Download paper

History Of Antivirus Software Computer Science Essay

There are viing claims for the pioneer of the first antivirus merchandise. Possibly the first publically documented remotion of a computing machine virus in the natural state was performed by Brent Fix in 1987. An antivirus plan to counter the Polish MKS virus was released in 1987. Dr. Solomon ‘s Anti-Virus Toolkit, AIDSTEST and AntiVir were released by in 1988. Dr. Ahn Chul Soo ( Charles Ahn, laminitis of AhnLab Inc ) in South Korea besides released the Anti-Virus package called ‘V1 ‘ in June 10, 1988. By late 1990, 19 separate antivirus merchandises were available including Norton AntiVirus and McAfee VirusScan.

Early subscribers to work on computing machine viruses and countermeasures included Fred Cohen, Peter Tippett, and John McAfee.

Before Internet connectivity was widespread, viruses were typically spread by septic floppy discs. Antivirus package came into usage, but was updated comparatively infrequently. During this clip, virus draughtss basically had to look into feasible files and the boot sectors of floppy and difficult discs. However, as internet use became common, ab initio through the usage of modems, viruses spread throughout the Internet.

Powerful macros used in word processor applications, such as Microsoft Word, presented a farther hazard. Virus authors started utilizing the macros to compose viruses embedded within paperss. This meant that computing machines could now besides be at hazard from infection by paperss with concealed attached macros as plans.

Subsequently email plans, in peculiar Microsoft Outlook Express and Outlook, were vulnerable to viruses embedded in the electronic mail organic structure itself. Now, a user ‘s computing machine could be infected by merely opening or previewing a message.

Top Experts
Professor Harris
Verified expert
4.9 (457)
Allan Brooks
Verified expert
5 (893)
Prof Evander
Verified expert
4.8 (654)
hire verified expert

This meant that virus draughtss had to look into many more types of files. As always-on broadband connexions became the norm and more and more viruses were released, it became indispensable to update virus draughtss more and more often. Even so, a new zero-day virus could go widespread before antivirus companies released an update to protect against it.

What is an Antivirus plan?

An antivirus plan is used as a security step and protection tool against computing machine viruses. The occupation of an antivirus plan is to scan, detect and prevent viruses. Not all antivirus plans can execute these basic undertakings, but this will be discussed subsequently on in this study.

Antivirus plans are an indispensable tool you must hold installed on your computing machine or web. Antivirus plans offer real-time, on-access and on-demand protection for your computing machine. The manner the plans works is based on the version of the antivirus plan you have. Antivirus plans can be a standalone or can be included in a protection suite and are distributed in 32 and 64-bit versions on multiple runing systems such as Windows, Linux and Mac, leting all different types of computing machines to be protected from malicious package.

Why is Antivirus Software Necessary?

Security is a major concern when it comes to the safety of your personal information. If person were to entree your information and usage it, the effect would be drastic. Information security is concerned with three chief countries ;

Confidentiality – people ‘s information should merely be available to person who has the right to see it.

Availability – information should merely be accessible when person needs it.

Integrity – information should merely be modified by people who are authorized to redact it.

These constructs apply to home Internet users merely every bit much as they would to any corporate or authorities web. You likely would n’t allow a alien expression through your of import paperss. In the same manner, you may desire to maintain the undertakings you perform on your computing machine confidential, whether it ‘s tracking your investings or directing email messages to household and friends. Besides, you should hold some confidence that the information you enter into your computing machine remains integral and is available when you need it.

Some security hazards arise from the possibility of knowing abuse of your computing machine by interlopers via the Internet. Others are hazards that you would confront even if you were n’t connected to the Internet ( e.g. difficult disc failures, larceny, power outages ) . The bad intelligence is that you likely can non be after for every possible hazard. The good intelligence is that you can take some simple stairss to cut down the opportunity that you ‘ll be affected by the most common menaces — and some of those stairss help with both the knowing and inadvertent hazards you ‘re likely to confront.

Virus? What is a Virus?

