SlideShare a Scribd company logo
1 of 18
Presented by:
                                  Ajit Kumar Pradhan
                   090101ITR006
                7th Sem IT
After INTERNET has evolved it had given a
sophisticate increase on the general computer
user as well as the malicious code writer, who
has changed the backbone of internet
architecture for their futuristic use & produced
billions of malicious codes throughout the web.
For defending these many billions of advance
technological codes we use a outdated
technology called as Antivirus. Is it sufficient ?
Lets see……
   In 1969 the term ‘virus’ – Dr. David Gerrold.
   In 1971 ‘Creeper virus‘ detected by-ARPANET.
   In between 1974-79 some virus like Webbit
    ,Animal ,Shockwave rider.
   "Elk Cloner" first personal computer virus "in
    the wild“ in 1981.
   Claimed by John McAfee in 1983.
   Mr. Fred Cohen published 1st educational paper
    on viruses in 1984.
   The first documented signature based antivirus
    s/w produced by Bernd Fix in 1987.
   In late 1987 two released based on heuristic
    analysis Flushot Plus by Ross Greenberg and
    Anti4us by Erwin Lanting.
   In 1988 a mailing list named VIRUS-L formed for
    better research in field of viruses.
   From 1988 -2007 strategic development occurs.
   100-200 billions of viruses believed to exist
    “in the wild”.
   “Infinite amounts” in zoos.
   At least 300 new malicious programs (Worms,
    Trojans, Spyware, Hacker tools, Root-kits )
    released per day.
   2- 3 millions of undetectable programs exists
    from early 19th centuries.
   It is software used to prevent, detect and
    remove Malicious programs.
   Provides computer security implemented by
    software methodology.
   No common malware definition

   No common repository

   Out-of date signatures
 High rate of production of new advanced virus.
 Traditional techniques like digital signature
  analysis.
 Lake of up-to-date knowledge.
 Unexpected renewal costs for providing service.
 Rogue security applications
 Problems caused by false positives
 System and interoperability related issues.
 Damage happens to ordinary files.
   According to an FBI survey, major businesses lose $12
    million annually dealing with virus incidents.

   A recent Yankee Group report stated that 99% of
    companies had AV technology installed, yet 62% of
    companies suffered successful virus attacks.

   According to AusCERT, Australia’s Computer
    Emergency Response Team, the two most
    technological and deployed AV products fail to
    prevent 80% of new threats.
   Try to use a good up-to-date antivirus
    product.
   Learn about malicious virus infection
    procedure
   Up to date with virus definitions.
   Use your commonsense while using system
As we are entering to a new era of technology
where no Antivirus is appropriate for
protecting our confidentiality, because of the
featured brain of malicious code writers. For
protecting our privacy we have to up to date
our brain with the technology.
   http://theinventionofantivirussoftware.blogs
    pot.in/
   http://en.wikipedia.org/wiki/Antivirus_softwa
    re
   http://www.antivirussoftwaremax.com/the-
    history-of-antivirus-software/
Anti virus
Anti virus

More Related Content

What's hot

Risq mark bullen - juniper (11-16-16)
Risq   mark bullen - juniper (11-16-16)Risq   mark bullen - juniper (11-16-16)
Risq mark bullen - juniper (11-16-16)ColloqueRISQ
 
eScan Version 14 With Cloud Security.
eScan Version 14 With Cloud Security.eScan Version 14 With Cloud Security.
eScan Version 14 With Cloud Security.eScan
 
Ibm risk management-30min
Ibm risk management-30minIbm risk management-30min
Ibm risk management-30minKim Aarenstrup
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYRc Os
 
Presentation about security i.t.
Presentation about security i.t.Presentation about security i.t.
Presentation about security i.t.MarianaGilMartnez1
 
AusCERT - Mikko Hypponen
AusCERT - Mikko HypponenAusCERT - Mikko Hypponen
AusCERT - Mikko HypponenMikko Hypponen
 
IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015Daniel Miessler
 
Sandbox Technology in AntiVirus
Sandbox Technology in AntiVirusSandbox Technology in AntiVirus
Sandbox Technology in AntiVirusAshish Gautam
 
