Understanding Computer Viruses

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the general purpose of malware?

  • To enhance user experience
  • To improve computer performance
  • To provide additional features to software
  • To infiltrate or damage a computer system without consent (correct)

Which of the following is a type of malware?

  • Spyware (correct)
  • Firewall
  • Operating System
  • Antivirus

What does a computer virus primarily do?

  • Enhances network speed
  • Updates software automatically
  • Cleans computer hardware
  • Self-replicates (correct)

What is a common way for email viruses to spread?

<p>By automatically mailing copies to hundreds of people (B)</p>
Signup and view all the answers

What action is triggered when conditions are met in logic and time bombs?

<p>A certain function, like printing a message or deleting files (A)</p>
Signup and view all the answers

What are 'bait files' used for regarding computer viruses?

<p>To act as a sample for anti-virus software (C)</p>
Signup and view all the answers

What action does a virus take when employing a stealth/rootkit?

<p>It hides itself by intercepting anti-virus software requests (C)</p>
Signup and view all the answers

What is the main goal of a rootkit?

<p>To conceal running processes and files (A)</p>
Signup and view all the answers

What does it mean when a virus is called a 'companion' virus?

<p>It has the same file names as legitimate files (A)</p>
Signup and view all the answers

What is the primary method to avoid stealth?

<p>Booting from a medium known to be clean (D)</p>
Signup and view all the answers

What is a primary function of viruses that utilize self-modification techniques?

<p>Making detection by signatures difficult (B)</p>
Signup and view all the answers

If a virus is encrypted with a variable key, which part remains constant?

<p>The decrypting module (B)</p>
Signup and view all the answers

What is the purpose of a polymorphic engine in a virus?

<p>To enable polymorphic code (B)</p>
Signup and view all the answers

In metamorphic code, what action do viruses take to avoid detection?

<p>They rewrite themselves completely (D)</p>
Signup and view all the answers

What is a requirement for a virus to replicate itself?

<p>Permission to execute code and write to memory (D)</p>
Signup and view all the answers

What is the role of the 'finder module' in nonresident viruses?

<p>To find new files to infect (A)</p>
Signup and view all the answers

How do resident viruses operate?

<p>They load into memory and infect new hosts when files are accessed (C)</p>
Signup and view all the answers

What is a characteristic of 'fast infector' viruses?

<p>They infect as many files as possible (C)</p>
Signup and view all the answers

Which of these file types can be host types for a virus?

<p>Binary executable files (.exe) (A)</p>
Signup and view all the answers

How does a computer worm spread?

<p>By sending copies of itself over a network (C)</p>
Signup and view all the answers

What's a characteristic of email worms?

<p>They arrive via email where the message contains the worm code (B)</p>
Signup and view all the answers

What is a typical target of IRC worms?

<p>Chat channels (C)</p>
Signup and view all the answers

What is the action of 'file-sharing networks worms'?

<p>Copying itself into a shared folder (D)</p>
Signup and view all the answers

What is a typical payload of worms that can be installed on a computer?

<p>A backdoor program (C)</p>
Signup and view all the answers

Antivirus software typically uses what techniques to accomplish its primary mission?

<p>Examining files and identifying suspicious behavior (D)</p>
Signup and view all the answers

What are the common work modes of antivirus software?

<p>Static file scanning and real-time scanning (A)</p>
Signup and view all the answers

What action does an anti-virus take after identifying a virus by using its virus dictionary?

<p>It attempts to repair, quarantine, or delete the infected file (D)</p>
Signup and view all the answers

For anti-virus effectiveness, what action should a user to do?

<p>Update virus dictionary entries (B)</p>
Signup and view all the answers

What is a disadvantage of using the 'suspicious behavior' approach in antivirus software?

<p>It can have a high rate of false positives (B)</p>
Signup and view all the answers

What is the anti-virus technique of heuristic analysis?

<p>Emulating code (D)</p>
Signup and view all the answers

What type of security mechanism runs programs safely in a contained environment?

<p>Sandbox (D)</p>
Signup and view all the answers

What is a limitation of antivirus software?

<p>They are reactive (C)</p>
Signup and view all the answers

What can malware do if it has sufficient system permissions?

<p>Change antivirus settings (B)</p>
Signup and view all the answers

What do retro viruses attack?

<p>Security programs (D)</p>
Signup and view all the answers

What characteristic should security tools exhibit to evade antivirus detection?