Before we go on and state you how an antivirus plan scans, detects and prevents viruses and malware, lets discuss what precisely a virus is. Like its familial equivalent, a computing machine virus is a plan that spreads unwanted and unexpected actions through the interiors of your Personal computer. Not all viruses are malicious, but many are written to damage peculiar types of files, applications or even runing systems. Some illustrations of viruses are ; Trojan Equus caballus viruses, worms, spyware, adware, rootkits, and many other types of malware.

Viruss have been around since the early 1970 ‘s. Even though they ne’er had an cyberspace connexion back in the 70 ‘s viruses still infected computing machines by floppy discs. Yes, FLOPPY DISKS, the old 5 14 ” discs. The first recorded virus was in 1971 and it was called the Creeper Virus, which was written by Bob Thomas. What the Creeper virus did was it infected a distant computing machine by the ARPNET and copied itself exposing the message “ I ‘M THE Creeper: Catch ME IF YOU CAN! ” . Ironically the “ Reaper ” was created to cancel the Creeper. The Reaper plan was non like the anti-virus plans we know today, but in fact was a virus itself in that it was self replicating and spread through a web.

How an Antivirus Program Works

The first and most of import undertaking of an antivirus plan is to protect, prevent, or barricade any malicious activity in your computing machine or place and office web in real-time. The real-time protection should trip an qui vive or supply automatic action whenever a suspected or positively identified malware activity is detected. Most antivirus plans will merely supervise some critical countries in your computing machine.

When an antivirus plan is installed, it will get down supervising the activity of the system by seeking files that are being accessed, transferred, or stored to or from the difficult discs and external/removable thrusts. Files that are being downloaded from the Internet are scanned. If a leery activity is detected, the antivirus plan will automatically take the file or halt the procedures that are presenting hazard to your system, your contacts, or other computing machines or devices in on your web, unless you trust the file that you are having.

Antivirus plans offer several types of sensing methods to place malware, but the most common sensing methods is heuristic analysis and by utilizing traditional virus sensing ( signature-based ) .

Features of a plan – This is called heuristics scanning. Heuristic scanning engines work on the rule that viruses will normally utilize certain “ fast ones ” or methods of infecting, and hence if a plan looks like it might be utilizing those fast ones, there is a possibility that the plan is a virus. Sound simple? No, non truly, it ‘s really improbably difficult to compose a unfailing 100 % effectual heuristics engine. ( Engine, merely set, is merely a word we use to depict the spot that drives the virus sensor and compares files to the database of known infection agents ) The more aggressive heuristic scanner may good observe big Numberss of so called “ False Positives ” i.e. files that are truly wholly guiltless but look like they might change other files, the less aggressive 1s might lose files that truly are viruses. A method of heuristic analysis is for the anti-virus plan to decompile the leery plan, and so analyse the beginning codification contained within. In world heuristics work rather good for some types of viruses, such as Macro Viruses, but non so good for other types. However, they are a sensible effort at supplying protection against presently unknown viruses. The advantage to this method is the fact that there is no clip period when the computing machine is non protected after specific viruses are released. The disadvantages include the fact that false positives may happen and some viruses may non be identified during the length of a scan. The first heuristic engines were introduced to observe DOS viruses in 1989. However, there are now heuristic engines for about all categories of viruses.

Footprint or Signature-based sensing of virus plan – A virus signature is a peculiar form of ‘bits ‘ or information contained in a virus that appears in no other file or plan in the universe, except for that virus. This method is the most common method used to place viruses and false positives are really rare. It compares the virus footmark against a library of known footmarks which match viruses. A footmark is a form in the information included in a file. Using this method, viruses must be identified as viruses, and so added to the library of footmarks. The advantage to this method lies in the fact that false positives are really rare. The disadvantage to this method is the fact that there is a clip period between when the virus is released to when the library of known footmarks is updated. During this clip period, the virus will non be recognized and could infect a computing machine.

How make antivirus plans rate possible hazard?

