ESET CYBERSECURITY - Скачать руководство пользователя страница 22

22

6. Glossary

6.1   Types of infiltrations

An Infiltration is a piece of malicious software trying to
enter and/or damage a user’s computer.

6.1.1   Viruses

A computer virus is an infiltration that corrupts
existing files on your computer. Viruses are named
after biological viruses, because they use similar
techniques to spread from one computer to another.

Computer viruses mainly attack executable files,
scripts and documents. To replicate, a virus attaches
its “body“ to the end of a target file. In short, this is
how a computer virus works: after execution of the
infected file, the virus activates itself (before the
original application) and performs its predefined task.
Only after that is the original application allowed to
run. A virus cannot infect a computer unless a user,
either accidentally or deliberately, runs or opens the
malicious program.

Computer viruses can range in purpose and severity.
Some of them are extremely dangerous because of
their ability to purposely delete files from a hard drive.
On the other hand, some viruses do not cause any
damage – they only serve to annoy the user and
demonstrate the technical skills of their authors.

It is important to note that viruses (when compared to
trojans or spyware) are increasingly rare because they
are not commercially enticing for malicious software
authors. Additionally, the term “virus” is often used
incorrectly to cover all types of infiltrations. This usage
is gradually being overcome and replaced by the new,
more accurate term “malware” (malicious software).

If your computer is infected with a virus, it is necessary
to restore infected files to their original state – i.e., to
clean them by using an antivirus program.

Examples of viruses are: 

OneHalf

Tenga

 and 

Yankee

Doodle

.

6.1.2   Worms

A computer worm is a program containing malicious
code that attacks host computers and spreads via a
network. The basic difference between a virus and a
worm is that worms have the ability to replicate and
travel by themselves – they are not dependent on host
files (or boot sectors). Worms spread through email
addresses in your contact list or exploit security
vulnerabilities in network applications. 

Worms are therefore much more viable than computer
viruses. Due to the wide availability of the Internet,
they can spread across the globe within hours of their

release – in some cases, even in minutes. This ability to
replicate independently and rapidly makes them more
dangerous than other types of malware.

A worm activated in a system can cause a number of
inconveniences: It can delete files, degrade system
performance, or even deactivate programs. The nature
of a computer worm qualifies it as a “means of
transport“ for other types of infiltrations.

If your computer is infected with a worm, we
recommend you delete the infected files because they
likely contain malicious code.

Examples of well-known worms are: 

Lovsan/Blaster

,

Stration/Warezov

Bagle

 and 

Netsky

.

6.1.3   Trojan horses

Historically, computer trojan horses have been defined
as a class of infiltrations which attempt to present
themselves as useful programs, tricking users into
letting them run. Today, there is no longer a need for
trojan horses to disguise themselves. Their sole
purpose is to infiltrate as easily as possible and
accomplish their malicious goals. “Trojan horse” has
become a very general term describing any infiltration
not falling under any specific class of infiltration.

Since this is a very broad category, it is often divided
into many subcategories:

Downloader – A malicious program with the ability
to download other infiltrations from the Internet.
Dropper – A type of trojan horse designed to drop
other types of malware onto compromised
computers.
Backdoor – An application which communicates
with remote attackers, allowing them to gain access
to a system and to take control of it.
Keylogger – (keystroke logger) – A program which
records each keystroke that a user types and sends
the information to remote attackers.
Dialer – Dialers are programs designed to connect to
premium-rate numbers. It is almost impossible for a
user to notice that a new connection was created.
Dialers can only cause damage to users with dial-up
modems, which are no longer regularly used.
Trojan horses usually take the form of executable
files. If a file on your computer is detected as a trojan
horse, we recommend deleting it, since it most likely
contains malicious code.

Examples of well-known trojans are: 

NetBus

,

Trojandownloader.Small.ZL

Slapper

.

Содержание CYBERSECURITY -

Страница 1: ...ESET Cybersecurity Installation Manual and User Guide...

