0 ratings0% found this document useful (0 votes) 188 views22 pagesCSCUv2 Module 03 PDF
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
Careseaseeure Computer user emma
‘Marware ana Acinras
Malware and Antivirus
Module 03
Simplifying Security
Certified Secure Computer User
Module 3: Malware and Antivirus
Exam 112-12
Modis 03 Eage73 Certed Secure Computes User Conyght ©'>y EE-Deunell
‘ll ghee Reserves Ragrecuaten ie strieny PramaneeCcernisesseeute Computer uzer fram s2242
Iatwace ana activins
Security News
Source: https://Awww.yahoo.com_
Hackers Exploit ‘Flash’ Vulnerability in Yahoo Ads
In case it was not clear yet, Adobe Flash is not safe enough to deliver Internet content. This
issue came to the forefront when hackers exploited its security vulnerabilities for malicious
purposes. The hackers used Flash to infect Yahoo's ad network with malware which was
described as the largest maivertising attacks seen in recent times.
The attack, which started in late July 2015, was the latest in a string that have exploited
Intemet advertising networks, which are designed to reach millions of people online. it also
highlighted growing ansiety over the much-used graphics program (Adobe Flash), which has 3
history of security issues that have irked developers at Silicon Valley companies.
The scheme, which Yahoo shut down on eventually, worked like this: A group of hackers bought
ads across the Internet giant's sports, news and finance sites. When a computer—in this case,
‘one running Windows—visited a Yahoo site, it downloaded the malware code. From there, the
malware hunted for an out-of-date version of Adobe Flash, which it could use to commander
the computer—either holding it for ransom until the hackers were paid off or subtly directing
its browser to websites that paid the hackers for traffic.
Yahoo doesn’t know how many people were affected due to this attack, but they said that the
attack didn't tum out to be as bad as it was feared to be. “We take all potential security threats
seriously,” a Yahoo spokesperson told the Times in a statement. “With that said, the scale of
the attack was grossly misrepresented in initial media reports, and we continue to investigate
the issue.”
Module Objectives
At the end of this module you will be able to:
= Understand what Malware is:
= Identify the various types of Malware:
= Identify the various symptoms of Malware infection
"= Understand what an antivirus is and how it works
"Understand how to choose the right antivirus software for you and what its limitations
are
"Configure and use Kaspersky and Avast antivirus software
= Test if your antivirus is working
Modte 03 Page Certied Secare Computer User Copyright© by EE-Beumell
al Rpts Rerarved Rapreeunin Str Ponies.Cartes secure computer User eam az
aware wpa scnivirs
What is Malware?
Malware is short for malicious software. As the name suggests, a malware is created with the
intention to damage or take control of a computer, or steal information from it. Malware is a
general term used to refer to a variety of hostile or intrusive software. Malware attaches itself
to the components of a web page, pop-up advertisements, toolbars, or free applications that
users download. Malware sneaks into computers when users click the infected components.
Once malware is inside a system, it steals information stored on that computer such as social
security numbers, passwords, and bank account details. Examples of recently used malware by
hackers are Backotf, Dyreza, BlackEnergy, Crowti, and Crossbrowse.
Malware can be compared to the pea in a shell game. A street con running a shell game on the
sidewalk lures the mark (or victim) into trying to follow the pea, when actually it’s an exercise:in
sleight of hand. Similarly, malware also relies on sleight of hand—how to infect, persist, and
communicate without being detected. To understand, control, and successfully counter
malware, we need to focus on not just the pea (malware), but on all the moving parts.
Types of Malware
Malware has come a long way in the past thirty years. Initially malware was thought of as an
interesting experiment—what if computer programs could take control of a system?
It has progressed from being a tool for jokes between programmers, to become one of the key
techniques used by cyber criminals to wreak havoc in the cyber world. The most commonly
used malware techniques are as follows
= Virus- Computer viruses are just like biological viruses. They spread rapidly, their
spreading is accelerated or mitigated by human actions, and more often than not, they
are harmful to their host's health. Computer viruses spread to other computers by
attaching themselves to various programs, which are then replicated when the program
is run. They are often spread by sharing files or software between computers. Just like
shaking hands with a person who has a viral infection can infect you, sharing fies, like a
picture or @ song, with 2 virus infected computer can infect your computer as well.
