Assignment-2 Introduction To Communication and Technology: (B-1) FA21-BCS-053
Assignment-2 Introduction To Communication and Technology: (B-1) FA21-BCS-053
Assignment-2 Introduction To Communication and Technology: (B-1) FA21-BCS-053
ASSIGNMENT-2
INTRODUCTION TO COMMUNICATION AND TECHNOLOGY
PRESENTED BY:
MUHAMMAD KASHIF
SECTION: (B-1)
MUHAMMAD ARSLAN
SECTION: (B-1)
Presented to:
MS. BEENISH NOOR
Windows antivirus software. Most antivirus software offers several levels of Windows
products at different price points, starting with free versions offering only basic protection. Users
must start scans and updates manually and typically free versions of antivirus software won’t
protect against links to malicious websites or malicious attachments in emails. Premium versions
of antivirus software often include suites of endpoint security tools that may provide secure
online storage, ad blockers and file encryption. Since 2004, Microsoft has been offering some
kind of free antivirus software as part of the Windows operating system.
Mac OS antivirus software. Although mac OS viruses exist, they’re less common than
Windows viruses, so antivirus products for mac OS are less standardized than those for
Windows. There are a number of free and paid products available, providing on-demand tools to
protect against potential malware threats through full-system malware scans and the ability to sift
through specific email threads, attachments and various web activities.
Android antivirus software. Android is the world’s most popular mobile operating system and
is installed on more mobile devices than any other OS. Because most mobile malware targets
Android, experts recommend all Android device users install antivirus software on their devices.
Vendors offer a variety of basic free and paid premium versions of their Android antivirus
software including anti-theft and remote-locating features. Some run automatic scans and
actively try to stop malicious web pages and files from being opened or downloaded.
Virus Detection Techniques
Antivirus software uses a variety of virus detection techniques.
Originally, antivirus software depended on signature-based detection to flag malicious software.
Antivirus programs depend on stored virus signatures – unique strings of data that are
characteristic of known malware. The antivirus software uses these signatures to identify when it
encounters viruses that have already been identified and analyzed by security experts.
Signature-based malware cannot detect new malware, including variants of existing malware.
Signature-based detection can only detect new viruses when the definition file is updated with
information about the new virus.
Firewall
A firewall2 is software or firmware that prevents unauthorized access to a network. It inspects
incoming and outgoing traffic using a set of rules to identify and block threats. Firewalls are used
in both personal and enterprise settings, and many devices come with one built-in, including
Mac, Windows, and Linux computers. They are widely considered an essential component of
network security.
Importance
Firewall are important because they have had a huge influence on modern security techniques
and are still widely used. They first emerged in the early days of the internet when networks
needed new security methods that could handle increasing complexity. Firewall have since
become the foundation of network security in the client-server model the central architecture of
modern computing. Most devices use firewalls to inspect traffic and mitigate threats.
Uses
Firewalls are used in both corporate and consumer settings.
They may be installed at an organization’s network perimeter to guard against external
threats, or within the network to create segmentation and guard against insider threats.
In addition to immediate threat defense, firewalls perform important logging and audit
functions.
In a single home network, a firewall can filter traffic and alert the user to intrusions.
Working
A firewall establishes a border between an external network and the network it guards. It is
inserted inline across a network connection and inspects all packets entering and leaving the
guarded network. As it inspects, it uses a set of pre-configured rules to distinguish between
benign and malicious packets.
Types
When categorizing by filtering method, the main types are:
i. Packet-filtering firewall examines packets in isolation and does not know the packet’s
context.
ii. Stateful inspection firewall examines network traffic to determine whether one packet is
related to another packet.
iii. Proxy firewall inspects packets at the application layer of the Open Systems
Interconnection (OSI) reference model.
iv. Next Generation Firewall uses a multilayered approach to integrate enterprise firewall
capabilities with an intrusion prevention system (IPS) and application control.
-------------------------------------------------------------------------------------------------------------
References:
1. https://searchsecurity.techtarget.com/definition/antivirus-software?amp=1
2. https://searchsecurity.techtarget.com/definition/firewall?amp=1
3.https://www.google.com/amp/s/searchsecurity.techtarget.com/definition/intrusion-detection-system
%3famp=1