What specific software can examine a computer for any infections as well as monitor?

What specific software can examine a computer for any infections as well as monitor?

A packet sniffer — also known as a packet analyzer, protocol analyzer or network analyzer — is a piece of hardware or software used to monitor network traffic. Sniffers work by examining streams of data packets that flow between computers on a network as well as between networked computers and the larger Internet. These packets are intended for — and addressed to — specific machines, but using a packet sniffer in "promiscuous mode" allows IT professionals, end users or malicious intruders to examine any packet, regardless of destination. It's possible to configure sniffers in two ways. The first is "unfiltered," meaning they will capture all packets possible and write them to a local hard drive for later examination. Next is "filtered" mode, meaning analyzers will only capture packets that contain specific data elements.

Packet sniffers can be used on both wired and wireless networks — their efficacy depends on how much they are able to "see" as a result of network security protocols. On a wired network, sniffers might have access to the packets of every connected machine or may be limited by the placement of network switches. On a wireless network, most sniffers can only scan one channel at a time, but the use of multiple wireless interfaces can expand this capability.

What specific software can examine a computer for any infections as well as monitor?

Prevalence and Risk Factors

Using a sniffer, it's possible to capture almost any information — for example, which websites that a user visits, what is viewed on the site, the contents and destination of any email along with details about any downloaded files. Protocol analyzers are often used by companies to keep track of network use by employees and are also a part of many reputable antivirus software packages. Outward-facing sniffers scan incoming network traffic for specific elements of malicious code, helping to prevent computer virus infections and limit the spread of malware.

It's worth noting, however, that these analyzers can also be used for malicious purposes. If a user is convinced to download malware-laden email attachments or infected files from a website, it's possible for an unauthorized packet sniffer to be installed on a corporate network. Once in place, the packet sniffer can record any data transmitted and send it to a command and control (C&C) server for further analysis. It's then possible for hackers to attempt packet injection or man-in-the-middle attacks, along with compromising any data that was not encrypted before being sent.

Proper use of packet sniffers can help clean up network traffic and limit malware infections; to protect against malicious use, however, intelligent security software is required.

  • What is a Web Filter?
  • What is a Tunneling Protocol?

Kaspersky

A packet sniffer — also known as a packet analyzer, protocol analyzer or network analyzer — is a piece of hardware or software used to monitor network traffic. Sniffers work by examining streams of data packets that flow between computers on a network as well as between networked computers and the larger Internet.

What specific software can examine a computer for any infections as well as monitor?

Cards Return to Set Details

Term
Definition
A record or list of individuals who have permission to enter a secure area, the time that they entered, and the time they left the area.
Term
Definition
A log that can provide details regarding requests for specific files on a system.
Term
Definition
Software that helps prevent computers from becoming infected by different types of spyware.
Term
Definition
Software that can examine a computer for any infections as well as monitor computer activity and scan new documents that might contain a virus.
Term
Definition
A log that can track user authentication attempts.
Term
Definition
Logs that are the second common type of security-related operating system logs.
Term
Definition
Spam filtering software that analyzes the contents of every word in an email and determines how frequently a word occurs in order to determine if it is spam.
Term
Definition
A device that can be inserted into the security slot of a portable device and rotated so that the cable lock is secured to the device to prevent it from being stolen.
Term
closed-circuit television (CCTV)
Definition
Using video cameras to transmit a signal to a specific and limited set of receivers used for surveillance in areas that require security monitoring.
Term
cross-site request forgery (XSRF)
Definition
An attack that uses the user's Web browser settings to impersonate the user.
Term
data loss prevention (DLP)
Definition
A system that can identify critical data, monitor how it is being accessed, and protect it from unauthorized users.
Term
Definition
A door lock that extends a solid metal bar into the door frame for extra security.
Term
Definition
Faults in a program that occur while the application is running.
Term
Definition
Logs that can document any unsuccessful events and the most significant successful events.
Term
Definition
a restricted area by erecting a barrier.
Term
Definition
Hardware or software that is designed to prevent malicious packets from entering or leaving computers.
Term
Definition
A software testing technique that deliberately provides invalid, unexpected, or random data as inputs to a computer program.
Term
Definition
Using the Global Positioning System (GPS) to detect the location of a portable device.
Term
Definition
Creating a virtualized environment to simulate the central processing unit (CPU) and memory of the computer to check for the presence of a virus.
Term
host-based software firewall
Definition
A firewall that runs as a program on a local system to protect it against attacks.
Term
Definition
Software that addresses a specific customer situation and often may not be distributed outside that customer's organization.
Term
Definition
Verifying a user's input to an application.
Term
Definition
A secure storage unit that can be used for storing portable devices.
Term
Definition
A record of events that occur.
Term
Definition
A device that monitors and controls two interlocking doors to a small room (a vestibule), designed to separate secure and nonsecure areas.
Term
Definition
A general software security update intended to cover vulnerabilities that have been discovered.
Term
Definition
Either a program or a feature incorporated within a browser that stops pop-up advertisements from appearing.
Term
Definition
A device that detects an emitted signal in order to identify the owner.
Term
Definition
A technology that can remotely erase data from a portable device and reset it to its default factory settings.
Term
Definition
A ruggedized steel box with a lock.
Term
Definition
Logs that are considered the primary source of log data.
Term
Definition
A document or series of documents that clearly defines the defense mechanisms an organization will employ to keep information secure.
Term
Definition
Software that is a cumulative package of all security updates plus additional features.
Term
Definition
A sequence of bytes (a string) found in the virus as a virus signature.
Term
Definition
Using encryption to mask the content of voice communications.

Supporting users have an ad free experience!

What specific software can examine a computer for any infections as well as monitor?

What specific software can examine a computer for any infections as well as monitor?

What specific software can examine a computer for any infections as well as monitor?