Viruses can be used to harm host computers and networks, steal confidential
information, and create botnets (collection of compromised computers). Some viruses
have the ability to hide inside encrypted files, making it difficult to detect the virus.
Encrypted files are those files which only can be accessed with the correct password.
‘Trojan- A Trojan is a destructive program that parades itself as a harmless application.
Malicious users can remotely access computer systems using a Trojan. Once attackers
have access to these systems, they steal important data (login details, financial
information, passwords, electronic money, photos, and videos), inject more malware,
monitor user activity, or even modify files.
‘There was one instance, where a Trojan introduced viruses into computers by claiming it
could get rid of viruses present in the computer.
"Worm A Worm is the most commonly used type of malware. It’s a program which
enters an operating system with the intention of spreading malicious code. It also harms
Modste02 Fage 73 Certied Scare Computer User Copyright ©:by EE-Gemnell
‘Al gmt: Resarves Regrecuion eStreny PrMaRes.Cernisessecute Computer User fram 2242
anwar
the computer by consuming excessive bandwidth, deleting files, or by sending
documents through email. Some of the commonly used worms by hackers are Storm
Worm, Nimda, and Morris Worm.
Worms are often confused with viruses—worms have the ability to self-replicate while
viruses rely on human activity to spread.
" Spyware- This malware spies on user activity without their knawledge. Users enter their
personal information on retail websites in the form of shipping address and credit card
details. Using spyware these details are extracted and exploited.
‘Additionally, spyware also modifies browser security settings to make it more
vulnerable. Spyware is usually bundled along with the free applications which are
downloaded from the Internet. It spreads by exploiting software vulnerabilities.
= Ransomware- Ransomware is a malware which prevents users from accessing their
computer systems. After finding its way into a system, it encrypts all the files on it and
holds the password which can decrypt it, ransom. Ransomware is similar to kidnapping a
person—the person would only be released when ransom has been paid, and here the
data is only retrieved when the ransom was paid. Just like in kidnapping, paying the
ransom doesn't guarantee the safety of the data. Ransomware may be downloaded by
users by logging on to compromised or malicious websites. It also is delivered in the
form of an attachment in emails. Crowti is one of the prime examples of ransomware.
= Rootkit- Rootkit is malicious software designed to remotely access or control a
computer without alerting the users or the security programs. Once the roatkit is
installed, malicious parties remotely access the files, modify security settings, steal
crucial information, or control the computer and use it to attack other computers.
Rootkit prevention, detection, and removal is difficult due to its stealthy operation.
Hence rootkit detection is only done manually through regular scans and monitoring.
Users can protect their computers from rootkit by frequently updating software,
applications, operating systems, and virus definitions (used to update the antivirus
software on a system), avoiding suspicious downloads, and carrying out scans to check
for malware
Symptoms of Malware Infection
Cyber criminals constantly look for exploitable loopholes and vulnerabilities in computer
systems using malware. Software updates have patches which protect against these malwares.
These updates are important to install as malware keep evolving making it imperative for the
software installed on your system to evolve as well through these updates. Despite the security
layers and software updates, sometimes malware manage to sneak into a computer system.
Thus, it is important to know about the symptoms of malware infection:
= Slow System- Malware is known to slow down a computer system. Slowdown of a
system usually occurs due to lack of Random Access Memory (RAM) memory, lack of
space on hard drive, or usage of @ resource-heavy program. If it's neither of the
aforementioned causes, then it's likely to be a malware infection.
Modte 03 Fage7E Certified Secure Computer User Copyright © oy -Seumell
‘RightsReserved Raproeurion ie Stricy Pronined.™ Pop Ups- Unwanted pop ups which appear on systems or browsers are a sign of a
spyware infection. Pop ups are not only annoying, but also are dangerous. Clicking on
‘these pop ups opens the door for other malware to enter the system.
™ Unexpected System Crashes- If a system is regularly crashing or is displaying the
infamous Blue Screen of Death (BSODJ, then something is definitely wrong with that
computer. A BSOD is the worst type of error a computer experiences and is usually
caused by faulty hardware. The crash is either due to a technical issue caused by
incompatibility or it is a malware. If a malware does exist, it’s detected by running a
system scan on the computer using antivirus software.
"Excessive and Suspicious Hard Drive Activity: If the hard disk continues to have
excessive activity, even when the computer is not being used and there's no program
running or downloading, it usually is a malware infecting the system.