Antivirus plans use a menace degree index to find what type of action to take. If the plan is adware merely, most antivirus plans will expose a duologue box to inform the user why a plan or related file of an adware plan was detected. If the detected object is presenting security and privateness hazards, the menace degree is average, high, or severe. The menace degree evaluations by antivirus plans are non all the same. Some antivirus plans may non observe or even scan for tracking cookies. Some of these are installed when legitimate package downloaded from third-party web sites is bundled with another installer from a company that is known to hold a spyware or adware concern.

Quarantine and False Positives in Antivirus Programs

Antivirus plans work besides by quarantining suspect and malware files. This procedure is to forestall the offending objects from making any harm in the system and to let the end-user to reconstruct back a isolated object to its original location if it is found to be a false positive.

A false positive sensing is when a malware signature detected an clean file or procedure. In some instances, a false positive can do a system to non to boot or run decently. If another plan is affected by the false sensing, the system will run usually, but non the plan that the Antivirus have falsely identified and removed.

Types of Antivirus Programs That Are Available

On the undermentioned page there is a list, in alphabetical order, of some the companies who provide Antivirus plans and the platforms on which they are supported.

Company

Windows

Apple

Linux

Mobile

Free?

AntiVir

Yes

No

Yes

No

Yes

AVG

Yes

No

No

No

Yes

Avira

Yes

No

Yes

Yes

Yes

BitDefender

Yes

No

Yes

Yes

No

ClamWin

Yes

No

No

No

Yes

ESET NOD32

Yes

No

Yes

Yes

No

F-Prot

Yes

No

Yes

No

No

Kaspersky

Yes

Yes

Yes

Yes

No

McAfee

Yes

Yes

Yes

Yes

No

MSE

Yes

No

No

No

Yes

Network Associates

Yes

Yes

Yes

Yes

No

Panda Software

Yes

No

Yes

No

No

RAV

Yes

Yes

Yes

No

No

Sophos

Yes

Yes

Yes

No

No

Symantec ( Norton )

Yes

Yes

Yes

Yes

No

Trend Micro

Yes

No

No

Yes

No

Vipre

Yes

No

No

No

No

Webroot

Yes

No

No

No

No

Antivirus Software

Now that you have a basic apprehension of how an antivirus plan plants and why you need one, here are some illustrations of three of the chief antivirus plans available today. The chief three that this study is traveling to discourse is Norton, Bitdefender, and Kaspersky. There are different types of antivirus plans available for each maker and the undermentioned information is traveling to discourse these types of plans.

Norton by Symantec

Norton offers 3 antivirus plans ;

Norton Antivirus

Norton Internet Security

Norton 360

Here is a full list of what Norton by Symantec offers for their merchandise line. ( Symantec )

Core Protection

Blocks viruses, spyware, Trojan horses, worms, bots, and rootkits

Defends against hackers with quiet bipartisan firewall

Pulse updates every 5 – 15 proceedingss for up-to-the minute protection

Advanced Protection

Norton Bootable Recovery Tool fixs, restores and boots badly infected, unbootable Personal computers

Leverages cloud-based on-line intelligence for real-time sensing of menaces

Download Insight proactively warns of possible dangers in freshly downloaded files and applications before you install or run them

Guards against Web onslaughts that exploit package exposures

Stops menaces unrecognized by traditional antivirus techniques

Filters unwanted email with professional-strength antispam

Helps maintain your childs safe online with parental controls ( Microsoft Windows merely )

Networking

Helps secure and supervise your place web

Automatically secures your Personal computer when linking to public radio webs

Identity Protection

Block hackers from accessing your computing machine

Blocks phishing web sites and authenticates trusted sites

Secures, shops, and manages login and personal information

Prevents hackers from listen ining and stealing information as you type

Identifies insecure Web sites in your hunt consequences

Backup and Restore

Automatically saves of import files locally or to secured on-line storage

Restores lost files and booklets

Personal computer Tuning

Optimizes the difficult thrust to liberate up disc infinite

Optimizes Personal computer public presentation with disc killing

Provides clear penetration into recent Personal computer activities to assist forestall lags

Optimizes application public presentation with one-clickA

Support

Free electronic mail, chat, or phone support

Automatically discoveries and fixes common Personal computer jobs

The followers is a tabular array of what precisely the three antivirus plans from Norton offer.