What is Spyware?
What is Spyware?What is Spyware?
What is Spyware?cnbweg45
 
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...viaForensics
 
Secure printing in an unsecure world
Secure printing in an unsecure worldSecure printing in an unsecure world
Secure printing in an unsecure worldHP
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & wormsSourav Verma
 
Zimperium Enterprise Mobile Threats
Zimperium Enterprise Mobile ThreatsZimperium Enterprise Mobile Threats
Zimperium Enterprise Mobile ThreatsZimperium
 
Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]Mikko Hypponen
 
Your Data Is Under Siege: Fortify Your Endpoints
Your Data Is Under Siege: Fortify Your EndpointsYour Data Is Under Siege: Fortify Your Endpoints
Your Data Is Under Siege: Fortify Your EndpointsInsight
 

What's hot (20)

Risq mark bullen - juniper (11-16-16)
Risq   mark bullen - juniper (11-16-16)Risq   mark bullen - juniper (11-16-16)
Risq mark bullen - juniper (11-16-16)
 
Lecture 19
Lecture 19Lecture 19
Lecture 19
 
eScan Version 14 With Cloud Security.
eScan Version 14 With Cloud Security.eScan Version 14 With Cloud Security.
eScan Version 14 With Cloud Security.
 
Ibm risk management-30min
Ibm risk management-30minIbm risk management-30min
Ibm risk management-30min
 
ANTI - VIRUS
ANTI - VIRUSANTI - VIRUS
ANTI - VIRUS
 
Viruses
VirusesViruses
Viruses
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITY
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Presentation about security I.T.
Presentation about security I.T.Presentation about security I.T.
Presentation about security I.T.
 
Presentation about security i.t.
Presentation about security i.t.Presentation about security i.t.
Presentation about security i.t.
 
AusCERT - Mikko Hypponen
AusCERT - Mikko HypponenAusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
 
IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015
 
Sandbox Technology in AntiVirus
Sandbox Technology in AntiVirusSandbox Technology in AntiVirus
Sandbox Technology in AntiVirus
 
What is Spyware?
What is Spyware?What is Spyware?
What is Spyware?
 
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
 
Secure printing in an unsecure world
Secure printing in an unsecure worldSecure printing in an unsecure world
Secure printing in an unsecure world
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & worms
 
Zimperium Enterprise Mobile Threats
Zimperium Enterprise Mobile ThreatsZimperium Enterprise Mobile Threats
Zimperium Enterprise Mobile Threats
 
Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]
 
Your Data Is Under Siege: Fortify Your Endpoints
Your Data Is Under Siege: Fortify Your EndpointsYour Data Is Under Siege: Fortify Your Endpoints
Your Data Is Under Siege: Fortify Your Endpoints
 

Viewers also liked

Ge Careers How To Apply
Ge Careers   How To ApplyGe Careers   How To Apply
Ge Careers How To ApplyBruno Pitzer
 
10 Things to Make API Users Like You
10 Things to Make API Users Like You10 Things to Make API Users Like You
10 Things to Make API Users Like YouDavid Yun
 
LVSA Annrual Report 2010_2011
LVSA Annrual Report 2010_2011LVSA Annrual Report 2010_2011
LVSA Annrual Report 2010_2011Bill Ritchie
 
Feedback en Jessica stellen zich voor!
Feedback en Jessica stellen zich voor!Feedback en Jessica stellen zich voor!
Feedback en Jessica stellen zich voor!JessRoos
 
КОНЦЕПЦІЯ ЦІЛЬОВОЇ ПРОГРАМИ ЗБИРАННЯ, ЗАГОТІВЛІ ТА УТИЛІЗАЦІЇ ВИКОРИСТАНОЇ УП...
КОНЦЕПЦІЯ ЦІЛЬОВОЇ ПРОГРАМИ ЗБИРАННЯ, ЗАГОТІВЛІ ТА УТИЛІЗАЦІЇ ВИКОРИСТАНОЇ УП...КОНЦЕПЦІЯ ЦІЛЬОВОЇ ПРОГРАМИ ЗБИРАННЯ, ЗАГОТІВЛІ ТА УТИЛІЗАЦІЇ ВИКОРИСТАНОЇ УП...
КОНЦЕПЦІЯ ЦІЛЬОВОЇ ПРОГРАМИ ЗБИРАННЯ, ЗАГОТІВЛІ ТА УТИЛІЗАЦІЇ ВИКОРИСТАНОЇ УП...State Enterprise Ukrecoresursy
 
