220 likes | 418 Views
Defending the system. Firewalls ● Virusbusters ● Image programs. Virus attacks :. web-sites containing algorythms applying for connection e-mail viruses breaking by hackers. First defending line:. Firewalls. Defending system It doesn’t let any programs to connect
E N D
Defending the system Firewalls ● Virusbusters ● Image programs
Virus attacks: • web-sites containing algorythms applying for connection • e-mail viruses • breaking by hackers
First defending line: Firewalls
Defending system • It doesn’t let any programs to connect • We can give exceptions but it is dangerous • Opening the gate on the firewall is safer • Manual port-opening is a chance for a virus to break in • Most important is the hardware requirement! • Two types: package filters and application firewalls
Package filters • Easier (lower protection) • Making decision about the head of the package (what contains protocol, IP-addresses and port numbers) • Making simple rules about the communication
Example (how it makes the rules) • For using Internet, we have to open port #80 (usually) and receive everything in TCP • If the server use another port, we have to open that, too • When we are sending an e-mail, we have to allow the SMTP protocol The firewall has to register all of these and it becomes non-transparent because of the lot of rules.
Application firewalls • Listening to the whole data-stream • Checking protocols (on the firewall itself) • It can not detect the infected e-mails • Disadvantages: • The new versions allow coded protocols (dangerous) • Works only with known protocols
Second defending line: Virusbusters
Two types • On-demand: We have to start it manually, because it doesn’t scan without the user. (for example: Kaspersky) • On-access: They are running residently in the memory and they are scanning every time, the user receive a mail.
Appreciate by: • Scanning for In The Wild (ITW) viruses • Detecting zoo-viruses • Hardware requirements • Virus-database updating • other services (carantene function, firewall extension, bootable install CD, etc.)
F-Secure Internet Security 2005 On-access • Simply controllable • Automatic updating • Good scanning performance • Integrated good provided firewall • It has no carantene function • Install CD is not bootable
Kaspersky Antivirus 4.5 On-demand • Excellent against backdoors and trojans • Only at macros and scripts it is not 100% • It has low hardware requirements • is is hardly configurable. • You have to set the scanning of Microsoft Office files, scripts, and e-mails. • It hasn’t got so much automatic functions
McAfee VirusScan 2004 version 8.0 On-access • Simple settings • Transparent, easy control • Zoo-viruses: 99% • You have to donwload active-x applet • Not so effective at acitve-x-es and trojans
Norton Antivirus 2004 On-access • Ideal for beginners (lot of automatic function) • It’s nearly 100% at zoo and script viruses • Supports protection against macro-viruses • 100% at OLE objects • It has mail-scanner extension • Hardware requirements are in middle-level • Doesn’t support the ACE packing format • It is lower at active-x, backdoor and trojan
Panda AntiVirus Platinum On-access • At zoo and polymorph viruses it is 90% • Extension for controlling CPU-load • It has integrated firewall • Scanning-detecting ratio is weak • At trojans and backdoors it is 75% • It has wrong alerts too often
Bit-Defender 7.2 Professional On-access • It has serious defending center • Protects against dialing programs and cookies • Finds all of the polymorphs • Informs about updates and Windows backups • Low system requirements • It is weak for the zoo-viruses
G-Data Anti VirenKit 2004 On-access • 100% protection against EVERY viruses • Simply controlling • Updates itself often • It has very high hardware requirements (2.5 GHz processor, 512 MB RAM is not engouh) • It has many wrong alerts
AntiVir Personal Edition • It is free and fast • Scanning of ITWs is good • Weaker at zoo-viruses • Polymorphs: 84% • Backdoors and trojans: 43%
Summary • Scanning of ITWs is good in every programs • Zoo-detecting is under 100% (except G-Data) • Adviced is AntiVir freeware because it finds most of ITWs and it has low requirements
Final solution: Image programs
The most famous programs • Norton Ghost 2003 (best, fastest, most stable, most services) • Drive Image 7 • True Image 7.0 • Drive Backup 6.0 USING UNIX!
What to do? • Defend your system with password • Erase unknown e-mails • Switch on firewall • Install a virusbuster • And don’t click on executables or scripts