Security features provided by Bitdefender 2012

Page 1

THE UNIVERSITY OF DODOMA

College Of Informatics and Virtual Education PROGRAM: B Sc. Computer and Information Security ASSIGNMENT NO.2

COURSE NAME: Information Security Technologies COURSE CODE: CS 220 COUSE INSTRUCTOR: Adolf Kamuzora Question: Write a short report on Bit-Defender Internet Security 2012. S/n 1 2 3 4 5 6 7 8 9 10

Name MAKAME, MAKAME H TWALIB,MOHAMED A SEMKIWA,HARUNA MBEYELA, JOAN MWOMBEKI,JUDITH MAKOGA, BARAKA A EDWARD, YUSTO MICHAEL, DANIEL E MOSHA, BAZILI K NKANDI, SAMSON

Registration No. T/UDOM/2010/00410 T/UDOM/2010/00441 T/UDOM/2010/00437 T/UDOM/2010/00415 T/UDOM/2010/00428 T/UDOM/2010/00411 T/UDOM/2010/00392 T/UDOM/2010/00417 T/UDOM/2010/00422 T/UDOM/2010/00431

Program B. Sc. CIS B. Sc. CIS B. Sc. CIS B. Sc. CIS B. Sc. CIS B. Sc. CIS B. Sc. CIS B. Sc. CIS B. Sc. CIS B. Sc. CIS Tuesday, January 17, 2012


Introduction BitDefender is an antivirus software suite developed by Romania-based software company Softwin. The 2011 version was launched in August 2010, and it includes several protection and performance enhancements as Search Advisor and Performance Optimizer. The 2012 version was launched in 27 July 2011. The BitDefender products feature antivirus and antispyware, personal firewall, privacy control, user control and backup for corporate and home users. PC Tuneup and Performance Optimizer are available in the Total Security Suite.

Figure 1 Bitdefener 2012 home interface.

Bitdefender Antivirus Plus 2012 provides silent security against viruses, spyware and phishing attempts. It also includes innovative social networking safeguards.

Tuesday, January 17, 2012


Security features provided by Bitdefender 2012 Virus Virus is contagious computer program that is part of another and inserts copies of itself, often damaging the integrity of stored data. They have the ability to replicate themselves on an ever increasing number of computers. They originally spread by sharing storage disks primarily over the Internet. Bitdefender the following features to prevent/combat viruses.

Figure 2 Bitdefender 2012 Custom scan interface.

Quick scan Quick scan uses in-the-cloud scanning to detect malware running on a PC very quickly, usually less than 60 seconds. Full system scan Full system scan scans for malware on all drives on your computer including archives. Estimated time will depend on the size of data stored in your drives. Custom scan Allows you to select specific folders to be scanned on demand, which the can be saved as quick tasks. Vulnerability scan Vulnerability scan monitors Microsoft Windows update and other applications’ update to ensure that a PC is not vulnerable to known exploits. Microsoft windows passwords are checked for possible password bypass. Rescue mode Reboots the PC in rescue mode to remove malware that cannot be removed while window is loaded. Tuesday, January 17, 2012


Spyware Spyware is a type of malware that performs certain behaviors such as collecting personal information, tracking your online activities or changing the configuration of your computer, generally without appropriately obtaining your consent first. Bitdefender prevent this using features as

Figure 3 Bitdefender IDPS’s interface

Antispyware A feature to block concealed programs that track your online activities. Port scan block A feature to block intruders for spying for your open ports. Intrusion detection Protect a gains dll injection and installation of malware drivers.

Tuesday, January 17, 2012


Spam Spam is an unsolicited e-mail message, often an advertisement, to many people. Bitdefender prevent and detect spam using its Antispam technology which allow a user to have personal settings on spam definition, these includes.

Figure 4 Bitdefender 2012 Antispam interface.

Sensitivity level A user can select the spam filter sensitivity level whether  Aggressive - this option eliminate most spam but it may produce false positives (legitimate mail incorrectly tagged as spam).  Normal - A recommended setting. that block most spam, while avoiding false positive.  Permissive – tis option let most e-mail pass through. Recommended if your are receiving a lot of commercial mail. May produce false negative (spam classified as legitimate email).

Spam filters This provide various filtering options such as  Heuristic filter  Link filter  Block e-mail with written Asian characters  Block e-mail with written Cyrillic characters

Tuesday, January 17, 2012


Privacy threats A new level of concern over abuse of informational technology has accompanied the rise of the Internet. Although email is not inherently private, some guarantees of privacy can be obtained by encrypting the contents of electronic messages. Bitdefender provides various strong object oriented encryption mechanism such as file encryption, data encryption and IM chat encryption.

Figure 5 Bitdefender 2012 Privacy control interface.

Data protection This feature provides prevention of misuse of computer data, legal safeguards to prevent misuse of information stored on computers, particularly information about individual people. This is archived by allowing a user to specify his/her own data protection rules. Chat encryption This feature when activated encrypts all user conversations transferred while chatting on social networks’ Instant Messaging. File encryption This feature enable user to encrypt files and store them to safe vaults for protection against disclosure.

Tuesday, January 17, 2012


ID theft The act of acquiring private or sensitive data from personal computers for use in fraudulent activities. Phishing is usually done by sending emails that seem to appear to come from credible sources (however, they are in no way affiliated with the actual source/company), which require users to put in personal data such as a credit card number or social security number. This information is then transmitted to the hacker and utilized to commit acts of fraud. Some of the criminals behind phishing scams have even gone so far as to create websites that appear to be operated by government agencies. Bitdefender 2012 provides Antiphishing technology to combat these frauds, which include the following features.

Figure 6 Bitdefender 2012 Antiphishing interface.

Toolbar functions  SSL scan  Search advisor  Bitdefender toolbar Protections for web browsers  Protection against fraud  Protection against phishing  Whitelist  Protection for instant messaging

Tuesday, January 17, 2012


Parental control Bitdefender provide a wide range of parental control features which can be used to restrict or block undesired activities.

Figure 7 Bitdefender 2012 parental control interface.

Age Filters activates according to their age ratting and account owner’s age. Web control This enable a user to Allow or Block access to certain website with in his/her PC. The user can also set time limit for the website access. Application Control Enable user to specify applications he/she want Bitdefender to restrict to a specified time-limit or Block access completely. Keyword Control Block any website, e-mail or instant messages that include restricted keywords specified by the user. Instant messages Allow or Block all contacts (IM ID) except these specified in the list. Categories The Bitdefender category filter dynamically filters website based on their contacts. Tuesday, January 17, 2012


Conclusion All these features and advance technology used makes Bitdefender a first runner in virus protection. It’s currently at number one on the Golden Reviews Top 10 list.

References    

Bitdefender Internet Security 2012. www.wikipedia.org Microsoft® Encarta® 2009. © 1993-2008 Microsoft Corporation. Golden Reviews Security Software Top 10 list.

Tuesday, January 17, 2012


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.