Analysis of Modern Anti-Virus Software in Cyber Security Tasks
DOI:
https://doi.org/10.15802/stp2021/253290Keywords:
software, information threat, antivirus, singular method, heuristic methodAbstract
Purpose. The research is aimed at gaining general knowledge about modern anti-virus software. Because it is one aspect of cybersecurity, and is subject to ongoing discussions about its appropriateness. Methodology. To obtain data, the authors conducted a review of world literature on the topic of work using full-text and abstract databases. Signature and heuristic methods of antivirus software operation are considered. As well as the conditional division of these products into programs-detectors, programs-doctors, programs-auditors, programs-filters, programs-immunizers was made. Findings. Content analysis of publications in the direction of anti-virus software proves the number of aspects studied. The question of the ability of such software not only to recognize the threat, but also to be able to destroy it is being studied. To perform this task, the antivirus must have the following functions: regular (or real-time) scanning of system files and programs; scanning the content of messengers and e-mail; full computer scan at the user's command; monitoring of incoming and outgoing network traffic; elimination of the malware operation consequences. In addition, a comparative analysis of the most popular anti-virus software makes it possible to identify the disadvantages and advantages of each of them. Originality. Systematic and generalized analysis of the existing and most common anti-virus software has been further developed, which allows ordinary users to make informed choices about installing such software packages. Practical value. Based on the results obtained, it is possible to adjust your own actions regarding safe work on the Internet. In addition, the article aims to dispel myths suggesting that users do not protect their computers from malware at all. These studies can also be useful in studying the discipline "Fundamentals of Software Testing", the organization of scientific and practical seminars, refresher courses and etc.
References
Belous, A. I., & Solodukha, V. A. (2020). Kiberoruzhie i kiberbezopasnost. O slozhnykh veshchakh prostymi slovami. Moscow, Vologda: Infra-Inzheneriya. (in Russian)
Kardava, N. V. (2018). Kiberprostranstvo kak novaya politicheskaya realnost: vyzovy i otvety. History and Present, 2, 152-166. DOI: https://doi.org/10.30884/iis/2018.02.03 (in Russian)
Kuznetsov, E., & Saurov, A. (2016). Hardware Trojans. Part 1: new threats to cyber security. Nanoindustry Russia, 7, 16-25. DOI: https://doi.org/10.22184/1993-8578.2016.69.7.16.25 (in Russian)
Zagorskii, A. V., & Romashkina, N. P. (Eds.). (2016). Informational Security Problems in Modern International Crises and Conflicts of XXI century. Moscow: IMEMO RAN. DOI: https://doi.org/10.20542/978-5-9535-0477-5 (in Russian)
Sukhomlin, V. A., Belyakova, O. S., Klimina, A. S., Polyanskaya, M. S., & Rusanov, A. A. Model tsifrovykh navykov kiberbezopasnosti. Fond Liga internet-media. (in Russian)
Antivirus software (antivirus program). Retrieved from https://www.techtarget.com/searchsecurity/definition/antivirus-software (in English)
Best Antivirus Software for PC in 2021. Retrieved from https://www.wizcase.com/best-antivirus-for-pc/gr/ (in English)
Data Breach Investigations Report.(2020). Verizon. Retrieved from https://enterprise.verizon.com/resources/reports/2020-data-breach-investigations-report.pdf (in English)
Kostogryzov, A. (Ed.). (2018). Probabilistic Modeling in System Engineering. IntechOpen. DOI: https://doi.org/10.5772/intechopen.71396 (in English)
Trifonov, R., Yoshinov, R., Pavlova, G., & Tsochev, G. (2017). Artificial neural network intelligent method for prediction. In AIP Conference Proceedings (Vol. 1872, pp. 1-7). DOI: https://doi.org/10.1063/1.4996678 (in English)
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Science and Transport Progress. Bulletin of Dnipropetrovsk National University of Railway Transport
This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright and Licensing
This journal provides open access to all of its content.
As such, copyright for articles published in this journal is retained by the authors, under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0). The CC BY license permits commercial and non-commercial reuse. Such access is associated with increased readership and increased citation of an author's work. For more information on this approach, see the Public Knowledge Project, the Directory of Open Access Journals, or the Budapest Open Access Initiative.
The CC BY 4.0 license allows users to copy, distribute and adapt the work in any way, provided that they properly point to the author. Therefore, the editorial board of the journal does not prevent from placing published materials in third-party repositories. In order to protect manuscripts from misappropriation by unscrupulous authors, reference should be made to the original version of the work.