Professional Documents
Culture Documents
ISAS Group 5 - Anti Virus Security
ISAS Group 5 - Anti Virus Security
(ISAS)
“Anti Virus Security”
Arranged by:
Hafizh Zaldy Alviansyah (2020010049)
Muhartsal Raihan (2020010082)
Faculty :
Indah Ayu
First of all, thanks to Allah for all His grace so that this paper can be
arranged to completion. Not forgetting we also say a lot of gratitude for the
help of those who have contributed by contributing both material and mind.
They are:
We hope this paper can increase knowledge and experience for the readers,
for the future can improve the form and add the contents of the paper for the
better.
Due to our limited knowledge and experience, we believe there are still
many shortcomings in this paper, therefore we are looking to forward to
constructive suggestions and criticism from readers for the perfection of this
paper.
Author
i
TABLE OF CONTENT
PREFACE................................................................................................................i
TABLE OF CONTENT.........................................................................................ii
CHAPTER 1 INTRODUCTION..........................................................................1
I.1 Background..........................................................................................................1
III.1 Virus..............................................................................................................9
CHAPTER IV CONCLUSSION........................................................................18
IV.1 Conclussion.................................................................................................18
IV.2 Suggestion...................................................................................................18
BILBILIOGRAPHY............................................................................................19
CHAPTER 1
INTRODUCTION
I.1 Background
Technology is growing every day, and as it grows, it transforms our
digital world. Internet use is increasing exponentially, making us
correspondingly more vulnerable to cyber-attacks. By learning how
cybercriminals attack and how to secure our systems and data against
those attacks, you will be able to minimize the risk of data breaches and
the devastation they bring with them.
Computer security deals with the protection of computer systems and
information from harm, theft, and unauthorized use. The main reason users
get attacked frequently is that they lack adequate defenses to keep out
intruders, and cybercriminals are quick to exploit such weaknesses.
Computer security ensures the confidentiality, integrity, and availability of
your computers and their stored data.
As well as virus attacks that are very vulnerable to your computer
security system. Viruses can interfere with and kill your computer system.
Therefore, an antivirus is needed to overcome things caused by viruses. as
well as virus attacks that are very vulnerable to your computer security
system. Viruses can interfere with and kill your computer system.
Therefore, an antivirus is needed to overcome things caused by viruses.
I.2 Writing Objective
The purpose of writing this Paper is to answer the following questions:
1. What is computer virus?
2. What computer antivirus?
3. What types of virus?
4. How antivirus work?
CHAPTER IV : CONCLUSION
In this chapter contains the conclusions of the results of writing.
BIBLIOGRAPHY
In this section will contains the references that we use.
CHAPTER 2
BASIC THEORY
A. Application Security
Application security is the types of cyber security which
developing application by adding security features within applications to
prevent from cyber attacks. The attacks can be SQL injection, denial of
service (DoS) attacks, data breaches or other cyber-attacks.
B. Information Security
Information security (IS) is a types of computer security
which refers to the process and methodology to protect
the confidentiality, integrity and availability of computer system from
unauthorized access, use, modification and destruction.
Information security focuses on the CIA triad model, which
ensure confidentiality, integrity, and availability of data, without affecting
organization productivity.
C. Network Security
Network security is another types of computer security which
process of preventing and protecting against unauthorized intrusion
into computer networks. It is a set of rules and configurations which
designed to protect the confidentiality, integrity and accessibility
of computer networks system and information using both software and
hardware technologies.
D. Endpoint Security
Human error is a major weak point which is easily exploited
by cyber criminals. End users are becoming the largest security risk in any
organizations. However, end user has no fault of their own, and mostly due
to a lack of awareness and ICT policy. They can unintentional open the
virtual gates to cyber attackers.
That’s why comprehensive security policies, procedures and
protocols have to be understood in depth by users who accessing the
sensitive information. It is better to provide security awareness training
program to them and should cover the following topics:
1. Cyber security and its importance
2. Phishing and Social Engineering attack
3. Password creation and usages
4. Device Security
5. Physical Security
E. Internet Security
Internet security is the important types of computer security which
has defined as a process to create set of rules and actions to protect
computers system that are connected to the Internet. It is a branch of
computer security that deals specifically with internet-based threats such
as:
1. Hacking
A Hacker is a person who finds weakness and exploits
the vulnerability in computer systems or network to gain access. Hacking
refers to activities that exploit a computer system or a network in order to
gain unauthorized access or control over systems for illegal purpose.