<p>Metamorphic (C)</p>
Signup and view all the answers

What problem might security systems designed at the network level run into?

<p>Malware shutting down the security systems (D)</p>
Signup and view all the answers

What kind of virus is Win32/Simile?

<p>A metamorphic virus (D)</p>
Signup and view all the answers

What is a known component of SQL slammer worms regarding its disk size?

<p>376 bytes (C)</p>
Signup and view all the answers

How is a computer infected by SQL slammer worm?

<p>By using an unpatched copy of Microsoft SQL server Resolution (C)</p>
Signup and view all the answers

What characteristic defines malware?

<p>It is designed to infiltrate and potentially damage systems without consent. (A)</p>
Signup and view all the answers

Why might a virus writer create a computer virus?

<p>As a form of artistic expression or a research project. (B)</p>
Signup and view all the answers

What is the key characteristic of boot sector viruses?

<p>They modify or hide in the boot sector of a disk. (B)</p>
Signup and view all the answers

How do companion viruses trick users into executing them?

<p>By having filenames similar to legitimate files and relying on the order in which DOS executes files. (D)</p>
Signup and view all the answers

Which of the following is a primary characteristic of macro viruses?

<p>They are commonly written in scripting languages for programs like Microsoft Word and Excel. (C)</p>
Signup and view all the answers

Why do viruses avoid infecting anti-virus files?

<p>To prevent detection by the anti-virus software. (A)</p>
Signup and view all the answers

How can a virus use stealth to hide itself on a system?

<p>By intercepting anti-virus software requests and providing uninfected versions of files. (C)</p>
Signup and view all the answers

What is the purpose of a rootkit?

<p>To conceal running processes, files, or system data. (B)</p>
Signup and view all the answers

What is a reliable method for avoiding stealth techniques employed by rootkits?

<p>Booting from a clean, trusted medium. (A)</p>
Signup and view all the answers

How do self-modifying viruses complicate detection?

<p>By altering their code on each infection, making signature-based detection difficult. (C)</p>
Signup and view all the answers

In a virus that uses encryption with a variable key, what component remains constant?

<p>The decrypting module. (C)</p>
Signup and view all the answers

What is the function of a polymorphic engine in a virus?

<p>To alter the virus's decryption module on each infection. (B)</p>
Signup and view all the answers

How do metamorphic viruses avoid detection?

<p>By rewriting themselves completely each time they infect a new executable. (C)</p>
Signup and view all the answers

For a virus to successfully replicate, what action must it be permitted to perform?

<p>Execute code and write to memory. (A)</p>
Signup and view all the answers

What action characterizes how resident viruses operate?

<p>They load into memory and infect new hosts as they are accessed. (C)</p>
Signup and view all the answers

What potentially problematic situation is caused by 'fast infector' viruses?

<p>They can 'piggy-back' on virus scanners and infect all scanned files. (A)</p>
Signup and view all the answers

Which type of file is a potential host for a virus?

<p>Binary executable files (.exe, .com). (D)</p>
Signup and view all the answers

What is the main difference between a worm and a virus, concerning harm?

<p>Worms always harm the network, whereas viruses always infect or corrupt files on a targeted computer. (D)</p>
Signup and view all the answers

How does a file-sharing network worm spread to other computers?

<p>By copying itself into a shared folder on the local machine. (D)</p>
Signup and view all the answers

What action is a common payload for worms, after infecting a system?

<p>Installing a backdoor to allow unauthorized access. (C)</p>
Signup and view all the answers

What is the role of the 'virus dictionary' in antivirus software?

<p>To provide definitions of known viruses for scanning purposes. (A)</p>
Signup and view all the answers

How does dictionary-based antivirus software typically detect viruses?

<p>By examining files when the OS creates, opens, closes or e-mails them. (C)</p>
Signup and view all the answers

Why does antivirus software require periodic updates of its virus dictionary?

<p>To include information about newly discovered viruses. (C)</p>
Signup and view all the answers

Why is 'suspicious behavior' an important detection method for brand-new viruses?

<p>It can detect viruses that are not yet defined in virus dictionaries. (D)</p>
Signup and view all the answers

What is a potential drawback of relying solely on suspicious behavior analysis for virus detection?

<p>It can lead to a large number of false positives, desensitizing users to warnings. (C)</p>
Signup and view all the answers

What is the primary function of heuristic analysis in antivirus software?

