8/6/2019 Internet Security- User's Perspective
1/65
Cyber Laws ProjectCyber Laws Project
Internet Security:Internet Security:Users PerspectiveUsers Perspective
8/6/2019 Internet Security- User's Perspective
2/65
Presented To:Presented To:--
Dr. Hitesh KapoorDr. Hitesh Kapoor
Asstt. ProfessorAsstt. Professor
Dept. of Applied SciencesDept. of Applied Sciences
Presented By:Presented By:--
Siddharth BhardwajSiddharth Bhardwaj Surbhi VijhSurbhi Vijh
UE 85094UE 85094 UE 85098UE 85098
8/6/2019 Internet Security- User's Perspective
3/65
IntroductionIntroduction
InternetInternet SecuritySecurity:: UsersUsers PerspectivePerspective isis aastudystudy onon thethe variousvarious practicespractices andand precautionsprecautionsaa useruser mustmust undertakeundertake toto protectprotect his/herhis/her
computercomputer systemsystem fromfrom thethe viableviable threatsthreats whenwhenconnectedconnected inin aa computercomputer networknetwork (Internet)(Internet)..
TheThe topictopic isis aimedaimed atat understandingunderstanding thethe variousvariousthreatsthreats thatthat areare encounteredencountered onon aa widespreadwidespreadbasisbasis andand thethe variousvarious securitysecurity measuresmeasures thatthatneedneed toto bebe implementedimplemented soso asas toto countercounter themthem..
8/6/2019 Internet Security- User's Perspective
4/65
Internet SecurityInternet Security
InternetInternet securitysecurity isis aabranchbranch of of computercomputersecuritysecurity specificallyspecifically relatedrelatedtoto thethe InternetInternet.. ItsItsobjectiveobjective isis toto establishestablishrulesrules andand measuresmeasures toto useuseagainstagainst attacksattacks overover thetheInternetInternet.. TheThe InternetInternetrepresentsrepresents anan insecureinsecure
channelchannel forfor exchangingexchanginginformationinformation leadingleading toto aahighhigh riskrisk ofof intrusionintrusion ororfraud,fraud, suchsuch asas phishingphishing..
8/6/2019 Internet Security- User's Perspective
5/65
Need: Internet SecurityNeed: Internet Security
oo SecuritySecurity notnot aa designdesignconsiderationconsideration
oo ImplementingImplementing changechange isis
difficultdifficultoo OpennessOpenness makesmakes machinesmachines
easyeasy targetstargets
oo IncreasingIncreasing complexitycomplexity
oo RisingRising numbernumber ofof threatsthreats ininthethe formform of of viruses,viruses,trojans,trojans, worms,worms, spamspam etcetc..
8/6/2019 Internet Security- User's Perspective
6/65
Rising Security IncidentsRising Security Incidents
19901980
High
Low 2000 -from Cisco Systems
TechnicalKnowledgeRequired
Sophisticationof Hacker
Tools
8/6/2019 Internet Security- User's Perspective
7/65
Internet Security?Internet Security?
KeyloggersKeyloggers
8/6/2019 Internet Security- User's Perspective
8/65
The Most Common ExcusesThe Most Common Excuses
oo NoNo oneone couldcould possiblypossibly bebe interestedinterestedinin mymy informationinformation
oo AntiAnti--virusvirus softwaresoftware slowsslows downdown mymyprocessorprocessor speedspeed tootoo muchmuch..
oo II don'tdon't useuse antianti--virusvirus softwaresoftwarebecausebecause II nevernever openopen virusesviruses oror ee--mailmail attachmentsattachments fromfrom peoplepeople II don'tdon'tknowknow..
oo SoSo manymany peoplepeople areare onon thethe Internet,Internet,
I'mI'm justjust aa faceface inin thethe crowdcrowd.. NoNo oneonewouldwould pickpick meme outout..
