Hemis tasks tasks 4: score -5 unit 8: security and safety lesson 21. Computer threats. It security and safety. Task 1


Features of an Effective Antivirus



Download 385,5 Kb.
bet6/7
Sana06.07.2022
Hajmi385,5 Kb.
#745591
1   2   3   4   5   6   7
Bog'liq
Abubakir Sobitov xorijiy til

Features of an Effective Antivirus
The following features of any antivirus are to be looked for when you decide on installing one Proactive scanning for malwares, and deleting once detected

  • Default-Deny Protection – Default-Deny protection that is implemented to prevent the entry of suspicious files by default.

  • Auto Sandbox Technology – A virtual environment where suspicious and unknown files are secluded and run to check for any malicious activity without interfering with the normal operations.

  • Containment Technology – Validates and authorizes the programs that are executable and ensures that the processes are run without effecting the regular operations of the system.

  • Host Intrusion Protection System (HIPS) – This feature works on a protocol-based intrusion prevention system, that oversees all the application and program activities that aare processed in the system. The HIPS terminates any malicious activities once found. This prevents the malware from infecting the operating system, registry keys or personal data or system memory.

Antiviruses are also of different types based on the OS compatibility

  • Antivirus for Windows OS

  • Antivirus for Linux OS

  • Antivirus for Android OS

  • Antivirus for MAC OS



Task 1. Note the purposes, functions and types of:

1 – VIRUSES: _________________________________________________________­______________ A virus is a program written to interfere with the operation of computer networks, files, or devices.The virus infects our computer


To our computer using the Internet or various external tools
may come. The virus infects the computer and fills the cache. the virus spreads in two different ways.
For example: if the computer crashes into one file, by freely moving to another file.
The second way - if sent by a hacker.

Download 385,5 Kb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6   7




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish