Explore chapters and articles related to this topic
The Future of Security
Published in Marcus K. Weldon, The Future X Network, 2018
Historically, we have depended on antivirus software to protect us from such attacks. Antivirus software mainly protects devices from known attacks using only known infected files and links. However, cybercriminals rapidly evolve their attack signatures, protocols and C&C locations, as well as using polymorphism (malware that is massively reproduced with subtle changes in each copy) in order to circumvent antivirus protection. In 2014, an executive from Symantec (a leading supplier of antivirus software and other cybersecurity software products) told the Wall Street Journal that “antivirus is dead” as it was now only catching about 45 percent of cyberattacks. On their own, antivirus software and device-based firewalls are simply not sophisticated enough to protect users from installing malware on their device, or to monitor their internet connection for anomalous traffic among all of the different connections that are made by the user, their browser and the software applications they run. One approach is for devices to self-monitor, but sophisticated self-monitoring is resource intensive (on both processor and memory) and is also an incomplete if not flawed security strategy because hackers have repeatedly demonstrated creative ways to defeat self-monitoring security, including antivirus software. A new approach is needed.
Nonfunctional Testing
Published in William E. Lewis, David Dobbs, Gunasekaran Veerapillai, Software Testing and Continuous Quality Improvement, 2017
William E. Lewis, David Dobbs, Gunasekaran Veerapillai
All organizations are at risk of “contracting” computer viruses, Trojans, and worms if they are connected to the Internet, use removable media (e.g., floppy disks and CD-ROMs), or use shareware/freeware software. With any malicious code, there is also the risk of compromising or losing sensitive or confidential information. To detect viruses, anti-virus software needs to be installed on network and machines. This antivirus software should have an up-to-date virus identification database (sometimes called virus signatures) that allows it to recognize all viruses. To detect viruses, the anti-virus software compares file contents with the known computer virus signatures, identifies infected files, quarantines and repairs them if possible, or deletes them if not. More sophisticated programs also look for viruslike activity in an attempt to identify new or mutated viruses that would not be recognized by the current virus detection database.
Securing Your Computers
Published in Kutub Thakur, Al-Sakib Khan Pathan, Cybersecurity Fundamentals, 2020
Kutub Thakur, Al-Sakib Khan Pathan
Antivirus software is a security software utility that is able to detect different types of viruses and malware programs on computers. It is also able to remove, delete, and quarantine a virus that has already affected the computer.
A survey of phishing attack techniques, defence mechanisms and open research challenges
Published in Enterprise Information Systems, 2022
A phishing attack can be minimised by using two-factor authentication in where the first credential is a normal username and password which is user known, and the second one which is present on smartphones/laptop (e.g. RSA SecurID) (Phishing attacks 2020). An enterprise can also prevent phishing attacks using different tools such as antivirus software, anti-phishing toolbars, web application firewall, and having up to date operating system and browser (Protecting your Enterprise from Phishing Attacks 2017b).