Antivirus Software for PC ( Personal Computer ) provider in Delhi – India
PC Antivirus detect and remove computer viruses, hence the name. However, with the proliferation of other kinds of malware, antivirus software started to provide protection from other computer threats. In particular, modern antivirus software can protect from: malicious Browser Helper Objects, browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious LSPs,dialers, fraudtools, adware and spyware. Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity (privacy), online banking attacks, social engineering techniques, Advanced Persistent Threat (APT), botnets DDoS attacks.
Antivirus securing a PC from various types of “attacks”:
A backdoor in a computer system, a cryptosystem or an algorithm, is any secret method of bypassing normal authentication or security controls.
Unlike other exploits, denial of service attacks are not used to gain unauthorized access or control of a system. They are instead designed to make a machine or network resource unavailable to its intended users. Attackers can deny service to individual victims, such as by deliberately entering a wrong password enough consecutive times to cause the victim account to be locked, or they may overload the capabilities of a machine or network and block all users at once.
Simple firewall blocks are possible against an attacker coming from a single IP address, but many forms of Distributed denial of service (DDoS) attacks are possible, where the attack comes from a large number of points, and defending is much more difficult.
DDoS attacks can originate from the zombie computers of a botnet, but a range of other techniques are possible – including reflection and amplification attacks, where innocent systems are fooled into sending traffic to the victim.
An unauthorized user gaining physical access to a computer is often able to compromise security by making operating system modifications, installing software worms, keyloggers. They may be able to easily download data. Even when the system is protected by standard security measures, these may be able to be by passed by booting another operating system or tool from a CD-ROM or other bootable media. Disk encryption and Trusted Platform Module are designed to prevent these attacks.
Eavesdropping is the act of surreptitiously listening to a private conversation, typically between hosts on a network. For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers. Even machines that operate as a closed system (i.e., with no contact to the outside world) can be eavesdropped upon via monitoring the faint electro-magnetic transmissions generated by the hardware; TEMPEST is a specification by the NSA referring to these attacks.
Spoofing of user identity describes a situation in which one person or program successfully masquerades as another by falsifying data.
Tampering describes an intentional modification of products in a way that would make them harmful to the consumer.
Repudiation describes a situation where the authenticity of a signature is being challenged.
Information disclosure describes a situation where information, thought to be secure, is released in an untrusted environment.
Privilege escalation describes a situation where an attacker gains elevated privileges or access to resources that were once restricted to them.
An exploit is a software tool designed to take advantage of a flaw in a computer system. This frequently includes gaining control of a computer system, allowing privilege escalation, or creating a denial of service attack. The code from exploits is frequently reused in trojan horses and computer viruses. In some cases, a vulnerability can lie in certain programs’ processing of a specific file type, such as a non-executable media file. Some security web sites maintain lists of currently known unpatched vulnerabilities found in common programs.
Social engineering and trojans
A computer system is no more secure than the persons responsible for its operation. Malicious individuals have regularly penetrated well-designed, secure computer systems by taking advantage of the carelessness of trusted individuals, or by deliberately deceiving them, for example sending messages that they are the system administrator and asking for passwords.
In the world of information technology there are different types of cyber attack–like code injection to a website or utilising malware (malicious software) such as virus, trojans, or similar. Attacks of these kinds are counteracted managing or improving the damaged product. But there is one last type, social engineering, which does not directly affect the computers but instead their users, which are also known as “the weakest link”. This type of attack is capable of achieving similar results to other class of cyber attacks, by going around the infrastructure established to resist malicious software; since being more difficult to calculate or prevent, it is many times a more efficient attack vector.
The main target is to convince the user by means of psychological ways to disclose secrets such as passwords, card numbers, etc. by, for example, impersonating a bank, a contractor, or a customer.
An indirect attack is an attack launched by a third-party computer. By using someone else’s computer to launch an attack, it becomes far more difficult to track down the actual attacker. There have also been cases where attackers took advantage of public anonymizing systems, such as the Tor onion router system.
Computer crime refers to any crime that involves a computer and a network.