware, and other antimalware programs, which is arguably their most important feature. This monitors computer systems for suspicious activity such as computer viruses, spyware, adware, and other malicious objects in 'real-time', in other words while data is coming into the computer (for example when inserting a CD, opening an email, or browsing the web) or when a file already on the computer is opened or executed, in other words loaded into the computer's active memory.
This means all data in files already on the computer is analyzed each time that the user attempts to access the files. This can prevent infection by not yet activated malware that entered the computer unrecognized before the antivirus received an update. Real-time protection and its synonyms are used in contrast to the expression “On-demand scan" or similar expressions that mean a user-activated scan of part or all of a computer.
Scan Action
Clean : Clean the files from Virus.
Delete : Delete the entire file affected with Virus.
Quarantine : To move an infected file, such as a virus, into an area where it cannot cause more harm. Antivirus software's come with quarantine options so that the user also can keep track of virus activity.
Application Control
IT application or program controls are fully automated (i.e., performed automatically by the systems) designed to ensure the complete and accurate processing of data, from input through output. These controls vary based on the business purpose of the specific application. These controls may also help ensure the privacy and security of data transmitted between applications.
Categories of IT application controls may include:
Completeness checks - controls that ensure all records were processed from initiation to completion.
Validity checks - controls that ensure only valid data is input or processed.
Identification - controls that ensure all users are uniquely and irrefutably identified.
Authentication - controls that provide an authentication mechanism in the application system.
Authorization - controls that ensure only approved business users have access to the application system.
Input controls - controls that ensure data integrity fed from upstream sources into the application system.
Device Control
Device Control is a policy-based endpoint security solution that enables network administrators to centrally control uploading and downloading activity through local computer devices. With Device Control you can lock out unauthorized users from USB and FireWire devices, Wi-Fi and Bluetooth adapters, CD-ROM and floppy drives, infrared, serial and parallel ports, local and network printers, PDAs, smartphones and many other plug-and-play devices.
Logs
Device Control is a policy-based endpoint security solution that enables network administrators to centrally control uploading and downloading activity through local computer devices. With Device Control you can lock out unauthorized users from USB and FireWire devices, Wi-Fi and Bluetooth adapters, CD-ROM and floppy drives, infrared, serial and parallel ports, local and network printers, PDAs, smartphones and many other plug-and-play devices.
0 comments :
Post a Comment