= Antivirus Disabling- Most of the malware programs are designed to disable antivirus
present in a system. If neither rebooting the system, nor troubleshooting the security
application works, then most likely the computer is infected with malware.
"New Browser Home Page or Toolbar- If users notice a naw homepage and a toolbar in
‘their browser, this is due to malware present on their computer. This malware gets
downloaded on the system when users dlick an online link or a pop up. This type of
malware can also be detected when a website is redirected to a different address.
™ Peculiar Program Activity- if programs on a computer start opening and dosing
‘automaticaly, or if strange windows start popping up during the booting process—it isa
sign of malware being present in the system. This type of malware can only be removed
by formatting the entire system.
= Random Network Activity- if the router displays high network activity by blinking
constantly, despite the user not accessing high amount of data, it generally indicates
presence of some form of malware in the system.
"Blacklisted IP address: If users receive an email stating that their IP addresses are
blacklisted, itis a confirmation of malware presence in the system and that it has Been
compromised.
Antivirus
‘What is Antivirus?
‘Viruses were the ‘rage’ during the 90s, which was when the term “Antivirus” became common.
Today, viruses are the minority in malware. Despite the aforementioned fact, the term
“Antivirus’ stuck on. The various antivirus software present taday not only provide security
against viruses, but other types of malware as well.
Antivirus is a software application that detects and eradicates malware from a computer
system, These software applications have an auto update feature which allows them to
Modute 08 Page 77 ered Secare Computer User Copyright ©:>y EE-Gemmell
all RgttsRararvas Raproeumion Str Proninees.download profiles of new malware, thus keeping them up to date. Some popular antivirus
software are McAfee, Norton, AVG, and Avast.
The myth that antivirus software is only for irresponsible users is a dangerous one to spread. In
‘today’s era of rampant cybercrime, even the most secure computer user is vulnerable. Zero-day
exploits (vulnerabilities in systems and applications that malicious users find first) have become
aa serious consideration. Hence, even if users are extremely careful while using their computers,
they may get still infected with malware by simply visiting a website,
Apart from local antivirus software, users can also avail the services of free online antivirus
programs to check for any anomalies in a file or @ URL. Services like hrtp://www.virustotal.com
are available for free and provide 2 good alternative in the absence of other antivirus softwere.
‘How does Antivirus work?
An antivirus softwere is an essential part of a multi-layered security strategy to protect a
computer from malware. Antivirus software employs the following techniques to keep
‘computers secure:
= Scanning- Antivirus software scans all files in memory and on the hard disk for code
snippets (small blocks of reusable code that can be inserted in a code file) which
uniquely identify a file as virus. This is the most common virus detection method. There
are two types of scanning—aon access and on demand. In an on-access scan, the files are
scanned when they are loaded onto the memary. On the other hand, in an on-demand
scan; the main memory, hard disk, and disk memory are scanned as and when the user
wishes to. The main advantage of scanning is detection of uninstalled viruses. This is
helpful especially in detecting email worms, which can spread rapidly if not stopped.
‘Antivirus software is also efficient in detecting those viruses for which they have the
signatures.
"Integrity Checking- It's the process of comparing current state of stored programs to a
previously recorded state which is known to be free of malware. This detects the change
in systems, if any. A program detected with a change in this exercise is deemed to be a
malware. it’s like comparing test results of a student—one before coaching and one
after. Integrity checking is a detection technique and not a prevention technique, i.e. it
cannot prevent a malware from being installed, but it can detect a malware present in
the system. Integrity Checking is the only way to ascertain whether a virus has damaged
any file. The major problem with integrity checking is that not enough companies offer
comprehensive integrity checking software. Most anti-virus suites that do affer it don't
protect enough files.
‘Should an infected file be Cleaned, Quarantined, or Deleted?
‘Quarantine is an antivirus software function which isolates files suspected of being infected
‘with malware. These files are isolated to prevent them from further corrupting other files in the
system. Files put in quarantine are no longer capable of infecting their host system. It's similar
to quarantining an individual who has contracted something contagious and possibly
dangerous.