<p>To emulate code execution and identify potentially malicious behavior. (D)</p>
Signup and view all the answers

In the context of antivirus software, what is a 'sandbox'?

<p>A virtual test environment for safely running programs. (A)</p>
Signup and view all the answers

Why might sandbox analysis not always detect a virus?

<p>Viruses can be nondeterministic, leading to different actions in each run. (D)</p>
Signup and view all the answers

Why are reactive approaches considered a weakness of antivirus software?

<p>Its effectiveness depends on the program and definitions. (C)</p>
Signup and view all the answers

Why is the inability of antivirus software to protect itself considered a security weakness?

<p>It allows malware to change antivirus settings and configurations. (D)</p>
Signup and view all the answers

What is the meaning of "installation process" in relation to why antivirus software might not disinfect malware files?

<p>Malware includes writing configuration files for other software, registry keys etc. (C)</p>
Signup and view all the answers

What is the primary target of retro viruses?

<p>Security programs like antivirus software. (C)</p>
Signup and view all the answers

What characteristic should tools have in order to evade antivirus detection?

<p>Polymorphic or metamorphic code. (C)</p>
Signup and view all the answers

What is the issue regarding network intrusion detection systems, concerning malware?

<p>Malware could exploit or shut down the system. (C)</p>
Signup and view all the answers

What is a significant factor regarding the efficiency of the SQL slammer worm?

<p>Its compact and small code helps avoid writing to disk, increasing memory use. (D)</p>
Signup and view all the answers

Flashcards

Malware

Software designed to infiltrate or damage a computer system without the owner's consent.

Computer Virus

A self-replicating computer program that alters a computer's operation without permission.

Boot Sector Virus

A virus that alters or hides in boot sector of a drive.

Companion Viruses

Viruses that create new files with similar names to legitimate files.

Signup and view all the flashcards

Email Viruses

Viruses that use e-mail messages to spread copies of themselves.

Signup and view all the flashcards

Logic/Time Bombs

Code that lies inert until specific conditions are met, triggering a function like deleting files.

Signup and view all the flashcards

Macro Viruses

Viruses written in scripting languages for programs like Word/Excel spread in Microsoft Office.

Signup and view all the flashcards

Stealth/Rootkit Virus

A virus avoids detection by hiding or modifying itself when scanned.

Signup and view all the flashcards

Bait Files

Files created by antivirus software used to detect viruses.

Signup and view all the flashcards

Self-Modification

Modifying the way it looks to avoid detection.

Signup and view all the flashcards

Encryption Viruses

Viruses that contains decrypting module and an encrypted copy of the virus code.

Signup and view all the flashcards

Polymorphic Code

A virus with polymorphic engine to modify the decryption module on each infection.

Signup and view all the flashcards

Metamorphic Code

Rewrites itself completely each time it infects new files.

Signup and view all the flashcards

Resident vs. Nonresident Viruses

Two types of virus replication strategies.

Signup and view all the flashcards

Fast Infectors

Infects many files as possible.

Signup and view all the flashcards

Slow Infectors

Infects hosts infrequently to avoid detection.

Signup and view all the flashcards

Computer Worm

A self-replicating program that uses a network to send copies of itself, without attaching to an existing program.

Signup and view all the flashcards

Email Worms

Spreads through email messages.

Signup and view all the flashcards

Instant Messaging Worms

Spreads via instant messaging applications.

Signup and view all the flashcards

IRC Worms

Spreads via chat channels.

Signup and view all the flashcards

File-Sharing Networks Worms

Places copy of itself in a shared folder.

Signup and view all the flashcards

Internet Worms

Targets low level TCP/IP ports directly.

Signup and view all the flashcards

Payloads

Code that designed to do more than spread the worm, deletes files, encrypt files, or send documents.

Signup and view all the flashcards

Antivirus Software

Examines files for known viruses and identifies suspicious behavior.

Signup and view all the flashcards

"Static" File Scanning

Useful for when you have to scan a file to check.

Signup and view all the flashcards

Real-Time Dynamic Scanning

Preventing the computer from getting infected in the first place.

Signup and view all the flashcards

Signature

Characteristic byte-pattern that is part of a certain virus family.

Signup and view all the flashcards

Metamorphic/Polymorphic Code

Virus's Technology to avoid the Dictionary Approach.

Signup and view all the flashcards

Suspicious Behavior Approach

Monitors the behavior of programs, not just their code.