2. Computer Viruses
Across the world, Computer viruses are a great issue of concern as they
can cause billions of dollars’ worth harm to the economy each year.
A. Antivirus Avira
Avira is a free Antivirus program that comes from a German
multinational family company that produces software.
Advantages:
1. Quarantine feature, to lock the virus in prison if the virus is
difficult to repair the files affected by the virus.
2. Block Autorun feature, to block or stop files that run automatically
(autorun) on the computer.
3. Scanning process on a computer that can be fairly fast.
4. Low computer memory usage, so it doesn't affect computer
performance.
5. Searching feature, to search for viruses that have been scanned and
locked up.
6. Update virus information quickly
Disadvantages:
1. Sometimes wrong in detecting software that is free and does not
have a virus.
2. Setting the place you want to scan can only be done through the
drive selection and cannot detect individual folders.
3. Long time in opening the Quarantine which already contains many
viruses.
4. Sometimes it can also be wrong to block and stop all autorun.inf
files that are not viruses.
B. Antivirus AVG
AVG is a free Antivirus program owned by AVG Technologies
that has a strong reputation for security and performance.
Advantages:
1. Scanning process on a computer that can be fairly fast.
2. Has a Real-time Security Update feature.
3. Has an additional layer of Ransomware protection, to keep files
safe.
4. Has an Enhanced Firewall.
5. Link Scanner feature, to scan and detect the security of url links
when using a web browser.
6. Anti-Rootkit feature, to prevent or block Rootkits that can hide
files and computer processes.
7. Less memory usage on the computer, so it doesn't affect the
computer's performance.
8. Auto Update feature, to Update Software automatically when
connected to the internet network.
Disadvantages:
1. sometimes, often accidentally delete .exe files that do not contain
viruses.
2. Weak in detecting Trojan viruses.
3. Software update which is quite long.
4. Depends on the OS used. that is, if the OS used is damaged then
AVG is also affected.
5. The use of the software is quite complicated.
C. Antivirus Avast
Avast is an antivirus software created and developed by Alwil
Software whose company operates in Prague, Czech Republic. Avast
has been known to be widely used by many computer users. Avast
also includes free software that can be downloaded directly on the
official website.
Advantages:
1. Scanning process on a computer is fast
2. Display software that is attractive and comfortable to look at
3. Fast and easy installation process
4. The Auto Sandbox feature, which functions to detect and execute
suspicious files, will then be processed as viruses or not. If detected as
a virus, then Avast will immediately upload the sample of the virus to
a research website for analysis.
5. Has a Heuristics engine that works well.
6. Real-time Protection
7. Reliable Web Protection and Email Protection.
8. URL Block feature, to block websites that are harmful to the
computer.
9. Scan Boot Time feature, for runtime scanning when the computer
starts up.
Disadvantages:
1. Virus selection in less reliable locale.
2. Less reliable in detecting viruses in files that come from USB.
3. Cannot scan archives with passwords.
4. The screen on the computer sometimes turns gray after Signing In
to the Software.
5. Sometimes it always asks for an update if it is connected to the
internet and eats up RAM and CPU performance.
6. The file size is quite large, which is 80 Mb.
CHAPTER IV
CONCLUSSION
IV.1 Conclussion
The security system is very important to avoid various problems, one of
which is the attack of various types of viruses, the security system functions
to overcome the virus. One of the security systems to overcome this is
Antivirus. Anti Virus is software that is used to prevent, detect, and take
action related to malicious programs such as computer viruses, keyloggers,
backdoors, trojan horses, adware, spyware, and so on. detects the latest
malware as well. Antivirus works in several ways signature, heurikit, scan
rookit, and realtime protection. according to the type of virus encountered.
IV.2 Suggestion
We must always be alert to everything, just like our computer security
system better to prevent than to fix. Virus attack will also be a big problem.
So we need a good Anti Virus according to our needs.
BILBILIOGRAPHY
https://keamanan-informasi.stei.itb.ac.id/2013/10/31/antivirus-software/
https://itstillworks.com/functions-antivirus-programs-perform-1119.html
asani.co.id/blog/fungsi-antivirus
https://www.griyawebsite.com/5-macam-antivirus-yang-sering-digunakan-
beserta-kelebihan-dan-kekurangannya/