Norton Internet Security

Norton 360

Norton Antivirus

Blocks viruses, spyware, Trojan horses, worms, bots, and rootkits

Yes

Yes

Yes

Defends against hackers with a quiet two-way firewall

Yes

Yes

No

Pulse updates every 5-15 proceedingss for up-to-the minute protection

Yes

Yes

Yes

Intelligence-driven engineering for faster, fewer, shorter scans

Yes

Yes

Yes

Norton Bootable Recovery Tool fixs, restores and boots badly infected, unbootable Personal computers

Yes

Yes

Yes

Leverages cloud-based on-line intelligence for real-time sensing of menaces

Yes

Yes

Yes

Download Insight proactively warns of possible dangers in freshly downloaded files and applications before you install or run them

Yes

Yes

Yes

Guards against Web onslaughts that exploit package exposures

Yes

Yes

Yes

Stops menaces unrecognized by traditional antivirus techniques

Yes

Yes

Yes

Filters unwanted email with professional-strength antispam

Yes

No

No

Helps maintain your childs safe online with parental controls ( Microsoft Windows merely )

Yes

Yes

No

Helps secure and supervise your place web

Yes

Yes

No

Automatically secures your Personal computer when linking to public radio webs

Yes

Yes

No

Block hackers from accessing your computing machine

Yes

Yes

No

Blocks phishing web sites and authenticates trusted sites

Yes

Yes

No

Secures, shops, and manages login and personal information

Yes

Yes

No

Prevents hackers from listen ining and stealing information as you type

Yes

Yes

No

Identifies insecure Web sites in your hunt consequences

Yes

Yes

No

Automatically saves of import files locally or to secured on-line storage

No

Yes

No

Restores lost files and booklets

No

Yes

No

Optimizes the difficult thrust to liberate up disc infinite

No

Yes

No

Optimizes Personal computer public presentation with disc killing

No

Yes

No

Provides clear penetration into recent Personal computer activities to assist forestall lags

Yes

Yes

Yes

Optimizes application public presentation with one-clickA

Yes

Yes

Yes

Free electronic mail, chat, or phone support

Yes

Yes

Yes

Automatically discoveries and fixes common Personal computer jobs

Yes

Yes

Yes

Bitdefender

Bitdefender ‘s merchandise line for antivirus package is ;

Bitdefender Antivirus

Bitdefender Internet Security

Bitdefender Total Security

Here is a list of what Bitdefender offers for there merchandise line. ( Bitdefender )

Protection

Antivirus

Protects against viruses and other malware with industry-leading engineering

Multi-layered proactive protection against new and unknown menaces

Antispyware

Blocks concealed plans that track your online activities

Antiphishing

Blocks web pages that attempt to steal your recognition card informations

Antispam

Stops unwanted electronic mails from making your Inbox

Firewall

Automatically secures your Internet connexion wherever you are

Helps prevent foreigners form accessing your Wi-Fi web

Performance

Particular Operating Modes

Game Mode reduces system burden & A ; postpones scans

Laptop Mode prolongs battery life

Warm-up

Removes unneeded files & A ; register entries, for optimized public presentation

Privacy

IM Encryption

Keeps your conversations private on Yokel! And MSN Messenger

File Vault

Locks up confidential files in an encrypted vault

File Shredder

Ensures that no hints of deleted sensitive files remain on your Personal computer

Control

Parental Control

Blocks entree to inappropriate web sites and electronic mail

Limits childs ‘ entree to the Internet, games, etcaˆ¦ to specific times

Home Network

Manages the security of your full web from a individual location

Data Backup

Automatically backs up files and booklets

The followers is a tabular array of what precisely the three antivirus plans from Bitdefender offer.