‘Mocute 03 Page 72 Certea secure Computer User Copyrent © oy #6-Oamnell
“AI Rights Reserved Reproduction Sect Prohiotee‘certfes sure Computer Urer eam 12-2
Mahece ond Aotivine
‘When an antivirus program comes across an infected file, three actions can be taken—dlean,
quarantine, or delete. ff the user selects the wrong option, the results could be disastrous.
Rule of thumb in this situation is ta begin with the safest option and then proceed to less safe
‘options progressively. Always start with ‘clean’ option; if antivirus software reports that the file
cannot be cleaned, it should then be quarantined. The file should only be deleted if it’s
recommended by the antivirus scanner. However, if the malware is @ worm or Trojan, it must
bbe either quarantined or deleted.
‘Choosing the Right Antivirus software
‘Choosing the correct antivirus software is easier said than done. There are numerous factors
which have to be taken into account while choosing the correct antivirus software. With the
security of the user's data, digital identity, and financial transactions at stake, it’s worthwhile
investing some time in assessing each antivirus product. The basis for choosing the best
antivirus software is as follows:
= Compatibitity- For antivirus software to be effective, it must be compatible with other
programs on a system. lf there is @ conflict between the antivirus and other software, it
leaves computers vulnerable to-attacks.
= Usability: Ease of use of antivirus software is an important deciding factor. If the
software is tao complicated for users, it is a good idea to go for something that they can
understand and use easily.
™ Comprehensive Protection- Antivirus software must deliver round the clock protection
for all computer domains, types of files, and network elements that could be subject to
attack by malware. The software should be able to detect malware and also protect
entry points to computers.
= Quality of Protection- Antivirus solutions need to function in @ volatile environment
which is regularly changing—with new computer viruses, worms, and Trojans that can
be much more nefarious than previously known ones.
‘Quality of protection depends on the following
‘© Effectiveness of malware detection processes
0 Frequency and regularity of updates
‘0 Ability to remove infections from computer systems
‘0 Efficiency in delivering computer protection—without significant impact on
computers’ performance
‘Limitations of Antivirus Software
‘Computers today are an integral part of human lifestyle. Unfortunately, malware is also a part,
although unwanted, of this lifestyle. As "UK Cheap Broadband” magazine advises, even if you
don't download anything from the Internet, don't think you're safe from malware. The cutting
edge viruses of today are designed in such a way that they are able to travel from one
oguse 03 Page 78 Centitiea secure Computer User Copyign © 2y H-Gamnell
{All Rghts Reserved Reprocuion Stray Prohistee.cartes secure computer user fam 42242
Malware end dvr
computer to another across the Intemet. Hence, having antivirus software is a must.
Limitations of antivirus software also must be known befare selecting ane:
* Limited Detection Techniques- There are multiple techniques to detect malware, but
unfortunately antivirus programs usually do not employ all of them. Many antivirus
software use scanning as the most common methad of detecting malware. This could
prove to be a huge drawback because @ scanner may give a false alarm. This can be
avoided by regularly updating the database of antivirus programs. Good antivirus
software uses a combination of all available techniques and supplements them with
-verifiers. A verifier program gives an in-depth analysis of any detected malicious code in
order to ascertain if itisa malware.
™ Doesn't Fully Protect- Having fully equipped antivirus software with various detection
‘techniques may not be enough to protect computers from malware. Microsoft Security
recommends putting up an Internet firewall a5 well to provide an additional layer of
security. Hardware like routers are used to reinforce firewalls, especially if users have a
small network of computers.
* Slows Down PC or Network- Installing and running antivirus software uses a lot of RAM
as well as take up a lot of space on the hard disk which tends to slow the computer
down. This also applies to the protection of servers and networks from malware.
* Conflicts There are two types of conflicts which arise while using antivirus. First,
antivirus software must be compatible with other programs on a system. If conflicts
exist between the antivirus software and other programs, it leaves computers
winerable to attacks. Second, since antivirus software does not provide protection
against all malware, users may be tempted to install more than one antivirus program.
This will actually cause more harm than good because the programs might conflict with
each other and end up making the system vulnerable ta attacks.
Kaspersky PURE 3.0
Kaspersky PURE 3.0 is an antivirus software which ensures protection of computers against
all kinds of threats, secures data from loss and unauthorized usage, and protects children
cand teenagers from threats related to computer and Internet usage.
Kaspersky PURE 3.0 Standard Installation
Installation process starts automatically after the CD is inserted into the CD-ROM drive.
