![Page 1: Antivirus programs and Security Teams in E-Commerce by Ilakia](https://reader033.vdocument.in/reader033/viewer/2022060119/5590424b1a28ab3d4a8b459f/html5/thumbnails/1.jpg)
ANTIVIRUS PROGRAMS
PRESENTED
BY
ILAKIA
![Page 2: Antivirus programs and Security Teams in E-Commerce by Ilakia](https://reader033.vdocument.in/reader033/viewer/2022060119/5590424b1a28ab3d4a8b459f/html5/thumbnails/2.jpg)
INTRODUCTION
One of the most high profile threats to information integrity is
Network viruses. Network viruses are software that behaves like
biological viruses—they attach themselves to a host and replicate,
spreading the infection. For a computer program to be classified as
a virus, it simply must replicate itself. In this paper (Antivirus
programs and Security Terms), I am presenting what are terms and
viruses, worms, security terms which are provide in
E-Commerce website to from hackers.
![Page 3: Antivirus programs and Security Teams in E-Commerce by Ilakia](https://reader033.vdocument.in/reader033/viewer/2022060119/5590424b1a28ab3d4a8b459f/html5/thumbnails/3.jpg)
VIRUS
A self-replicating program.
A piece of software code that inserts itself into a
host, including the operating systems, in order
to propagate; it requires that its host program
be run to activate it
Often Viruses require a host, and their goal is to
infect other files so that the virus can live longer.
![Page 4: Antivirus programs and Security Teams in E-Commerce by Ilakia](https://reader033.vdocument.in/reader033/viewer/2022060119/5590424b1a28ab3d4a8b459f/html5/thumbnails/4.jpg)
WORMS
A software program that runs independently,
consuming the resources of its host in order to
maintain itself, that is capable of propagating a
complete working version of itself onto another
machine.
![Page 5: Antivirus programs and Security Teams in E-Commerce by Ilakia](https://reader033.vdocument.in/reader033/viewer/2022060119/5590424b1a28ab3d4a8b459f/html5/thumbnails/5.jpg)
Worms are insidious because they rely less (or
not at all) upon human behavior in order to
spread themselves from one computer to
others.
Especially JAVA – BASED applets found on web
sites could easily contain viruses.
![Page 6: Antivirus programs and Security Teams in E-Commerce by Ilakia](https://reader033.vdocument.in/reader033/viewer/2022060119/5590424b1a28ab3d4a8b459f/html5/thumbnails/6.jpg)
TORJAN HORSE
A program that appears to have a useful
function but that contains a hidden function
that presents a security risk.
A new variant of a Trojan program that stole tens of
thousands of stolen identities from 125 countries
that the victims believed were collected by a
legitimate company
![Page 7: Antivirus programs and Security Teams in E-Commerce by Ilakia](https://reader033.vdocument.in/reader033/viewer/2022060119/5590424b1a28ab3d4a8b459f/html5/thumbnails/7.jpg)
THE NATURE OF VIRUSES
A computer virus carries in its instructional code the
capability for making copies of itself.
The typical virus takes temporary control of a
computer’s disk OS.
Whenever the infected computer comes into contact
with an uninfected piece of software, a fresh copy of
the virus passes into the new program.
The infection can be spread from computer to
computer by unsuspecting user, who access the
website and send programs on a network.
![Page 8: Antivirus programs and Security Teams in E-Commerce by Ilakia](https://reader033.vdocument.in/reader033/viewer/2022060119/5590424b1a28ab3d4a8b459f/html5/thumbnails/8.jpg)
The virus can do anything that other program do;
The only difference is that it attaches itself to another program
and executes secretly every time when the host program is
run.
Unfortunately, after a virus is executing, it can perform any
function, such as erasing files and programs.
The simple virus only infect the programs might work
something like this:
![Page 9: Antivirus programs and Security Teams in E-Commerce by Ilakia](https://reader033.vdocument.in/reader033/viewer/2022060119/5590424b1a28ab3d4a8b459f/html5/thumbnails/9.jpg)
Find the first program instruction.
Replace it with a jump to the memory
location following the last instruction in
program.
Insert a copy of the virus code at that
location.
Have the virus simulate the instruction
replace by jump.
Jump back to the second instruction of the
host program.
Finish executing the host program.
![Page 10: Antivirus programs and Security Teams in E-Commerce by Ilakia](https://reader033.vdocument.in/reader033/viewer/2022060119/5590424b1a28ab3d4a8b459f/html5/thumbnails/10.jpg)
COUNTERING THE THREAT OF VIRUS
The basic solution for the thread of viruses is prevention:
do not allow a virus to get into the system in the first
place.
This goal is impossible to achieve, although prevention
can
reduce the number of successful viral attacks.
The next best approach is to do following:
![Page 11: Antivirus programs and Security Teams in E-Commerce by Ilakia](https://reader033.vdocument.in/reader033/viewer/2022060119/5590424b1a28ab3d4a8b459f/html5/thumbnails/11.jpg)
DETECTION
After the infection has occurred,
determine that it has occurred and
locate the virus.