Bitdefender Antivirus

Bitdefender Internet Security

Bitdefender Total Security

Antivirus

Yes

Yes

Yes

Antispyware

Yes

Yes

Yes

Antiphishing

Yes

Yes

Yes

Antispam

No

Yes

Yes

Firewall

No

Yes

Yes

Particular Operating Modes

Yes

Yes

Yes

Warm-up

No

Yes

Yes

IM Encryption

No

Yes

Yes

File Vault

No

Yes

Yes

File Shredder

No

No

Yes

Parental Controls

No

Yes

Yes

Home Network

Yes

Yes

Yes

Data Backup

No

No

Yes

Kaspersky

Kaspersky ‘s merchandise line for antivirus package is ;

Kaspersky Antivirus

Kaspersky Internet Security

Here is a list of what Kaspersky offers for there merchandise line. ( Kaspersky )

Protection fromaˆ¦

Viruss and spyware

Infected web sites

Hacker onslaughts

Spam and phishing

Identity larceny

Features Comparison

Virus and exposure scanner

Proactive protection against plans based on their behavior

Restriction of entree to private informations by leery plans

Application control

Safe tally manner ( sandbox ) to prove questionable plans

Network Protection

Two-way personal firewall

Secure radio connexions in public countries

Email Protection

Real-time scanning of electronic mail

Anti-spam, Anti-phishing

Web Protection

Virtual keyboard to safely come in sensitive informations

Removal of Internet activity ( history, cookies, etc )

Parental Control

Kaspersky Antivirus

Kaspersky Internet Security

Viruss and spyware

Yes

Yes

Infected Web sites

Yes

Yes

Hacker onslaughts

No

Yes

Spam and phishing

No

Yes

Identity larceny

No

Yes

Virus and exposure scanner

Yes

Yes

Proactive protection against plans based on their behaviour

Yes

Yes

Restriction of entree to private informations by leery plans

No

Yes

Application control

No

Yes

Safe tally manner ( sandbox ) to prove questionable plans

No

Yes

Two-way personal firewall

No

Yes

Secure radio connexions in public countries

No

Yes

Real-time scanning of electronic mail

Yes

Yes

Anti-spam, Anti-phishing

No

Yes

Virtual keyboard to safely come in sensitive informations

Yes

Yes

Removal of Internet activity ( history, cookies, etc )

Yes

Yes

Parental Control

Yes

Yes

As you can see from the old lists, there is a difference in what the makers of these plans offer. They all offer virus and spyware on their basic applications. If you want more features/protection you are traveling to hold to pass the excess money to obtain those features/protection.

All of these versions of Antivirus package offer real-time protection and make regular scans. Kind of a behind the scenes scan. Which is a good characteristic to hold, cognizing that most users merely want it at that place to make its ain thing, sort of like cognizing it is protecting you but do n’t desire to hold to cover with it.

Norton and Kaspersky offer protection for one twelvemonth. At the terminal of that twelvemonth you have to pass more money before you can obtain more updates from them. The good thing about Bitdefender is that when you purchase a subscription from them you get it for 2 old ages. So for the monetary value of one twelvemonth from Norton or Kaspersky, you get 2 old ages from Bitdefender. That ‘s a good trade right? 2 for the monetary value of 1? If you factor in how the plan really works you may get down to believe that it ‘s non that good of a trade. Bitdefender is a good Antivirus plan, but it ‘s non truly the type of plan you want to utilize if your non really computing machine understanding.

Bitdefender has a batch of characteristics that can potentially close down your computing machine from holding any web traffic at all. Besides there is a known issue with Bitdefender and Microsoft ‘s Service Pack 2 for Vista. If you try and put in SP2 while Bitdefender is installed on your machine, your computing machine will loop from put ining and update and re-starting over and over once more. Besides the install, of Bitdefender, takes approximately 30 to 40 proceedingss from start to completion. Who wants to sit around and watch a plan install for that sum of clip.

As stated before Norton offers protection for merely one twelvemonth. Norton makes up for merely holding one twelvemonth of protection by the how user friendly it is. The new versions of Norton ( 2010 versions ) install in less than a minute. Hard to believe? It ‘s true, it does put in in under 1 minute.