Signup and view all the flashcards

Heuristic Analysis

Emulate the beginning of the code of each new executable.

Signup and view all the flashcards

Sandbox

A security mechanism to run programs safely.

Signup and view all the flashcards

Retro Viruses

Techniques to avoid detection.

Signup and view all the flashcards

Rootkit

Software that is intended to conceal running processes and data from the operating system.

Signup and view all the flashcards

Virtualised Rootkit

A rootkit that modifies the boot sequence of the machine.

Signup and view all the flashcards

Kernel level Rootkit

Rootkits that add additional code and/or replace a portion of kernel code.

Signup and view all the flashcards

Library Level Rootkit

Rootkits for replacing or patching system calls.

Signup and view all the flashcards

Application Level Rootkit

Applies regular application binaries.

Signup and view all the flashcards

Black Antivirus

Antivirus used towards bad purposes.

Signup and view all the flashcards

Win32/Simile

A computer virus that infects assembly language for Microsoft Windows.

Signup and view all the flashcards

SQL slammer worm

A computer worm that caused a denial of service on some Internet hosts.

Signup and view all the flashcards

Network Shield

Anti-virus software, acts as a lightweight Intrusion Detection System.

Signup and view all the flashcards

Reactive Approach

The inability to protect themself.

Signup and view all the flashcards

Study Notes

  • Malware is software designed to infiltrate or damage a computer system without the owner's consent.
  • Types of malware include spyware, adware, Trojan horses, Worms, and viruses.

Computer Virus

  • A computer virus is a self-replicating computer program written to alter the way a computer operates, without the permission or knowledge of the user.
  • Some virus writers consider their creations to be works of art or a creative hobby.
  • Viruses have been written as research projects, pranks, vandalism, or to attack the products of specific companies.
  • Some viruses were intended as "good viruses" to spread improvements to other programs.
  • "Good viruses" or rare though, still consume system resources, and may accidentally damage systems.

Types of Viruses

  • Boot sector viruses alter or hide in the boot sector of a bootable disk or hard drive.
  • Boot sector viruses contain code for bootstrapping programs (usually activates, but not necessarily, operating systems).
  • Boot sector infector viruses replace the bootstrap code in the boot sectors with viral code.
  • The BIOS on IBM PC compatible machines is ignorant of whether a disk has in fact been high-level formatted and has an operating system installed in it.
  • Companion viruses create new files, typically .COM, but can use other extensions such as ".EXD," that have the same file names as legitimate .EXE files.
  • For companion viruses, if the user does not type in ".EXE" but instead does not specify a file extension, DOS will assume he meant the extension that comes first in alphabetical order and run the virus.
  • Email viruses use email messages as a mode of transport.
  • Email viruses copy themselves by automatically mailing copies to hundreds of people in the victim's address book.
  • Logic and time bombs employs code that lies inert until specific conditions are met.
  • Macro viruses are written in the scripting languages for Microsoft programs, such as Word and Excel, and are spread in Microsoft Office by infecting documents and spreadsheets.
  • Cross-site scripting viruses utilize cross-site scripting vulnerabilities to replicate.

Virus Detection

  • A virus needs to infect hosts in order to spread further.
  • Avoiding bait files and other undesirable hosts, many anti-virus programs perform an integrity check of their own code.
  • Bait files (or goat files) are files that are specially created by anti-virus software.
  • Anti-virus professionals can use bait files to take a sample of a virus.
  • Anti-virus professionals can use bait files to study the behavior of a virus and evaluate detection methods.
  • Some anti-virus software employs bait files that are accessed regularly.
  • A virus can hide itself - Stealth\Rootkit - by intercepting the anti-virus software's request to read the file and passing the request to the virus, instead of the OS.
  • The virus can then return an uninfected version of the file to the anti-virus software, so that it seems that the file is "clean".
  • Modern anti-virus software employs various techniques to counter stealth mechanisms of viruses.

Rootkit

  • A rootkit is a set of software tools intended to conceal running processes, files, or system data from the operating system.
  • Virtualized rootkits work by modifying the boot sequence of the machine to load themselves instead of the original operating system.
  • Once loaded into memory, a virtualized rootkit loads the original operating system as a Virtual Machine, enabling the rootkit to intercept all hardware calls made by the guest OS.
  • Kernel level rootkits add additional code and/or replace a portion of kernel code with modified code to help hide a backdoor on a computer system.
  • Library level rootkits commonly patch, hook, or replace system calls with versions that hide information about the attacker.
  • Application level rootkits may replace regular application binaries with trojanized fakes, or they may modify the behavior of existing applications using hooks, patches, injected code, or other means.
  • A reliable method to avoid stealth is to boot from a medium that is known to be clean, then shut down the computer and check storage by booting from an alternative media (e.g. rescue CD-ROM or USB flash drive).