![Page 12: Antivirus programs and Security Teams in E-Commerce by Ilakia](https://reader033.vdocument.in/reader033/viewer/2022060119/5590424b1a28ab3d4a8b459f/html5/thumbnails/12.jpg)
PURGING
Remove the virus from all infected
systems so that the disease cannot
spread further.
![Page 13: Antivirus programs and Security Teams in E-Commerce by Ilakia](https://reader033.vdocument.in/reader033/viewer/2022060119/5590424b1a28ab3d4a8b459f/html5/thumbnails/13.jpg)
RECOVERY
Recover any lost data or programs
from the user host system
![Page 14: Antivirus programs and Security Teams in E-Commerce by Ilakia](https://reader033.vdocument.in/reader033/viewer/2022060119/5590424b1a28ab3d4a8b459f/html5/thumbnails/14.jpg)
![Page 15: Antivirus programs and Security Teams in E-Commerce by Ilakia](https://reader033.vdocument.in/reader033/viewer/2022060119/5590424b1a28ab3d4a8b459f/html5/thumbnails/15.jpg)
SECURITY TEAMS
The issue of network and internet security have
become increasingly more important as more and
more businesses and people go on-line.
Teams of people have formed to assist on solving
hacker attacks and to disseminate information on
security attacks and how to prevent them.
![Page 16: Antivirus programs and Security Teams in E-Commerce by Ilakia](https://reader033.vdocument.in/reader033/viewer/2022060119/5590424b1a28ab3d4a8b459f/html5/thumbnails/16.jpg)
Two such teams are
Computer Emergency Response Team
(CERT)
Forum of Incident Response and
Security Teams (FIRST)
![Page 17: Antivirus programs and Security Teams in E-Commerce by Ilakia](https://reader033.vdocument.in/reader033/viewer/2022060119/5590424b1a28ab3d4a8b459f/html5/thumbnails/17.jpg)
COMPUTER EMERGENCY RESPONSE TEAM (CERT)
The Computer Emergency Response Team
(CERT) exists as a point of contact for suspect
security problems related to the Internet.
CERT can help determine the scope of the
threat and recommend and appropriate response.
A World Wide Web page supplied by the
Software Engineering Institute Posts CERT
advisories.
![Page 18: Antivirus programs and Security Teams in E-Commerce by Ilakia](https://reader033.vdocument.in/reader033/viewer/2022060119/5590424b1a28ab3d4a8b459f/html5/thumbnails/18.jpg)
The Web Page is located at
http://www.sei.cmu.edu.
CERT can also be accessed via anonymous FTP
from info.cert.org.
If you choose, you can also be added to Cert’s
mailing list; send mail to cert-advisory-
![Page 19: Antivirus programs and Security Teams in E-Commerce by Ilakia](https://reader033.vdocument.in/reader033/viewer/2022060119/5590424b1a28ab3d4a8b459f/html5/thumbnails/19.jpg)
FORUM OF INCIDENT RESPONSE AND SECURITY TEAMS (FIRST)
Security threats are problem that affect computers and
networks around the world.
FIRST is made up of a variety of Computer Emergency
Response Teams including teams from government, business
and academic sectors.
FIRST plan to cultivate cooperation and coordination
between teams in a attempt to decrease reaction time to
security incidents and promote information sharing among
team members.
The FIRST is made up of the following teams.
![Page 20: Antivirus programs and Security Teams in E-Commerce by Ilakia](https://reader033.vdocument.in/reader033/viewer/2022060119/5590424b1a28ab3d4a8b459f/html5/thumbnails/20.jpg)
CERT-NT SURFnet Response Team
Netherlands
AUSCERT Australian Computer Emergency Response Team
Australia
DFN-CERT German Federal Networks CERT
USA
CIAC DOE Computer Incident Advisory Capability
USA
NASIRC NASA Automated Systems Incident Response Capability
USA
![Page 21: Antivirus programs and Security Teams in E-Commerce by Ilakia](https://reader033.vdocument.in/reader033/viewer/2022060119/5590424b1a28ab3d4a8b459f/html5/thumbnails/21.jpg)
VA U.S. Veterans Health Administration
USA
SWITCH-CERT Swiss Academic and Research Network CERT
Switzerland
SUNSeT Stanford University Security Team
USA
PCERT Purdue University Computer Emergency Response Team
USA
CERT Coordination Center
CERT Coordination Center
USA
![Page 22: Antivirus programs and Security Teams in E-Commerce by Ilakia](https://reader033.vdocument.in/reader033/viewer/2022060119/5590424b1a28ab3d4a8b459f/html5/thumbnails/22.jpg)
SECURITY TIPS
Use protection software "anti-virus software" and keep it up to
date.
Don't open email from unknown sources.
Use hard-to-guess passwords.
Protect your computer from Internet intruders -- use "firewalls".
Don't share access to your computers with strangers. Learn
about file
sharing risks.
Back up your computer data.
![Page 23: Antivirus programs and Security Teams in E-Commerce by Ilakia](https://reader033.vdocument.in/reader033/viewer/2022060119/5590424b1a28ab3d4a8b459f/html5/thumbnails/23.jpg)
Thank you