Antivirus software.
Antivirus or anti-virus software is used to prevent, detect, and remove computer viruses, worms, and Trojan horses. It may also prevent and remove adware, spy ware, and other forms of malware. This page talks about the software used for the prevention and removal of such threats, rather than computer security implemented by software methods.A variety of strategies are typically employed. Signature-based detection involves searching for known patterns of data within executable code. However, it is possible for a computer to be infected with new malware for which no signature is yet known. To counter such so-called zero-day threats, heuristics can be used. One type of heuristic approach, generic signatures, can identify new viruses or variants of existing viruses by looking for known malicious code, or slight variations of such code, in files. Some anti-virus software can also predict what a file will do by running it in a sandbox and analyzing what it does to see if it performs any malicious actions.
No matter how useful antivirus software can be, it can sometimes have drawbacks. Antivirus software can impair a computer's performance. Inexperienced users may also have trouble understanding the prompts and decisions that antivirus software presents them with. An incorrect decision may lead to a security breach. If the antivirus software employs heuristic detection, success depends on achieving the right balance between false positives and false negatives. False positives can be as destructive as false negatives. Finally, antivirus software generally runs at the highly trusted kernel level of the operating system, creating a potential avenue of attact.
***********************************************************************************
COMMENTS :
Anti-virus are very important to those who own laptop or computer,this is because to prevent the unwanted software attacks. There are many types of software attacks such as Trojan horses, logic bombs,and back doors.
- Viruses - Segments of computer code that performs unintended actions ranging from merely annoying to destructive.
- Trojan horses - Software programs that hide in other computer programs and reveal their designed behaviour only when they are attractive.
- Back Doors - Typically a password, known only to the attacker, that allows access to the system without having to go through any security.
- Denial of Services - An attacker send so many information request to a target system that the target cannot handle them successfully and can crash the entire system.
No comments:
Post a Comment