Страница 2: ...duced stored in a retrieval system or transmitted in any form or by any means electronic mechanical photocopying recording scanning or otherwise without permission in writing from the author ESET spol...

Страница 3: ...engine parameters setup 4 1 3 12 Objects 4 1 3 1 12 Options 4 1 3 2 13 Cleaning 4 1 3 3 13 Extensions 4 1 3 4 13 Limits 4 1 3 5 13 Others 4 1 3 6 14 An infiltration is detected 4 1 4 14 Updating the...

Страница 4: ...ith Windows users and vice versa Although Windows malware does not pose a direct threat to Mac disabling malware that has infected a Mac machine will prevent its spread to Windows based computers thro...

Страница 5: ...ng system These applications are often bundled with other programs and may be difficult to notice during the installation process Although these applications usually display a notification during inst...

Страница 6: ...ctivation instructions The Activation Key is usually located inside or on the back side of the product package For a successful activation the Activation Key must be entered as supplied 2 If you recei...

Страница 7: ...for common operations It does not display any advanced options To toggle between modes click the plus icon next to Activate advanced mode Activate standard mode in the bottom left corner of the main...

Страница 8: ...em using the suggested solutions click Help to access the help files or search the Knowledgebase If you need assistance you can contact ESET Customer Care support on the ESET website ESET Customer Car...

Страница 9: ...r 4 1 1 1 2 Advanced scan options In this window you can define object types to be scanned by the ThreatSense engine and enable disable Advanced heuristics as well as modify settings for archives and...

Страница 10: ...and how to troubleshoot them Real time protection is disabled If Real time protection was inadvertently disabled by a user it will need to be reactivated To reactivate Real time protection navigate to...

Страница 11: ...g actions select the Scan without cleaning option Furthermore you can choose from three cleaning levels by clicking Setup Cleaning Performing computer scans with Custom scan is recommended for advance...

Страница 12: ...or directory Email files not available in Real time protection scans special files where email messages are contained Mailboxes not available in Real time protection scans user mailboxes in the syste...

Страница 13: ...he log cfg and tmp extensions 4 1 3 5 Limits The Limits section allows you to specify the maximum size of objects and levels of nested archives to be scanned Maximum Size Defines the maximum size of o...

Страница 14: ...d no clean files In other words archives are not deleted if they also contain harmless clean files However use caution when performing a Strict cleaning scan with Strict cleaning the archive will be d...

Страница 15: ...button Authentication for update servers is based on the Username and Password generated and sent to you after purchase To enable the use of test mode downloads pre release updates click the Setup but...

Страница 16: ...u Five types of scheduled tasks are available Run application Update Log maintenance On demand computer scan System startup file check Since Update is one of the most frequently used scheduled tasks w...

Страница 17: ...e was incorrectly evaluated as infected e g by heuristic analysis of the code and subsequently quarantined please send the file to ESET s Threat Lab To submit a file from quarantine right click the fi...

Страница 18: ...ET Cybersecurity Disabling the Display alerts option will cancel all alert windows and is only suitable in specific situations For most users we recommend that this option be left to its default setti...

Страница 19: ...stem option to activate and then click the Setup button beside the Advanced Options heading 4 7 1 Suspicious files The Suspicious files option allows you to configure the manner in which threats are s...

Страница 20: ...as documents or spreadsheets The most common file types are excluded by default doc etc You can add file types to the list of excluded files Contact Email optional Your email can be sent with any susp...

Страница 21: ...click Setup Import and export settings Select the Export settings option and enter the name of the configuration file Use the browser to select a location on your computer to save the configuration fi...

Страница 22: ...in network applications Worms are therefore much more viable than computer viruses Due to the wide availability of the Internet they can spread across the globe within hours of their release in some c...

Страница 23: ...ntain security codes PINs bank account numbers etc Spyware is often bundled with free versions of a program by its author in order to generate revenue or to offer an incentive for purchasing the softw...

Отзывы: