StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Antimalware techniques - Essay Example

Cite this document
Summary
Anti-malware software computes the hashes for a particular application and compares it with the “Black List” of the hashes that has been identified as the malwares previously. Updating of anti-Malware software updates the Black List of Hashes (or Signatures) of known…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.9% of users find it useful
Antimalware techniques
Read Text Preview

Extract of sample "Antimalware techniques"

Antimalware Techniques of Antimalware Techniques Black or White List Creation: Anti-malware software computes the hashes for a particular application and compares it with the “Black List” of the hashes that has been identified as the malwares previously. Updating of anti-Malware software updates the Black List of Hashes (or Signatures) of known Malware. Instead of Black List a “White List” is maintained for the execution of the programs that are not threat to computer system. URL Filtering:Filtering of URL uses a well maintained Black List/White List database technique to prevent users from steering to web sites that were previously detected to transfer Malware or have done so in the past (Strebe, 2006, p. 121-122).

Email Filtering:Email Filtering eliminates Malware-infected images from mail, and holds SPAM (most of whose URLs take you to Malware spreading websites) out of Inbox.  Firewalls choke up Malware from corresponding to the outside world.Honey Pot:A honeypot is a trap installed to observe, avoid, or in some way neutralize attempts at unauthenticated use of information systems. Commonly it consists of a computer system, data, or a network site that appears to be element of a network, but in reality is isolated and under observation, and which appears to contain information or a resource of value to attackers (Ciampa, 2009, p. 169-170).

Behavior-blocking Software:Behavior-blocking is a capability of some anti-malware tools that provides few of the best security available. It uses a more advanced approach at detection than merely matching applications against signatures of well known infections. Rather, it operates like a firewall by monitoring incoming applications for particular executions that show features of malicious code.Keep Anti-Malware Tools and OS Up-To-Date: Operating System and anti-malware tools should be up-to-date.

Number of rogue software and security breaches in the OS is being exposed. Manufacturers of OS and anti-malware tools release updates for their products repeatedly. A un-updates OS or anti-malware would not be helpful in case of any threat.ReferencesCiampa, M. D. (2009). Security+ guide to network security fundamentals. Boston, MA: Course Technology/ Cengage Learning.Strebe, M. (2006). Network Security Foundations: Technology Fundamentals for IT Success. Hoboken: John Wiley & Sons.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Antimalware techniques Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Antimalware techniques Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1617503-antimalware-techniques
(Antimalware Techniques Essay Example | Topics and Well Written Essays - 250 Words)
Antimalware Techniques Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1617503-antimalware-techniques.
“Antimalware Techniques Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1617503-antimalware-techniques.
  • Cited: 0 times

CHECK THESE SAMPLES OF Antimalware techniques

Gymnastic Techniques

Every artistic sport has its own kind of techniques.... Rhythmic sportive gymnastic usually involve two kinds of techniques that are related to body movement and apparatus handling (Jastrjembskaia, Titov 1999 pg 1).... Gymnastic is an artistic type of sport that is similar to other artistic sports like acrobatics, figure skating and special type of synchronized swimming....
4 Pages (1000 words) Essay

Comparison between website verification systems and their technique

In this regard, the essay discusses the techniques, options and methods of website verification offered by these three systems separately.... The management of a website is a complex and multifarious task and the webmasters often face lot of problematic issues while dealing with certain matters related with the security and optimization of their websites (Greg, 2008, p76)....
16 Pages (4000 words) Essay

Management Techniques

Before discussing some management techniques that most of the managers use to put their companies on the path of unending success, let us get a better understanding of the role of effective management in the success of companies in today's competitive market.... Effective… Managers of the companies spend a considerable amount of time thinking to apply the most effective management techniques to make employees show improved productivity and efficiency.... Managers use effective management techniques not only to improve their productivity at the workplace but also to motivate them to do their best for the benefit of the company....
4 Pages (1000 words) Research Paper

Radiographic Techniques

The essay “Radiographic techniques” focuses on procedures that are used by radiography technicians to help in diagnosing and treating medical conditions.... hellip; The author states that radiographic techniques provide information concerning diseases and other conditions that may be present in the body.... This paper seeks to discuss how do techniques are changed for a given part of the body while keeping the same density on a film, and the tips for remembering this type of information....
1 Pages (250 words) Essay

Trading Techniques

The trading techniques in financial markets are explained as the plan for attaining maximum return through purchase or sale of stocks and securities by taking long or short positions in the market.... The various trading techniques that are adopted in the financial markets include the day-trading, swing trading and the trend trading techniques Trading techniques Contents Contents 2 Trading techniques 3 References 5 Trading techniques The trading techniques in financial markets are explainedas the plan for attaining maximum return through purchase or sale of stocks and securities by taking long or short positions in the market....
2 Pages (500 words) Essay

The Idea of Sandboxing and Its Techniques

This coursework "The Idea of Sandboxing and Its techniques" focuses on the main function of the sandbox that generates a remote atmosphere in which the applications run to block malware attacks.... There are numerous techniques to generate a sandbox atmosphere for applications....
14 Pages (3500 words) Coursework

IT Risk Analysis

hellip; Risk analysis involves the techniques used in the identification and assessment of factors that may jeopardize the success of achieving business goals.... This case study "IT Risk Analysis" analyzes the IT risks involved in the Wolves Techs Limited Company and conduct an IT risk assessment for the company with detailed report and recommendations....
10 Pages (2500 words) Case Study

Aerodynamics Measuring Techniques and Flow Visualization Techniques

… The paper “Aerodynamics Measuring techniques and Flow Visualization techniques ”  is a thoughtful example of an assignment on physics.... The paper “Aerodynamics Measuring techniques and Flow Visualization techniques ”  is a thoughtful example of an assignment on physics....
8 Pages (2000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us