oo I'mI'm busybusy.. II can'tcan't becomebecome aa securitysecurityexpertexpert----II don'tdon't havehave time,time, andand it'sit'snotnot importantimportant enoughenough
OrOr
8/6/2019 Internet Security- User's Perspective
9/65
Security CountermeasuresSecurity Countermeasures
Three Phase ApproachThree Phase Approach
PROTECTIONPROTECTION
DETECTIONDETECTION
RESPONSERESPONSE
8/6/2019 Internet Security- User's Perspective
10/65
VirusesViruses
oo AA programprogram thatthat getsgets intointoaa computercomputer systemsystem bybymeansmeans ofof hardwarehardware ororsoftwaresoftware withoutwithout thethe
knowledgeknowledge ofof thethecomputercomputer user,user, andand thenthenattachesattaches itselfitself toto aaprogramprogram filefile..
oo TheThe virusvirus thenthen startsstarts toto
replicatereplicate itselfitself andand dodo thethedamagedamage itit hashas beenbeenprogrammedprogrammed toto dodo..
8/6/2019 Internet Security- User's Perspective
11/65
8/6/2019 Internet Security- User's Perspective
12/65
8/6/2019 Internet Security- User's Perspective
13/65
WormsWorms
oo ComputerComputer WormsWorms areare likelikeaa virusvirus inin thethe factfact thatthat theytheydodo self self replicatereplicatethemselvesthemselves withinwithin youryourcomputercomputer systemsystem..
oo However,However, aa computercomputerwormworm doesdoes notnot havehave totoattachattach itselfitself toto aa programprogram
inin youryour systemsystem likelike aacomputercomputer virusvirus doesdoes ininorderorder toto functionfunction..
8/6/2019 Internet Security- User's Perspective
14/65
WormsWorms
oo WormsWorms areare aa subsetsubset ofof virusesviruses
oo TheThe differdiffer inin thethe methodmethod ofof attachmentattachment;;
ratherrather thanthan attachingattaching toto aa filefile likelike aa virusvirus aawormworm copiescopies itselfitself acrossacross thethe networknetworkwithoutwithout attachmentattachment..
oo InfectsInfects thethe environmentenvironment ratherrather thanthan specificspecificobjectsobjects
8/6/2019 Internet Security- User's Perspective
15/65
Trojan HorsesTrojan Horses
An An apparentlyapparently usefulusefulandand innocentinnocent programprogramcontainingcontaining additionaladditionalhiddenhidden codecode whichwhichallowsallows thethe unauthorizedunauthorizedcollection,collection, exploitation,exploitation,falsification,falsification, orordestructiondestruction ofof datadata..
8/6/2019 Internet Security- User's Perspective
16/65
Installation: Trojan HorsesInstallation: Trojan Horses
oo Secretly installed whenSecretly installed whenan infected executablean infected executableis runis run
oo Much like a virusMuch like a virus
oo Executables typicallyExecutables typicallycome from P2Pcome from P2P
networks ornetworks orunscrupulousunscrupulouswebsiteswebsites
8/6/2019 Internet Security- User's Perspective
17/65
EffectsEffects
oo Allows remote access:Allows remote access:
oo To spyTo spy
oo To disruptTo disruptoo To relay a malicious connection, so as toTo relay a malicious connection, so as to
disguise the attackers location (spam, hacking)disguise the attackers location (spam, hacking)
oo To access resources (i.e. bandwidth, files)To access resources (i.e. bandwidth, files)
oo To launch aTo launch a DDistributedistributed DDenialenial ooffSServiceervice((DDoS) attackDDoS) attack
8/6/2019 Internet Security- User's Perspective
18/65
SpywareSpyware
A A generalgeneral termterm forfor aaprogramprogram thatthat surreptitiouslysurreptitiouslymonitorsmonitors youryour actionsactions.. WhileWhiletheythey areare sometimessometimes sinister,sinister,likelike aa remoteremote controlcontrolprogramprogram usedused byby aa hacker,hacker,softwaresoftware companiescompanies havehavebeenbeen knownknown toto useuse SpywareSpyware
toto gathergather datadata aboutaboutcustomerscustomers.. TheThe practicepractice isisgenerallygenerally frownedfrowned uponupon..
8/6/2019 Internet Security- User's Perspective
19/65
Disadvantages: SpywareDisadvantages: Spyware
oo BrowsingBrowsing profilesprofiles createdcreated forfor usersusers withoutwithout consentconsent
oo UsedUsed forfor targettarget marketingmarketing andand statisticalstatistical analysisanalysis
oo UnableUnable toto removeremove SpywareSpyware programsprograms oror disabledisable themthem
oo IncreasedIncreased numbernumber ofof misleadingmisleading // inappropriateinappropriate poppop--upsups
oo InvasionInvasion ofof useruser privacyprivacy (hidden(hidden fromfrom user)user)
oo OftenOften badlybadly writtenwritten programsprograms corruptcorrupt useruser systemsystem
oo AutomaticallyAutomatically providesprovides unwantedunwanted helpfulhelpful toolstools
oo EstimatedEstimated overover 2020 million+million+ peoplepeople havehave SpywareSpyware onon theirtheirmachinesmachines..
8/6/2019 Internet Security- User's Perspective
20/65
Spyware DefenceSpyware Defence
User InitiativesUser Initiatives
oo Issue AwarenessIssue Awareness
oo Use Legitimate S/WUse Legitimate S/WSourcesSources
oo Improved Technical AbilityImproved Technical Ability
oo Choice of BrowserChoice of Browser
oo Choice of OSChoice of OSoo Legal action taken againstLegal action taken against
breaches of privacybreaches of privacy
Technical Initiatives...Technical Initiatives...
oo Spyware RemovalSpyware Removal
ProgramsProgramsoo PopPop--up Blockersup Blockers
oo Firewall TechnologyFirewall Technology
oo Disable ActiveX ControlsDisable ActiveX Controls
oo Not SandboxedNot Sandboxedoo EE--Mail FiltersMail Filters
oo Download PatchesDownload Patches
8/6/2019 Internet Security- User's Perspective
21/65
Similarities / DifferencesSimilarities / Differences
SpywareSpyware Trojan HorsesTrojan Horses
Commercially MotivatedCommercially Motivated MaliciousMalicious
Internet connection requiredInternet connection required Any network connection requiredAny network connection required
Initiates remote connectionInitiates remote connection Receives incoming connectionReceives incoming connection
Purpose: To monitor activityPurpose: To monitor activity Purpose: To control activityPurpose: To control activity
Collects data and displays popCollects data and displays pop--upsups Unauthorized access and controlUnauthorized access and control
LegalLegal IllegalIllegal
Not Detectable with Virus CheckerNot Detectable with Virus Checker Detectable with Virus CheckerDetectable with Virus Checker
Age: Relatively New (< 5 Years)Age: Relatively New (< 5 Years) Age: Relatively Old ( > 20 Years)Age: Relatively Old ( > 20 Years)
Memory Resident ProcessesMemory Resident Processes
Surreptitiously installed without users consent or understandingSurreptitiously installed without users consent or understanding
Creates a security vulnerabilityCreates a security vulnerability
8/6/2019 Internet Security- User's Perspective
22/65
8/6/2019 Internet Security- User's Perspective
23/65
Symptoms: MalwareSymptoms: Malware
o Slow down, malfunction,or display repeated errormessages
o Won't shut down or restarto Serve up a lot of pop-up
ads, or display them whenyou're not surfing the web
o Display web pages orprograms you didn't intendto use, or send emails youdidn't write
8/6/2019 Internet Security- User's Perspective
24/65
KeyloggersKeyloggers
Keystroke logging (oftencalled keylogging) is theaction of tracking (orlogging) the keys struck on
a keyboard, typically in acovert manner so that theperson using the keyboard isunaware that their actionsare being monitored. There
are numerous keyloggingmethods, ranging fromhardware to software-basedapproaches
8/6/2019 Internet Security- User's Perspective
25/65
Keylogging Includes:Keylogging Includes:
o Clipboard loggingo Screen loggingo Programmatically capturing the text in a control
o The recording of every program/folder/windowopened.o The recording of search engines queries, Instant
Messenger Conversations, FTP Downloads andother internet based activities.
o In some advanced software keyloggers, sound canbe recorded from a user's microphone and videofrom a user's webcam.
8/6/2019 Internet Security- User's Perspective
26/65
CountermeasuresCountermeasures
o Anti-spywareo Network monitorso Automatic form filler programso One-time passwordso On-screen keyboardso Speech recognitiono Keystroke interference softwareo Handwriting recognition and mouse gestures
8/6/2019 Internet Security- User's Perspective
27/65
CookiesCookies
oo AA CookieCookie isis aa smallsmall texttext filefile sentsent toto thethe useruser fromfromaa websitewebsite..oo ContainsContains WebsiteWebsite visitedvisited
oo ProvidesProvides clientclient--sideside personalisationpersonalisationoo SupportsSupports easyeasy LoginLoginoo TheThe websitewebsite isis effectivelyeffectively ableable toto rememberremember thethe
useruser andand theirtheir activityactivity onon previousprevious visitsvisits..oo SpywareSpyware companiescompanies workingworking withwith websiteswebsites areare
ableable toto useuse thisthis relativelyrelatively innocentinnocent technologytechnology totodeliverdeliver targetedtargeted REALREAL TIMETIME marketing,marketing, basedbased ononcookiescookies andand profilesprofiles..
8/6/2019 Internet Security- User's Perspective
28/65
8/6/2019 Internet Security- User's Perspective
29/65
Taking Precautions withTaking Precautions with
CookiesCookiesoo ToTo increaseincrease youryour levellevel ofof security,security, considerconsider adjustingadjusting
youryour privacyprivacy andand securitysecurity settingssettings toto blockblock oror limitlimit
cookiescookies inin youryour webweb browserbrowser..oo ToTo makemake suresure thatthat otherother sitessites areare notnot collectingcollecting
personalpersonal informationinformation aboutabout youyou withoutwithout youryourknowledge,knowledge, choosechoose toto onlyonly allowallow cookiescookies forfor thethe webwebsitesite youyou areare visitingvisiting;; blockblock oror limitlimit cookiescookies fromfrom aa
thirdthird--partyparty..oo IfIf youyou areare usingusing aa publicpublic computer,computer, youyou shouldshould makemake
suresure thatthat cookiescookies areare disableddisabled toto preventprevent otherotherpeoplepeople fromfrom accessingaccessing oror usingusing youryour personalpersonalinformationinformation..
8/6/2019 Internet Security- User's Perspective
30/65
AntiAnti--VirusVirus
o Anti-Virus Software isa computer programthat can be used to scanfiles to identify andeliminate computerviruses, worms, trojanhorses and othermalicious software
(malware) from aninfected computer.
o It also protects thecomputer from furthervirus attacks.
8/6/2019 Internet Security- User's Perspective
31/65
Functions: Antivirus
o Scanning Files
o Removing Infections
o Virus Protectiono Spyware
o Real-Time Scanning
oWebsites
o Email
o Data Mining
8/6/2019 Internet Security- User's Perspective
32/65
Detecting Computer
Threats
o Most commercial anti-virus software use the
following approaches, with an emphasis onthe virus dictionary approach:
o Virus dictionary approach
o Suspicious behavior approach
8/6/2019 Internet Security- User's Perspective
33/65
FirewallFirewall
o A system or group of systems that enforces anaccess control policybetween two networks.
oo A firewall is like a castle withA firewall is like a castle witha drawbridgea drawbridgeoo Only one point of accessOnly one point of access
into the networkinto the networkoo This can be good or badThis can be good or bad
oo Can be configured toCan be configured toblock data from certainblock data from certainlocations while allowinglocations while allowingthe relevant andthe relevant andnecessary data through.necessary data through.
8/6/2019 Internet Security- User's Perspective
34/65
FirewallsFirewalls
oo Basic problemBasic problem many network applications andmany network applications andprotocols have security problems that are fixedprotocols have security problems that are fixedover timeover time
oo Difficult for users to keep up with changes andDifficult for users to keep up with changes andkeep host securekeep host secure
oo SolutionSolution
ooAdministrators limit access to end hosts byAdministrators limit access to end hosts byusing a firewallusing a firewall
ooFirewall is kept upFirewall is kept up--toto--date by administratorsdate by administrators
8/6/2019 Internet Security- User's Perspective
35/65
Conclusion: FirewallConclusion: Firewall
oo CannotCannot controlcontrol backbackdoordoor traffictraffic
oo CannotCannot fullyfully protectprotectagainstagainst newnew virusesviruses
oo NeedNeed antivirusantivirus ononeacheach hosthost MachineMachine
oo NeedsNeeds toto bebe correctlycorrectlyconfiguredconfigured
oo TheThe securitysecurity policypolicy mustmustbebe enforcedenforced
8/6/2019 Internet Security- User's Perspective
36/65
PhishingPhishing
oo Sending people eSending people e--mail messages in order tomail messages in order tolure them into divulging sensitive datalure them into divulging sensitive data
oo The data sought is commonly passwordsThe data sought is commonly passwordsand creditand credit--card detailscard details
oo The data is commonly keyed into a webThe data is commonly keyed into a web--
form on a site that purports to be operatedform on a site that purports to be operatedby the trusted identityby the trusted identity
8/6/2019 Internet Security- User's Perspective
37/65
Example: Phishing SiteExample: Phishing Site
8/6/2019 Internet Security- User's Perspective
38/65
Good Security HabitsGood Security Habits
oo LockLock youryour computercomputer whenwhen youyou areare awayaway fromfrom itit
oo DisconnectDisconnect youryour computercomputer fromfrom thethe InternetInternet whenwhen youyou aren'taren'tusingusing itit
oo EvaluateEvaluate youryour securitysecurity settingssettings
oo ProtectProtect youryour computercomputer againstagainst powerpower surgessurges andand briefbrief outagesoutages
oo BackBack upup allall ofof youryour datadata
oo UseUse andand maintainmaintain antianti--virusvirus softwaresoftware
oo InstallInstall oror enableenable aa firewallfirewall
oo KeepKeep softwaresoftware upup toto datedate
oo UseUse antianti--spywarespyware toolstools
oo FollowFollow goodgood securitysecurity practicespractices
8/6/2019 Internet Security- User's Perspective
39/65
Software AnalysisSoftware Analysis
8/6/2019 Internet Security- User's Perspective
40/65
Awareness about Various ThreatsAwareness about Various Threats
8/6/2019 Internet Security- User's Perspective
41/65
Antivirus Softwares UsedAntivirus Softwares Used
8/6/2019 Internet Security- User's Perspective
42/65
Awareness about Security MeasuresAwareness about Security Measures
8/6/2019 Internet Security- User's Perspective
43/65
AntiAnti--SpywareSpyware
8/6/2019 Internet Security- User's Perspective
44/65
SpybotSpybot-- Search and DestroySearch and Destroy
oo SpybotSpybot -- SearchSearch && DestroyDestroy detectsdetects andand removesremovesspyware,spyware, aa relativelyrelatively newnew kindkind ofof threatthreat notnot yetyet coveredcovered bybycommoncommon antianti--virusvirus applicationsapplications..
oo SpywareSpyware silentlysilently trackstracks youryour surfingsurfing behaviourbehaviour toto createcreate aa
marketingmarketing profileprofile forfor youyou thatthat isis transmittedtransmitted withoutwithout youryourknowledgeknowledge toto thethe compilerscompilers andand soldsold toto advertisingadvertisingcompaniescompanies..
oo IfIf youyou seesee newnew toolbarstoolbars inin youryour InternetInternet ExplorerExplorer thatthat youyouhaven'thaven't intentionallyintentionally installed,installed, ifif youryour browserbrowser crashescrashesinexplicably,inexplicably, oror ifif youryour homehome pagepage hashas beenbeen "hijacked""hijacked" (or(or
changedchanged withoutwithout youryour knowledge),knowledge), youryour computercomputer isis mostmostprobablyprobably infectedinfected withwith spywarespyware..oo EvenEven ifif youyou don'tdon't seesee thethe symptoms,symptoms, youryour computercomputer maymay
bebe infected,infected, becausebecause moremore andand moremore spywarespyware isis emergingemerging..