If the software has been purchased online, then the link to installation file is sent to the
users’ email, which has to be launched manually
* After installation window opens, read the End User License Agreement and click Install.
After clicking install, Windows Firewall will be disabled, because Kaspersky PURE 3.0
includes a full-fledged Firewall
Mosse 03 Fags £0 ‘emitieg secure Computer Use Copyign © oy -Bomell
AllRights Reserved Reprocucion 2 Strict Prohiotee.Cis haed
oe
Iestling he appicalon
————
Fig. 3.1 Kaspersky nstoliatian Step}
"After installation is complete, users must tick check box for Run Kaspersky PURE 3.0.
The application will then automatically start after a system reboot:
Thank yout
‘Thank you for your choice of
Kaspersky Lab
~ fen Kaspersny PURE 3.0
Fig. 3.2 Kaspersky mstallation Step W
Merde 08 Page 82 cered Secure Computer User Copyright© Dy H-Beanell
‘Fgh Reserves Reprecucton Stic Protascere cure Comper et pam une
ator ana ave
‘Activating Kaspersky PURE 3.0
™ When the application launches, Setup window will prompt users to activate the
application. internet connection is required to activate the product
"Activate the tial version which is applicable only for a fixed period of time.
Note- When the trial version expires, itcannot be reactivated
ape gansanenet
‘Select activation method
ts
Wee CIC
Fig. 3.3 Activating kaspersky step |
The Setup Wizard informs users once activation is complete
Fig. 34 Kaspersky installation Step f!
(Mode 03 Page 22 Certied Secure Computer User Copyright © by R-beunell
“A Fgyts Receves Repremucon Série Promote‘certian Secure Computer User eam 22
‘Matare ane eviras
Computer Protection in Kaspersky PURE 3.0
Computer Protection is a comprehensive protection tool present in Kaspersky PURE 3.0.
This too! protects all data stored on a computer, against malware. It also blocks spam and
adware on websites. This tool protects computer from network attacks, and provides secure
Internet. It also protects systems against unknown threats. This tool is accessible via the
main application window of Kaspersky PURE 3.0.
KASPERSKY
Fig. 35 Computer protection in Kaspersky
How to Start a Scan Task in Kaspersky PURE
‘Scanning a computer system for malware and vulnerabilities is one af the most important tasks
of antivirus software. Kaspersky PURE 3.0 has three types of specialty scans:
"Full Scan- A detailed scan of entire system. It scans the following ites by default—
system memory, system backup, email databases, hard drives, removable storage
media, and network drives
"Critical Areas Scan- It scans entire operating system after startup
* Custom Scan- This allows scanning of any object on present.on a computer
To perform a scan task, use the following steps:
* Open Kaspersky PURE 3.0
= Incenter of application window, click on Scan
2 Click Full Scan, if a full scan is to be carried out
© inorder to scan-critical areas, click on Critical Areas link
2 Glick Custom Scan if a custom scan is to be run. Tick the objects for which users want
‘wo runa custom scan and click OK
Moise 03 Page 83 Certtied Secure Coonputr Use Copyright © >y EE Leamell
“ul nigrts Reserved Ragrecucton Sty Promina‘cerns sure Computer Urer eam sn
(Malece one Aen
ret
KASPER)KYS
Fig. 3.5 Starting a Sean Task in Kespersky
‘Configuring Parental Control in Kaspersky PURE 3.0
Parental Control module in Kaspersky PURE 3.0 enables users to apply restrictions on usage of
‘computer and Internet.
This module helps in safeguarding children and teenagers from adverse influences white using
computer and Internet, for example by preventing them spending long periods of time on
‘computers and by limiting access to websites intended for adults.
