Time
3 hours 35 minutes
Difficulty
Intermediate
CEU/CPE
4

Video Transcription

00:00
hello and welcome to P C Security Intermediate Course.
00:04
In this video, I will be talking about anti malware protection.
00:09
So no special things they will be talking about anti malware in general.
00:16
And first of all, I will give you a very, very sad fact, which is? Anti malware is destined to fail. So
00:23
every Melber
00:25
so far that has been designed has failed
00:28
eventually at one point in time at a certain configuration. So we have to
00:35
approaches tow, anti virus or anti malware software.
00:39
The old style, which is pretty much no longer used, is using signatures and signatures air. Basically,
00:47
it records certain pieces of code off the certain Alvear
00:52
and then compares the file you are
00:55
trying to execute with that,
00:58
let's say, a stored signature. And if they mention, say, Okay, this is a virus. This is Trojan, whatever, and I will not let it front. Simple.
01:10
The problem with this is that Ah, a couple of years ago, there was a statistic saying that there was a new wall were created in the world. Every four something seconds.
01:21
So, uh,
01:22
for you, can you imagine if you're creating an entire hour on their wares program
01:29
you have to collect. Call these you have tow. Confirm that their viruses to find their the behavior to find how to remove them from your PC
01:38
and then to put it in an update and then to distribute that update to everybody who's using it
01:47
now, depending on them on the type of Marber before you actually detected, because
01:53
you don't have ah PC connected to a network world where all virus creators are just sending their PC for you to discover. So you have to get the feedback
02:02
it can take from couple of weeks to a couple of months before actual mulberries processed, found and its signature placed in the update of the anti where softer. So this method is definitely not good.
02:21
We have what's called next Gen M and T Miller, which is pretty much every time Albert today,
02:28
and it's using the artificial intelligence behavior analyses and outduels,
02:32
and it actually detective something. Besides, if something is mulberry or not,
02:38
with the next Gen, we have the situations of false positives, so you have some kind of software that you actually want to install your PC, but you're in time, our
02:46
things it's Ah,
02:47
it's a mulberry, so it doesn't let it so you. Then you have to switch off your and time our and sometimes it's very difficult to do. So it's it's a problem.
02:59
But on top of that,
03:00
we have absolute 2099 point trend report, which shows that 28% at any given time in the world either have outdated or missing and time over.
03:12
So, uh,
03:13
if you're in time, Alvarez knocked updated, you might feel even if
03:19
you know if it's there. And there are situations in which users just have, you know, they try to install some kind of softer, which is getting a false positive so it gets blocked from being installed
03:32
and then creative user. They just disable and time, hour or day and install it. And if they hadn't been writes on a PC, they can actually do it.
03:42
So this is a big problem.
03:45
But regardless of that, having an time, our on the PC is much better than not having it. So the fact that it will fail eventually
03:53
just the fact off life and you have to with it live with it,
03:57
and there are ways to essentially,
04:00
yeah,
04:01
find a way to make it a little bit better.
04:04
So you have to first choose the right one,
04:08
and you you have to create a list of requirements. So because this list of requirements is essentially different if you're, for example, a government agency that protects government secrets or if you're a small business,
04:23
that is, I don't know, doing shipping off
04:28
and no title paper and similar products.
04:30
Um,
04:31
the probability that some high level, highly trained, highly organized hacking group will attack you if you're shipping toilet paper is
04:42
highly
04:43
unlikely. So unless you are generating huge amounts of cash,
04:48
they will. They will not look at you. So the list of requirements in terms of protection has to be different.
04:57
And, of course, you have to look at the price of the product because
05:00
real living in the real world, where we're budgets are limited, not unlimited.
05:05
Then you have to create the short list of solutions, and then you have to actually test them. If you don't have people to test them,
05:13
hire somebody from you know, like external contractor to do the testing off these solutions and to see what percentage of off failures did they have because they will all have some kind of failure.
05:26
You can include their false positives. Or can you close the Mallory that actually managed to pass through the,
05:33
um, untie Melber,
05:35
you know,
05:36
solution. Then you discard those that they're performing below certain standards,
05:46
and then you choose one and then you install it on your PC. So you have.
05:49
Let's say your PC is protected from Albert to a certain extent,
05:55
but what you have to do is continual, periodic testing off the solution. So you basically find the way toe learn how to do it, or
06:05
just the fix a budget for somebody to do it for you on a regular basis. And regular races can be from once a week
06:15
for highly sensitive environments to like twice a year
06:20
or something like that.
06:24
So except choosing the right plan, you have to keep keep continually testing it. Why? Because these things are not perfect. These things fail eventually,
06:33
and the last thing you have to do, which is not in the bullet points in the slide, is essentially that. You have to make sure that it leased its on and updated on every device.
06:46
So you have to find the way to monitor your PC fleet and to check for presence and the version off of anti Mallory device. And if and to get some kind of alert that will tell you. Okay, this PC doesn't have antivirus offer or has the wrong one.
07:03
Oh, whatever
07:05
might happen. So you have to have some kind of alerts and the way to act immediately when these things happen.
07:13
If it can be automated, even better.
07:18
So, uh, we have reached the end of this video
07:25
in which you have learned how to choose and how to maintain anti Mellors after for pieces in your company. And, of course, you had to sum lecture about the fact that you shouldn't put 100% trust in your on time malware software.
07:42
In next lesson, I will be talking about protecting the anti members. After that, you have chosen

Up Next

Intermediate PC Security

The Intermediate PC Security course will teach students about endpoint protection. Students will learn fundamental information about PC Security and common attack vectors.

Instructed By

Instructor Profile Image
Milan Cetic
IT Security Consultant
Instructor