8/6/2019 Internet Security- User's Perspective
45/65
Ease of
Setup/Use5/5
Detection
Effectiveness4.5/5
Removal
Effectiveness4.5/5
System
Performance3.5/5
ScanPerformance
4/5
Support/Docume
ntation4/5
Ratings: SpybotRatings: Spybot
8/6/2019 Internet Security- User's Perspective
46/65
AntiAnti--MalwareMalware
8/6/2019 Internet Security- User's Perspective
47/65
Malwarebytes AntiMalwarebytes Anti--MalwareMalware
oo MalwarebytesMalwarebytes AntiAnti--MalwareMalware isis aa surprisinglysurprisingly effectiveeffective freewarefreeware antianti--malwaremalware tooltool.. ItIt cancan detectdetect andand removeremove malwaremalware thatthat eveneven thethe mostmostwellwell knownknown antianti--virusvirus andand antianti--malwaremalware applicationsapplications failfail toto detectdetect..
oo Malwarebytes'Malwarebytes' AntiAnti--MalwareMalware monitorsmonitors everyevery processprocess andand stopsstopsmaliciousmalicious processesprocesses beforebefore theythey eveneven startstart..
ooKey
Key FeaturesFeatures::oo LightLight speedspeed quickquick scanningscanning..oo AbilityAbility toto performperform fullfull scansscans forfor allall drivesdrives..oo DatabaseDatabase updatesupdates releasedreleased dailydaily..oo QuarantineQuarantine toto holdhold threatsthreats andand restorerestore themthem atat youryour convenienceconvenience..oo IgnoreIgnore listlist forfor bothboth thethe scannerscanner andand ProtectionProtection ModuleModule..
oo AA smallsmall listlist ofof extraextra utilitiesutilities toto helphelp removeremove malwaremalware manuallymanually..oo MultiMulti--linguallingual supportsupport..oo WorksWorks togethertogether withwith otherother antianti--malwaremalware utilitiesutilities..oo CommandCommand lineline supportsupport forfor quickquick scanningscanning..oo ContextContext menumenu integrationintegration toto scanscan filesfiles onon demanddemand..
8/6/2019 Internet Security- User's Perspective
48/65
8/6/2019 Internet Security- User's Perspective
49/65
FirewallFirewall
8/6/2019 Internet Security- User's Perspective
50/65
Comodo Internet SecurityComodo Internet Security
oo ComodoComodo firewallfirewall isis uniqueunique inin wayway thatthat itit passespasses allall knownknown leakleakteststests toto ensureensure thethe integrityintegrity ofof datadata enteringentering andand exitingexiting youryoursystemsystem..
oo ComodoComodo hashas putput firewallfirewall throughthrough allall kindskinds ofof sophisticatedsophisticated teststeststoto ensureensure itsits firewallfirewall isis powerfulpowerful enoughenough toto wardward offoff thesethese
attacksattacks withwith defaultdefault settingssettings.. NoNo otherother firewallfirewall hashas hadhad toto workworkthisthis hardhard..oo SecuresSecures againstagainst internalinternal andand externalexternal attacksattacksoo BlocksBlocks internetinternet accessaccess toto maliciousmalicious TrojanTrojan programsprogramsoo SafeguardsSafeguards youryour PersonalPersonal datadata againstagainst thefttheftoo DeliversDelivers totaltotal endend--pointpoint securitysecurity forfor PersonalPersonal ComputersComputers andand
NetworksNetworksoo BecauseBecause ComodoComodo InternetInternet SecuritySecurity isis moremore thanthan aa firewall,firewall, itit hashas
thethe wherewithalwherewithal toto detectdetect andand blockblock viruses,viruses, TrojanTrojan horses,horses,worms,worms, keyloggers,keyloggers, rootkitsrootkits andand otherother malwaremalware inin realreal timetime..