Parental Control helps users control the following:
"Usage of computer
= Launching of various programs
Time restriction regarding usage of the Internet
"Limiting access to websites intended for adults
"File downloads from the Internet depending on their category
"Sending of personal data
Parental Account in Kaspersky PURE 3.0 is configured by performing the following steps:
"Click on Parental Control in main application window
ecu 03 Page ot Ceniieasecue Computer Uee Copyrent ©0y-Oamell
AM NgpesRecred Regracadiont tay ProAbie hehe Wi me
ew | Wemmene een | soars
Fig, 37 Configuring Parental Contralin Kaspersty Step |
™ Create 3 password to access Parental Control settings so that it cannot be modified by
someone else
Administrator Password
eee entomna Carl we ornare cane sseers area
ee ertpeopsiatouneaon 9 wtatuee
‘umm passa seeennee
Gore | “an
Fig. 3.8 Configuring Parental Control in Kaspershy Step i!
oe 0 ages cries secure compute eer Copy © 2y 8 Oat
Ai gts Roened Reproacion Sty Prone.= Inthe Computer Users window, click Select control level button in the User section
A | Farnial Control
Sains
ed a] ae
Beate
‘Fig. 3.9 Configuring Porental Contrel in Kaspersky Step fll
"In Level of control for User window, select any ane of the given levels and proceed to
dick OK
(9 beef iawolf wast user
Level of eontrol for user user
Data calectoa
Chit peo
seinteroetkoes Game
Teenager protle
ln etd rel
‘Fig. 3.10 Configuring Parental Controlin Kaspersky Step 1V
ecu 03 Page 25 cenifensecure compute ner Copyrigt © 2 H-Oamell
AM NgpesRecred Regracadiont tay ProCcersfeasecure Computer rer eam sens
(Maare and Aetna
* Inthe Computer Users window, click on the Settings and reports tab in the User section
‘to access the parental control settings
|
j o
| z Computer Users
Fig. 3.11 Configuring Parental Control in kaspersky Step V
In the Settings tab, check Enable control for users. Users. can configure the following
actions
© Computer usage
© Programs usage
2. Internet usage
Web Browsing depending on websites contents
2. File downloads from the internet
2 Instant messaging via social networks like Facebook and Twitter
Private data transfer
‘Mogule 03 Page e7 \Certitied Secure Computer Weer Copyrient © 27 BE-Oaunell
Ugh: Reserved Resrecucicn Stil Profitcerisessecure Computer set cram e242
Hepa corne pee
a User acoure Sninge
ah
Ea
Fig. 3.12 Configuring Parental Contral in Kaspersky Step Vi
Avast Antivirus
This software provides fully functional malware detection, home network security and browser
Geanup. It has a series of integrated system protection such as malware detection, firewall,
‘email protection, Internet monitoring, and instant messaging monitoring.
‘Steps to install Avast Antivirus
"Once Avast Setup wizard appears, select license category and setup mode
™ Select Regular Installation for faster installation with default options. Select Custom
installation to select location of program files, and choose program components and
languages
Gpoorenemensse aa ee
=
Welcome to Avast
cer
===
Fig. 3.23 installing avast Antivirus Step 1
Modige 03 Paget Cried Scare Computer ee Copy © y B-Ball
4 Pggts Recarved Ragrecucic Sy Ponio.~
Please Don't Skip This — Read It Carefully
hay Sten rir ns ak
eine ey oer ee asi Ri
a
‘Fig. 3.446 stalling Avast antivirus Step tt
= Once installation is complete, the software will automatically launch.
pvest FREE ANTMRUS Setup.
oo”
installing the product
I) ott Fe Tt
_
Protect your Ancratd 108,
rom jour phen and
for tee
Fig. 2.15 installing Avast Antivirus Step Ut
Merde 08 Page 8 cered Secure Computer User Copyright© Dy H-Beanell
‘ght: Reserved Rasrecucion Sty Proninkec‘ceniessecure Computer usar
(Malece ond Aotivie
‘How to Register Avast Antivirus
Right-click on the orange ball in the system tray and select Registration Information
fromthe menu
‘pen Ast unr neta
Silretgamig mete
pa
Show it pope wesage
Fig. 3.16 Registering Avast Antivirus
"Inthe Subscription screen, click Register Now to open the registration window
= Enter the required data and dick Register
"Now, the Subscription page will display as Registered
How to Run a Seanon Avast Antivirus
"Goto Scanand dick on Scan for viruses
Fig. 3.17 To run a scan.on Avast Antivirus Step I
‘oc 03 Page so Cente secure Computer User Copyrient © oy f-Oamnell
{A Fights Reserved Reprocuction i Stic ProioteeCcemiseasecure Computer set cami
atware ana Acivruc
= Ontthe Scan window, select a type af scan from the drop-down menu and click Start
Efpvoan FREE ANTIVIRUS
_ Scan
Fig, 3.18 To run @scon an Avast Antivirus Step U
= After scanning is complete, the result appears with a notification
fevose PREEANTIRUS SIT x
Scan ita
sense
You can also scan your PC for pértormance issues!