Virus Self-Modification

  • Some viruses employ techniques that make detection by means of signatures difficult or impossible.
  • These viruses modify their code on each infection with each infected file containing a different variant of the virus.
  • Viruses may exchange subroutines in their code for others that would perform the same action. For example, 2+2 can be swapped for 1+3.
  • A more advanced method is the use of simple encryption to encipher the virus.
  • The virus consists of a small decrypting module and an encrypted copy of the virus code.
  • The virus is encrypted with a different key for each infected file with the decrypting module remains constant.
  • Polymorphic code has a polymorphic engine (also called a mutating engine or mutation engine) somewhere in its encrypted body.
  • Anti-virus software can detect polymorphic code by decrypting the viruses using an emulator or by statistical pattern analysis of the encrypted virus body.
  • Metamorphic code avoids detection by emulation by rewriting themselves completely each time they are to infect new executables.
  • This rewrite is done by translating its own code into a temporary representation, and then back to normal code again.
  • W32/Simile consisted of over 14000 lines of Assembly language code, and 90% of it was the metamorphic engine.

Replication

  • In order to replicate itself, a virus must be permitted to execute code and write to memory.
  • Many viruses will attach themselves to executable files.
  • Nonresident viruses search for other hosts to infect and transfer control when infected.
  • Nonresident viruses consist of a finder module and a replication module.
  • Resident viruses do not search for hosts when they are started. They load themselves into memory on execution and transfer control to the host program.
  • Fast infectors are designed to infect as many files as possible, every potential host file that is accessed, creating a problem for anti-virus software because a virus scanner will access every file.
  • Slow infectors are designed to infect hosts infrequently to avoid detection.
  • Slow infecters' actions are limited and will not trigger anti-virus software.

Host Types

  • Binary executable files like COM files and EXE files in MS-DOS, Portable Executable files in Microsoft Windows, and ELF files in Linux
  • Volume Boot Records of floppy disks and hard disk partitions
  • The master boot record (MBR) of a hard disk
  • General-purpose script files in MS-DOS, Microsoft Windows, VBScript files, and shell script files on Unix-like platforms.
  • Application-specific script files (such as Telix-scripts)
  • Documents that can contain macros

Computer Worm

  • A computer worm is a self-replicating computer program that uses a network to send copies of itself to other nodes (computer terminals on the network).
  • It does this without any user intervention and it does not need to attach itself to an existing program.
  • Worms always harm the network, whereas viruses always infect or corrupt files on a targeted computer.
  • Email Worms spread via email messages, typically the worm will arrive as email, where the message body or attachment contains the worm code, but it may also link to code on an external website.
  • Instant messaging worms are spread via instant messaging applications by sending links to infected websites to everyone on the local contact list.
  • IRC worms use Chat channels as the main target.
  • File-sharing networks worms copy themselves into a shared folder, the worm will place a copy of itself in a shared folder under a harmless name and wait to be downloaded.
  • Internet worms target low level TCP/IP ports directly, an example is Blaster which exploited a vulnerability in Microsoft's RPC on port 135.
  • Payloads are code designed to do more than spread the worm, it might delete files on a host system (e.g. the ExploreZip worm), encrypt files in a cryptoviral extortion attack, or send documents via email.