8/6/2019 Internet Security- User's Perspective
51/65
Ratings: Comodo FirewallRatings: Comodo Firewall
Firewall Features 5/5
AdditionalSecurity Features
5/5
Ease Of Use 4.5/5
Support/Document
ation5/5
8/6/2019 Internet Security- User's Perspective
52/65
Antivirus
8/6/2019 Internet Security- User's Perspective
53/65
8/6/2019 Internet Security- User's Perspective
54/65
8/6/2019 Internet Security- User's Perspective
55/65
Conclusion: Kaspersky
Pros Attractive easy interface. Excellentresults in independent lab tests.Effective built-in support. Speed fullscan. Bonus system tuning and privacyfeatures. Rescue Disk can scan evensystems that won't boot.
ConsEarned mediocre scores in hands-onmalware removal and blocking tests.Erroneously identification also found.
Bottom LineKaspersky's latest antivirus looks betterthan ever, and independent labs
consistently put it at or near the top. Inthe hands-on tests it scored well belowwhat the labs would suggest, though,and it made a couple of serious faux pasfalse positives.
8/6/2019 Internet Security- User's Perspective
56/65
Bit Defender Antivirus 2011
o Stops Virus, Malwareand Spyware
o Safeguards YourPrivacy
o Surf Safelyo Play and Work
Seamlessly (GameMode)
o Smart Tipso Automatic or Manual
Updateso Video Library Support 0
20
40
60
80
100
Performance Features Design
8/6/2019 Internet Security- User's Perspective
57/65
Ratings: Bit Defender
ATTRIBUTE POINTS
Scope Of Protection 4/5
Effectiveness 4/5
Ease of Installation 4/5
Ease of Use 4/5
Features 4/5
Updates, Help & Support 4/5
8/6/2019 Internet Security- User's Perspective
58/65
Conclusion: Bit Defender
ProsPreinstall scan eases installation. Bestsuite protection against phishing.
Above-average parental control.Local, remote, and advanced backup.PC Tune-up. Effective spam filtering.Configurable UI. Private data
protection. Remote management.Game/laptop/silent mode.
ConsMediocre malware removal andblocking. Parental control's IMmanagement easily evaded. Old-school firewall passes security
decisions to the user.Bottom LineBitDefender doesnt score as well asprevious versions on anti-malwaretests. Still, its performanceoptimization tool and and its phishingprotection is excellent. It's a goodsecurity suite with a full-featured
backup system.
8/6/2019 Internet Security- User's Perspective
59/65
Miscellaneous
8/6/2019 Internet Security- User's Perspective
60/65
8/6/2019 Internet Security- User's Perspective
61/65
Benefits of Isolated Sandbox
o Secure Web Browsing: Running your Webbrowser under the protection of Sandboxie meansthat all malicious software downloaded by thebrowser is trapped in the sandbox and can be
discarded trivially.o Enhanced Privacy: Browsing history, cookies,
and cached temporary files collected while Webbrowsing stay in the sandbox and don't leak intoWindows.
o Secure E-mail: Viruses and other malicioussoftware that might be hiding in your email can'tbreak out of the sandbox and can't infect your realsystem.
8/6/2019 Internet Security- User's Perspective
62/65
VirusTotal.com
o VirusTotal is a service developed by Hispasec Sistemas thatanalyzes suspicious files and URLs enabling the identification ofviruses, worms, trojans and other kinds of malicious contentdetected by antivirus engines and web analysis toolbars.
o It uses up to 43 different antivirus products
VirusTotal's main characteristics are:
o Free, independent service.
o Runs multiple antivirus engines.o Runs multiple file characterization tools.
o Real time automatic updates of virus signatures.
o Detailed results from each antivirus engine.
8/6/2019 Internet Security- User's Perspective
63/65
8/6/2019 Internet Security- User's Perspective
64/65
8/6/2019 Internet Security- User's Perspective
65/65
Thank YouThank You