Fig. 3.19 To run @ sean an Avast Antivirus Step it
Moeste 03 Page! Ceriied Secure Computer Usee Copyright © by EE-temnell
‘pres Reserved Rapronucin is Seren ronistas.cerdéeaserure compute User cram saz
Matwace ond Sete
‘How to Test if Antivirus is working?
Sometimes even after downloading and installing the antivirus software, it does not run. This
happens due to compatibility issues with other programs. The following test determines if the
installed antivirus is working and should be run as a practice after installing antivirus software.
EICAR Test— The EICAR file is @ harmless virus test file that all antivirus software recognize. This
file is easily created using 3 program such as Notepad. Ta create an EICAR test file, copy and
paste the following line into a blank Notepad file:
X50 |P¥«@AP[4\PZXS4(P*]7CC)7]SEICAR-STANDARD-ANTIVIRUS-TEST-FILEISH+H®
This file should be saved as EICAR.COM. If users’ antivirus software is active, the simple act of
saving the file will trigger an alert from antivirus software.
Antivirus Security checklist
This checklist will help users keep track of important tasks to be carried out for maintaining
security of computers.
= Install up to date antivirus software
= Configure: the antivirus software: to check all mediums (DVD-ROMs, email, pen drives,
external hard drives, websites, and downloaded files) for malware
= Install firewall software on all computers and workstations, and at every point where a
computer system is connected to other networks, including the Internet
* Configure firewall software to protect information on all computers
= Allow antivirus software to automatically scan users’ computers at least once a week
"Create procedures for automatically updating antivirus software
"Create procedures for handling computer viruses and other infections when they are
discovered
ocuge 03 Pages? Cente secure Computer ser Copyrgnt © by EE-Daunell
{All Rghts Reserved Reproduction Sty Probst.\ceisen secure Computer User fram 12242
‘Matwace ana Acivirus
Module Summary
Malware is malicious software or code that damages or disables, takes control of, or
steals information from a computer system
‘Types of Malware:
2. Virus
Trojan
Worm
Spyware
Ransomware
Rootkit
‘Antivirus is a software application that detects and eradicates malware from a computer
system
Examples of antivirus software— McAfee, Norton, AVG, and Avira
Techniques used by antivirus software to keep computers secure—Scanning and
Integrity Checking
‘Quarantine is an antivirus software function which isolates files suspected of being
infected with malware
oo o oo
Basis for choosing the best antivirus software—Reliability, Usability, Comprehensive
protection, and Quality of protection
Limitations of antivirus software—Limited detection techniques, does not fully protect,
slows down PC or network, and conflicts
Kaspersky PURE 3.0 is an antivirus software which ensures protection of computers
against all kinds of threats, secures data from loss and unauthorized usage, and protects
children and teenagers from thrests related to computer and Internet usage
‘Computer Protection is a comprehensive protection tool present in Kaspersky PURE 3.0
‘This tool protects all the data stored on a computer against malware. It also blocks spam
and adware on websites
‘The Parental Control module in Kaspersky PURE 3.0 enables the user to apply
restrictions on the usage of the computer and Internet
‘Avast Antivirus provides fully functional malware detection, home network security and
browser cleanup. it has a series of integrated system protection such as malware
detection, firewall, email protection, Internet monitoring, and instant messaging
monitoring
Medte08 Page Certed Secure Computer User Copyright© by EE-Beumell
‘Rights Reserves Raprocucin Strict Panne.Cartteasecure Computer rer eam saz
Mare and Antivir
Discussion Questions
1. Ifa person suspects his or her computer is infected with malware, which indicators can
confirm that thisis the case?
2. Emma won a laptop at her college science fair. The laptop does not have antivirus
software installed on ft. Emma has to purchase one. What factors should Emma keep in
mind before purchasing the software?
3. Gloria suspects that her laptop is infected with malware. Upon scanning the system
Using antivirus software, no malware is detected, Despite this, her laptop continues to
display symptoms of malware infection. What may be the reason for this?
Moose 03 Fagess Cente secure Computer ser Copyrgnt © by EE-Daunell
{All Rghts Reserved Reproduction Sty Probst.