List all the techniques we discussed that antiviruses use to detect malicious co
ID: 3683702 • Letter: L
Question
List all the techniques we discussed that antiviruses use to detect malicious code. Attempt to identify the advantages and effectiveness of each technique independently. Also state the design goal (purpose) and the weakness of the technique. Please use the following tablet to summarize your analysis (One example provided):
Technique
Purpose
Weakness
Calculate the hash (checksum) of all files and maintain the hashes. Compare any future hashes that are calculated with the ones stored.
Detect any unintentional changes in files, especially executable files.
Computationally extensive, so not always done on all/entire file(s).
Technique
Purpose
Weakness
Calculate the hash (checksum) of all files and maintain the hashes. Compare any future hashes that are calculated with the ones stored.
Detect any unintentional changes in files, especially executable files.
Computationally extensive, so not always done on all/entire file(s).
Explanation / Answer
Antivirus
Technique
Purpose
Weakness
Norton
It used signatures and heuristics to identify viruses.
e-mail spam filtering and phishing protection.
Blocks malware URLs
deal with corrupted critical files
Good default balance between scan speed and security
scanner disabled two infested test systems
More expensive
Mcafee
McAfee DeepSAFE technology
Includes remote management, file shredder, and system tuneup
Fairly easy set-up
want to install an additional malware scanner
Kaspersky Internet Security
Protecting Sensitive Data with Kaspersky own Encryption Technology
Helps keep your Internet shopping secure
Virtual Keyboard protects you from keyloggers
Can make some sites run slowly,
Hard to schedule scans,
Can slow down system startup
Panda
TruPrevent Technologies
Tile navigation makes it easy to find what you need,
Multiple scan options
Vulnerability scanner checks for missing updates or
patches
Panda’s huge virus detection database is located in the Cloud
It may take a little time to get the settings just right,
Could have more comprehensive features and protection,
Requires minimum of Pentium 300 MHz or faster
Bitdefender Internet Security
BitDefender antivirus technology is integrated in a diverse range of products from: IBM ISS, GFI,
Hauri, Ipswitch, Laplink, Software 602, Bullguard, and others.
Tons of tools
At least one user has reported Bitdefender found a virus ESET Smart Security overlooked
Guards your online transactions
Quite expensive
Navigation isn’t always intuitive
Antivirus
Technique
Purpose
Weakness
Norton
It used signatures and heuristics to identify viruses.
e-mail spam filtering and phishing protection.
Blocks malware URLs
deal with corrupted critical files
Good default balance between scan speed and security
scanner disabled two infested test systems
More expensive
Mcafee
McAfee DeepSAFE technology
Includes remote management, file shredder, and system tuneup
Fairly easy set-up
want to install an additional malware scanner
Kaspersky Internet Security
Protecting Sensitive Data with Kaspersky own Encryption Technology
Helps keep your Internet shopping secure
Virtual Keyboard protects you from keyloggers
Can make some sites run slowly,
Hard to schedule scans,
Can slow down system startup
Panda
TruPrevent Technologies
Tile navigation makes it easy to find what you need,
Multiple scan options
Vulnerability scanner checks for missing updates or
patches
Panda’s huge virus detection database is located in the Cloud
It may take a little time to get the settings just right,
Could have more comprehensive features and protection,
Requires minimum of Pentium 300 MHz or faster
Bitdefender Internet Security
BitDefender antivirus technology is integrated in a diverse range of products from: IBM ISS, GFI,
Hauri, Ipswitch, Laplink, Software 602, Bullguard, and others.
Tons of tools
At least one user has reported Bitdefender found a virus ESET Smart Security overlooked
Guards your online transactions
Quite expensive
Navigation isn’t always intuitive
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.