为什么选择游易帮
为什么选择游易帮为什么选择游易帮
为什么选择游易帮uehelper
 
Благотворительный фонд "Красивые дети в красивом мире"
Благотворительный фонд "Красивые дети в красивом мире"Благотворительный фонд "Красивые дети в красивом мире"
Благотворительный фонд "Красивые дети в красивом мире"Любовь Полякова
 
慶應義塾大学 教育学特殊 第12講(2016年67月13日)
慶應義塾大学 教育学特殊 第12講(2016年67月13日) 慶應義塾大学 教育学特殊 第12講(2016年67月13日)
慶應義塾大学 教育学特殊 第12講(2016年67月13日) Koyo Yamamori
 
Nahdet El Mahrousa's Incubator Information session
Nahdet El Mahrousa's Incubator Information session Nahdet El Mahrousa's Incubator Information session
Nahdet El Mahrousa's Incubator Information session Nahdet El Mahrousa
 
Angina pektoris
Angina pektoris Angina pektoris
Angina pektoris saffaatifah
 
Web de la genèse à demain mars 2016
Web de la genèse à demain mars 2016Web de la genèse à demain mars 2016
Web de la genèse à demain mars 2016Guillaume Eouzan
 
150527 教育学特殊 第6講
150527 教育学特殊 第6講150527 教育学特殊 第6講
150527 教育学特殊 第6講Koyo Yamamori
 
151121_お台場海苔づくり説明会
151121_お台場海苔づくり説明会151121_お台場海苔づくり説明会
151121_お台場海苔づくり説明会Koyo Yamamori
 
Bò nhúng dấm chấm mắm sả ớt
Bò nhúng dấm chấm mắm sả ớtBò nhúng dấm chấm mắm sả ớt
Bò nhúng dấm chấm mắm sả ớtCác Món Ăn Ngon
 

Viewers also liked (20)

NV_path_rendering
NV_path_renderingNV_path_rendering
NV_path_rendering
 
Ge Careers How To Apply
Ge Careers   How To ApplyGe Careers   How To Apply
Ge Careers How To Apply
 
10 Things to Make API Users Like You
10 Things to Make API Users Like You10 Things to Make API Users Like You
10 Things to Make API Users Like You
 
LVSA Annrual Report 2010_2011
LVSA Annrual Report 2010_2011LVSA Annrual Report 2010_2011
LVSA Annrual Report 2010_2011
 
Feedback en Jessica stellen zich voor!
Feedback en Jessica stellen zich voor!Feedback en Jessica stellen zich voor!
Feedback en Jessica stellen zich voor!
 
КОНЦЕПЦІЯ ЦІЛЬОВОЇ ПРОГРАМИ ЗБИРАННЯ, ЗАГОТІВЛІ ТА УТИЛІЗАЦІЇ ВИКОРИСТАНОЇ УП...
КОНЦЕПЦІЯ ЦІЛЬОВОЇ ПРОГРАМИ ЗБИРАННЯ, ЗАГОТІВЛІ ТА УТИЛІЗАЦІЇ ВИКОРИСТАНОЇ УП...КОНЦЕПЦІЯ ЦІЛЬОВОЇ ПРОГРАМИ ЗБИРАННЯ, ЗАГОТІВЛІ ТА УТИЛІЗАЦІЇ ВИКОРИСТАНОЇ УП...
КОНЦЕПЦІЯ ЦІЛЬОВОЇ ПРОГРАМИ ЗБИРАННЯ, ЗАГОТІВЛІ ТА УТИЛІЗАЦІЇ ВИКОРИСТАНОЇ УП...
 
Mike baker eclipse
Mike baker eclipseMike baker eclipse
Mike baker eclipse
 
为什么选择游易帮
为什么选择游易帮为什么选择游易帮
为什么选择游易帮
 
Благотворительный фонд "Красивые дети в красивом мире"
Благотворительный фонд "Красивые дети в красивом мире"Благотворительный фонд "Красивые дети в красивом мире"
Благотворительный фонд "Красивые дети в красивом мире"
 
NEDITER
NEDITERNEDITER
NEDITER
 
Thais 5 años
Thais 5 añosThais 5 años
Thais 5 años
 
Doc1
Doc1Doc1
Doc1
 
慶應義塾大学 教育学特殊 第12講(2016年67月13日)
慶應義塾大学 教育学特殊 第12講(2016年67月13日) 慶應義塾大学 教育学特殊 第12講(2016年67月13日)
慶應義塾大学 教育学特殊 第12講(2016年67月13日)
 
Nahdet El Mahrousa's Incubator Information session
Nahdet El Mahrousa's Incubator Information session Nahdet El Mahrousa's Incubator Information session
Nahdet El Mahrousa's Incubator Information session
 
Presentasi b.ing
Presentasi b.ingPresentasi b.ing
Presentasi b.ing
 
Angina pektoris
Angina pektoris Angina pektoris
Angina pektoris
 
Web de la genèse à demain mars 2016
Web de la genèse à demain mars 2016Web de la genèse à demain mars 2016
Web de la genèse à demain mars 2016
 
150527 教育学特殊 第6講
150527 教育学特殊 第6講150527 教育学特殊 第6講
150527 教育学特殊 第6講
 
151121_お台場海苔づくり説明会
151121_お台場海苔づくり説明会151121_お台場海苔づくり説明会
151121_お台場海苔づくり説明会
 
Bò nhúng dấm chấm mắm sả ớt
Bò nhúng dấm chấm mắm sả ớtBò nhúng dấm chấm mắm sả ớt
Bò nhúng dấm chấm mắm sả ớt
 

Similar to Anti virus

Case study cybersecurity industry birth and growth
Case study cybersecurity industry birth and growth Case study cybersecurity industry birth and growth
Case study cybersecurity industry birth and growth Mamoon Ismail Khalid
 
Biologically inspired defenses against computer viruses
Biologically inspired defenses against computer virusesBiologically inspired defenses against computer viruses
Biologically inspired defenses against computer virusesUltraUploader
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesAlireza Ghahrood
 
A history of computer viruses introduction
A history of computer viruses   introductionA history of computer viruses   introduction
A history of computer viruses introductionUltraUploader
 
Automated Sample Processing
Automated Sample ProcessingAutomated Sample Processing
Automated Sample ProcessingNohcs777
 
IJSRED-V2I3P69
IJSRED-V2I3P69IJSRED-V2I3P69
IJSRED-V2I3P69IJSRED
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays worldSibghatullah Khattak
 
Seminar on Internet security
Seminar on Internet securitySeminar on Internet security
Seminar on Internet securityRahul Sah
 
Fighting computer viruses
Fighting computer virusesFighting computer viruses
Fighting computer virusesNguyễn Anh
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catchiYogi
 
X-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceX-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceIJECEIAES
 
Malware analysis and detection using reverse Engineering, Available at: www....
Malware analysis and detection using reverse Engineering,  Available at: www....Malware analysis and detection using reverse Engineering,  Available at: www....
Malware analysis and detection using reverse Engineering, Available at: www....Research Publish Journals (Publisher)
 
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]AngelGomezRomero
 
Computer virus and cyber attack
Computer virus and cyber attackComputer virus and cyber attack
Computer virus and cyber attackBhavesh soni
 
Computer viruses
Computer virusesComputer viruses
Computer virusesshopnil786
 

Similar to Anti virus (20)

Case study cybersecurity industry birth and growth
Case study cybersecurity industry birth and growth Case study cybersecurity industry birth and growth
Case study cybersecurity industry birth and growth
 
Biologically inspired defenses against computer viruses
Biologically inspired defenses against computer virusesBiologically inspired defenses against computer viruses
Biologically inspired defenses against computer viruses
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
The Various Classes of Antivirus!
The Various Classes of Antivirus!The Various Classes of Antivirus!
The Various Classes of Antivirus!
 
