Using documentation from the vendor, the web, or other resources, find out what methodology Norton Antivirus uses, as well as the methods that McAfee uses. Armed with this information, write a brief essay comparing and contrasting any differences. Also discuss situations in which one might be recommended over the other.Computer Security Fundamentals by Chuck Easttom Chapter 9: Security Technology Chapter 9 Objectives ◼ ◼ ◼ ◼ Evaluate the effectiveness of a scanner based on how it works Choose the best type of firewall for a given organization Understand antispyware Employ intrusion-detection systems to detect problems on your system © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 2 Introduction ◼ ◼ Preceding chapters have described computer crime and computer security. Now, look at the technical details: ❑ Various security devices and software © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 3 Virus Scanners ◼ ◼ ◼ Purpose: to prevent a virus from infecting the system Searches for the signature of a known virus Scanners work in two ways: ❑ ❑ Signature matching Behavior matching © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 4 Virus Scanners (cont.) ❑ Signature matching ◼ ◼ ◼ List of all known virus definitions Updating consists of replacing this file AV scans host, network, and incoming emails for a match © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 5 Virus Scanners (cont.) ❑ Behavior matching (Heuristics): ◼ ◼ ◼ ◼ ❑ Attempts to write to the boot sector Change system files Automate e-mail software Self-multiply These are typical virus behaviors. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 6 Virus Scanners (cont.) ◼ Ongoing virus scanners: ❑ ◼ On-demand virus scanners: ❑ ◼ Run constantly in the background Run only when you launch them Modern AV scanners offer both options. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 7 Virus-Scanning Techniques ◼ E-mail and attachment scanning ❑ ❑ ◼ Examine e-mail on the server, OR. Scan the host computer before passing to the e-mail program. Download scanning ❑ Scan downloaded files. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 8 Virus-Scanning Techniques (cont.) ◼ File scanning ❑ ◼ Files on the host computer are checked periodically. Sandboxing ❑ Isolating suspect files © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 9 Virus-Scanning Techniques (cont.) ❑ Active code scanning ◼ ◼ ◼ ◼ Java applets and ActiveX Visual effects Can be vehicles for malicious code Must be scanned © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 10 Commercial Antivirus Software ◼ Kaspersky ◼ AVG ◼ McAfee Norton ◼ © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 11 Firewalls ◼ ◼ A barrier between your network and the outside world Filters packets based on ❑ ❑ ❑ ❑ Size Source IP Protocol Destination port © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 12 Firewalls (cont.) ◼ ◼ ◼ Need dedicated firewall between trusted network and untrusted network. Cisco is well known for its routers and firewalls. Firewalls can be hardware or software. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 13 Firewall Types and Components ◼ There are several types of firewalls: ❑ ❑ ❑ Packet Filter Stateful Packet Inspection Application © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 14 Firewall Configurations ❑ Network host-based: ◼ ◼ ◼ Software solution installed on an existing operating system. Weakness: It relies on the OS. Must harden the existing operating system. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 15 Firewall Configurations (cont.) ❑ Dual-homed host: ◼ ◼ Installed on a server with at least two network interfaces. Systems inside and outside the firewall can communicate with the dual-homed host, not with each other. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 16 Firewall Configurations (cont.) ❑ Router-based firewall ◼ ◼ ❑ Commonly the first layer of protection Usually a packet filter Screened host ◼ ◼ Combination firewall A bastion host and a packet filter © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 17 Commercial and Free Firewall Products ◼ ◼ ◼ Zone Alarms Cisco Windows Defender © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 18 Firewall Logs ◼ ◼ ◼ ◼ ◼ All firewalls log activity. Logs can provide valuable information. Can locate source of an attack. Can prevent a future attack. Network administrators regularly check for data. © 2019 Pearson, Inc. Chapter 9 Computer Security Technology 19 Antispyware ◼ ◼ ◼ ◼ Scans for spyware. Checks for known spyware files, such as AV software scans for known virus files. Maintain a subscription service to keep spyware file definitions up to date, or use auto-update.