Antivirus Software

  • Antivirus software uses two different techniques - examining (scanning) files to look for known viruses matching definitions in a virus dictionary and identifying suspicious behavior from any computer program.
  • Anti-virus programs have two basic modes: "static" file scanning and real-time "dynamic" scanning.
  • Anti-virus software examines a file using these actions: attempt to repair file, quarantine file, delete file.
  • The virus dictionary approach requires periodic downloads of updated virus dictionary entries.
  • Users identify new viruses and send their infected files to the authors of antivirus software to include in their dictionaries.
  • Dictionary-based antivirus software examines files when the computer's operating system creates, opens, closes or emails them.
  • A system administrator can schedule the antivirus software to examine all files on the user's hard disk regularly.
  • Virus's Technology to avoid the Dictionary Approach is Metamorphic code, Polymorphic code and Oligomorphic engine.
  • Previous technology weakness are Polymorphism where a small portion of it is left unencrypted. Anti-virus software targets this small unencrypted portion of code, or by statistical pattern analysis of the encrypted virus body.
  • The suspicious behavior approach doesn't attempt to identify known viruses, but instead monitors the behavior of all programs through a number of means.
  • Heuristic analysis, anti-virus software tries to emulate the beginning of the code of each new executable that the system invokes before transferring control to that executable for self-modifying code.
  • Heuristic scanners have a higher rate of false positives due to signature scanners, but are able to detect unknown viruses.
  • Sandbox, A sandbox is a security mechanism for safely running programs by emulating the operating system and runs the executable and analyzes for malicious activity.
  • Sandbox detection is mostly used on on-demand scans

Weaknesses of Antivirus Software

  • Antivirus is only as good as the definition files, so it is reactive. Problems arise is detecting new/modified code, rootkits and software misuse.
  • Malware can change anti-virus settings and configuration with sufficient system permissions.
  • Malware changes system files, system configuration files, and registry files that are still present after antivirus scans.
  • The industry is moving to “Removal Tool" in cases where an infection happens.

Retro Viruses

  • Retro viruses target security programs using an "Attack is the best defense strategy."
  • Malware, instead of hiding from detection by security SW, targets these SW as its (part of) malicious action.

Black Antivirus

  • A (white) antivirus is used for the good purposes, and Black Antivirus is the same antivirus, but for the "bad" purposes.
  • The "virus definition database" defines security tools which defend and protect computer systems.
  • These security tools need to be a polymorphic or even metamorphic.

Black Intrusion Detection System

  • Malware can use the IDS system to "shut down" security systems at the network level.
  • Such malware will target internal corporate LAN and carry its own IDS engine or change the existing one (if possible).
  • Malware carries its own engine and use MAC and ARP poisoning to sniff data.
  • Any communication that passes the wire for an attack is subject to discovery.
  • Covert-channels may be the solution.

Win32/Simile

  • Win32/Simile - A metamorphic computer virus written in assembly language for Microsoft Windows (most recent version in early March 2002).
  • It was written by the virus writer Mental Driller.
  • Checks the current date and if the host file (.dll) import the file User32, then on the 17th of March, June, September, or December, a message is displayed.
  • On May 14, a message saying "Free Palestine!" will be displayed if the system is set to Hebrew.
  • It rebuilds itself in a complex metamorphic process that accounts for 90% of code.
  • It searches for executable files in folders on all fixed and remote drives.
  • The virus contains checks to avoid infecting "goat" or "bait" files.
  • The infection process uses the structure of the host and random factors.
  • It contains no destructive payload.

SQL Slammer Worm

  • SQL slammer worm is a computer worm that caused a denial of service on some Internet hosts and dramatically slowed down general Internet traffic, infecting 75,000 victims within ten minutes.
  • It exploited two buffer overflow bugs in Microsoft's SQL Server and Desktop Engine database products.
  • It is a small (376 bytes) piece of code that generates random IP addresses and sends itself out to those addresses.
  • If a selected address happens to belong to a host that is running an unpatched copy of Microsoft SQL Server, the host is infected and spraying worm over the internet.
  • It does not contain code to write to disk, only stays in memory.

Example AntiVirus Features

  • Standard Shield and Real-time protection
  • IM shield for Instant Messenger protection
  • P2P shield for P2P protection
  • Internet Mail and E-mail protection
  • Outlook/Exchange - Microsoft Outlook/Exchange protection
  • Web Shield and HTTP protection (local transparent proxy)
  • Script blocker for script checker
  • Network Shield basic protection against network worms/Intrusion Detection System (IDS)
  • Audible alarms such as "Caution, a virus has been detected!"
  • Boot-time scan to remove startup files.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Virus Characteristics
5 questions

Virus Characteristics

PreEminentForsythia avatar
PreEminentForsythia
Types of Computer Virus
10 questions

Types of Computer Virus

SlickJadeite6146 avatar
SlickJadeite6146
Cybersecurity: Viruses and Malware
15 questions

Cybersecurity: Viruses and Malware

DignifiedEiffelTower9877 avatar
DignifiedEiffelTower9877
Use Quizgecko on...
Browser
Browser