A history of computer viruses introduction
A history of computer viruses   introductionA history of computer viruses   introduction
A history of computer viruses introduction
 
Historyofviruses
HistoryofvirusesHistoryofviruses
Historyofviruses
 
Automated Sample Processing
Automated Sample ProcessingAutomated Sample Processing
Automated Sample Processing
 
IJSRED-V2I3P69
IJSRED-V2I3P69IJSRED-V2I3P69
IJSRED-V2I3P69
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
Seminar on Internet security
Seminar on Internet securitySeminar on Internet security
Seminar on Internet security
 
Fighting computer viruses
Fighting computer virusesFighting computer viruses
Fighting computer viruses
 
C3
C3C3
C3
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch
 
X-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceX-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligence
 
Malware analysis and detection using reverse Engineering, Available at: www....
Malware analysis and detection using reverse Engineering,  Available at: www....Malware analysis and detection using reverse Engineering,  Available at: www....
Malware analysis and detection using reverse Engineering, Available at: www....
 
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
 
Information security
Information securityInformation security
Information security
 
Computer virus and cyber attack
Computer virus and cyber attackComputer virus and cyber attack
Computer virus and cyber attack
 
Conficker
ConfickerConficker
Conficker
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

Recently uploaded

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

Anti virus

  • 1. Presented by: Ajit Kumar Pradhan 090101ITR006 7th Sem IT
  • 2. After INTERNET has evolved it had given a sophisticate increase on the general computer user as well as the malicious code writer, who has changed the backbone of internet architecture for their futuristic use & produced billions of malicious codes throughout the web. For defending these many billions of advance technological codes we use a outdated technology called as Antivirus. Is it sufficient ? Lets see……
  • 3. In 1969 the term ‘virus’ – Dr. David Gerrold.  In 1971 ‘Creeper virus‘ detected by-ARPANET.  In between 1974-79 some virus like Webbit ,Animal ,Shockwave rider.  "Elk Cloner" first personal computer virus "in the wild“ in 1981.
  • 4. Claimed by John McAfee in 1983.  Mr. Fred Cohen published 1st educational paper on viruses in 1984.  The first documented signature based antivirus s/w produced by Bernd Fix in 1987.  In late 1987 two released based on heuristic analysis Flushot Plus by Ross Greenberg and Anti4us by Erwin Lanting.  In 1988 a mailing list named VIRUS-L formed for better research in field of viruses.  From 1988 -2007 strategic development occurs.
  • 5. 100-200 billions of viruses believed to exist “in the wild”.  “Infinite amounts” in zoos.  At least 300 new malicious programs (Worms, Trojans, Spyware, Hacker tools, Root-kits ) released per day.  2- 3 millions of undetectable programs exists from early 19th centuries.
  • 6. It is software used to prevent, detect and remove Malicious programs.  Provides computer security implemented by software methodology.
  • 7.
  • 8. No common malware definition  No common repository  Out-of date signatures
  • 9.  High rate of production of new advanced virus.  Traditional techniques like digital signature analysis.  Lake of up-to-date knowledge.  Unexpected renewal costs for providing service.  Rogue security applications  Problems caused by false positives  System and interoperability related issues.  Damage happens to ordinary files.
  • 10. According to an FBI survey, major businesses lose $12 million annually dealing with virus incidents.  A recent Yankee Group report stated that 99% of companies had AV technology installed, yet 62% of companies suffered successful virus attacks.  According to AusCERT, Australia’s Computer Emergency Response Team, the two most technological and deployed AV products fail to prevent 80% of new threats.
  • 11.
  • 12.
  • 13.
  • 14. Try to use a good up-to-date antivirus product.  Learn about malicious virus infection procedure  Up to date with virus definitions.  Use your commonsense while using system
  • 15. As we are entering to a new era of technology where no Antivirus is appropriate for protecting our confidentiality, because of the featured brain of malicious code writers. For protecting our privacy we have to up to date our brain with the technology.
  • 16. http://theinventionofantivirussoftware.blogs pot.in/  http://en.wikipedia.org/wiki/Antivirus_softwa re  http://www.antivirussoftwaremax.com/the- history-of-antivirus-software/