The characteristics available on these new versions are highly user friendly. Even if you are a first clip computing machine user, you will be able to utilize these plans. Previous version of Norton were, as some would name, “ A resort pig ” , intending that while Norton was running it made your computing machine run really slow. That ‘s non the instance any longer. These new version uses less than 8mb of memory. Seriously that ‘s true, you do n’t even cognize that Norton is running a scan in the background.

Why Viruss Can Sometimes Elude Antivirus Programs

A stealing virus is one that conceals the alterations it makes.A This is done by taking control of system maps that interpret files or system sectors.A When other applications request informations from parts of the system modified by the virus, the infection reports back the accurate, unchanged informations, alternatively of the malicious code.A In order for this to happen, the virus must be actively present in the memory.

It is of import to cognize that many viruses non merely conceal, but encrypt the original informations they have infected.A Some victims may utilize traditional DOS bids such as FDISK/MBR or SYS to repair the job, an case that could do things much worse.A If the virus is overwritten with FDISK/MBR, the difficult thrust will hold no manner to acknowledge what ‘s in the divider tabular array and can non entree the encrypted informations without assistance of the virus.A For this ground, anti-virus package is recommended to eliminate a stealing virus instead than self maintenance.A

Virus programmers chiefly use the stealing attack to evade virus scanners.A A Those that have non been designed to make so, because the malicious codification is reasonably new or the user ‘s anti-virus package is n’t up to day of the month, are frequently described as stealing viruses as well.A The stealing technique is a lending factor to why most anti-virus plans function best when the system is booted from a clean Cadmium or floppy disk.A By making this, the infection is non able to prehend control of the system and the alterations it makes can be exposed and instantly dealt with.

In general, a stealing virus will conceal itself in system memory every clip a plan scanner is run.A It employs assorted techniques to conceal any alterations so that when the scanner looks for altered subdivisions, the virus redirects it to any country that contains the clean, clean data.A A more advanced anti-virus plan can observe a stealing virus by seeking for grounds of alterations within system sectors along with countries that are more susceptible to assail, irrespective of how it is booted.A A A

Some can non even be detected by province of-the-art anti-virus package. These “ stealing ” viruses frequently attack the antivirus package itself. Others, called “ mutant engine ” viruses, elude the immune systems and create mutated signifiers of themselves, multiplying 100s, even 1000s of times. Each new mutated signifier is different. Even if it ‘s detected, merely that peculiar signifier can be eradicated. All others must be separately located and killed.

Even those you ‘d least anticipate to be vulnerable-computer package companies themselves — are non immune. Lotus Development Corp. , for one, was red-faced at a recent conference, when a virus infected and crashed the computing machine web it was utilizing. In this peculiar instance, the virus functioned like a series of missive bombs. Each clip a user opened his or her mail the waiter crashed.

In some utmost instances, the lone solution is to “ fire ” ( in other words, reformat ) the septic discs and start over. Reformatting the discs wipes out the virus ( unless, of class, it attaches itself to the format plan ) .

The jobs do n’t needfully halt at that place. For case, what if the virus was backed up accidently on a backup disc? Unfortunately, you so retrieve both the virus and the good plans and informations. On its appointed day of the month it so comes alive and creates the same jobs as earlier. Since this scenario does n’t even traverse most bankers ‘ heads unless they ‘ve been “ burned ” in the yesteryear, it is all excessively common.

Norton Antivirus

Antivirus.jpg

Norton Internet Security –

norton_internet_security_2010-257393-1255053344.jpg

Norton 360

norton360.png

kaspersky-anti-virus-2009.jpg

download-kaspersky-internet-security-2010.jpg

bitdefender_antivirus_2010-274415-1262796405.jpg

Bitdefender-internet-security-2010.png

bitdefender2010.png

Cite this page

History Of Antivirus Software Computer Science Essay. (2020, Jun 02). Retrieved from http://studymoose.com/history-of-antivirus-software-computer-science-new-essay

Are You on a Short Deadline? Let a Professional Expert Help You
HELP ME WITH WRITING
Let’s chat?  We're online 24/7