Скачать презентацию
Идет загрузка презентации. Пожалуйста, подождите
Презентация была опубликована 10 лет назад пользователемАнатолий Мызников
1 Version 2009 Personal Security
2 Version 2009 Chapter 1. Purpose and Installation of Kaspersky Internet Security 2009 Personal Security
3 Existing Threats Viruses (network worms) Trojan programs Riskware Spam Phishing Advertisements Hacker attacks Personal Security
4 Protection Components Anti-Malware Files and Memory protection and IM protection Web Traffic protection Scanning tasks System Security Application Filtering Firewall Proactive Defense Personal Security
5 Protection Components Online Security Anti-Phishing Intrusion Prevention System Anti-Dialer Content Filtering Anti-Spam Anti-Banner Parental Control Personal Security
6 Supported Operating Systems MS Windows XP SP2 or later Microsoft Windows XP x64 Edition SP 2 MS Windows Vista (SP1 supported) Personal Security
7 Installation Launch Personal Security
8 License Agreement Personal Security
9 Setup Type Personal Security
10 Selecting the Destination Directory Personal Security
11 Selecting the Components to Install Personal Security
12 Selecting the Components to Install Personal Security
13 Interaction with the Microsoft Windows Firewall Personal Security
14 Preparing for Installation Personal Security
15 Setup Confirmation in Windows Vista Personal Security
16 Copying Files and Writing Registry Values Personal Security
17 Completing Installation Personal Security
18 Initial Configuration Personal Security
19 Activation Personal Security
20 Activation Using an Activation Code Personal Security
21 Activation Using an Activation Code Personal Security
22 Successful Key Installation Personal Security
23 Selection of the Protection Mode Personal Security
24 Configuring the Update Mode Personal Security
25 Access Password Setting Personal Security
26 Selecting the Categories of Threats Personal Security
27 DNS and Logging Settings Personal Security
28 Analysis of Installed Applications Personal Security
29 Mail Analysis Personal Security
30 Feedback Personal Security
31 Setup Completion Personal Security
32 Installation Results Personal Security
33 Structure of Directories Personal Security
34 Intercepting Driver for Network Packets Personal Security
35 Driver for Intercepting Network Packets Personal Security
36 New Registry Branch Personal Security
37 Kaspersky Internet Security 2009 System Service Personal Security
38 Kaspersky Internet Security Processes Personal Security
39 Shortcut Menu Item and System Tray Icon Personal Security
40 Main Interface Window Personal Security
41 Main Interface Window Personal Security
42 Main Interface Window Personal Security
43 Changing the List of Installed Application Components Personal Security
44 Selecting the Operation Personal Security
45 Removal Personal Security
46 Removal Personal Security
47 Removal Completion Personal Security
48 Version 2009 Lab Practice 1.1 Installing Kaspersky Internet Security 2009 Personal Security
49 Version 2009 Chapter 2. Configuring Updates Personal Security
50 Purpose of Updates Updates to threat signatures (anti-virus databases) Updates to program modules of Kaspersky Internet Security Personal Security
51 Structure of Threat Signatures Personal Security
52 Selecting Objects which will be Updated Personal Security
53 Selecting the Source of Updates Personal Security
54 Selecting the Source of Updates Personal Security
55 Selecting the Source of Uupdates Personal Security
56 Configuring Connection Personal Security
57 Startup Mode Personal Security
58 Startup Mode Personal Security
59 Startup Mode Personal Security
60 Startup Mode Personal Security
61 Current Status of the Databases Personal Security
62 Current Status of the Databases Personal Security
63 Current Status of the Databases Personal Security
64 Sharing of the Databases Personal Security
65 Version 2009 Lab Practice 2.1 Updating the Databases and Program Modules of Kaspersky Internet Security 2009 Personal Security
66 Version 2009 Chapter 3. Protection against Viruses and Other Malware Personal Security
67 Files and Memory Protection Performs Interception of operations with files Scanning of the files being accessed Scanning methods Signature-based analysis Heuristic analysis Personal Security
68 Scanning Settings Personal Security
69 Security Level Personal Security
70 File Types to Scan Personal Security
71 Protection Scope Personal Security
72 Scan Optimization Personal Security
73 Scan Optimization Personal Security
74 Scan Mode Personal Security
75 Pausing the Files and Memory Protection Personal Security
76 Pausing the Files and Memory Protection Personal Security
77 Selecting an Application Personal Security
78 Action on an Infected Object Detection Personal Security
79 Processing of Infected Objects Personal Security
80 Processing of Suspicious Objects Personal Security
81 Automatic Processing Personal Security
82 Detected Threats Personal Security
83 Processing of Active Threats Personal Security
84 Quarantine Personal Security
85 Quarantine Personal Security
86 Disinfected Objects Personal Security
87 All Threats Personal Security
88 Report Personal Security
89 Report Personal Security
90 Configuring Exclusions Personal Security
91 Selecting Threats Personal Security
92 Exclusion Rules Personal Security
93 New Rule Personal Security
94 Excluded Object and Threat Type Personal Security
95 Selecting the Protection Components Personal Security
96 Selecting the Protection Components Personal Security
97 Trusted Applications Personal Security
98 Version 2009 Lab Practice 3.1 Studying the Files and Memory Protection Personal Security
99 On-Demand Scan Tasks They scan Objects on hard, network and removable drives Random Access Memory (RAM) They use Signature-based analysis Heuristic analysis Rootkit scan Scanning for vulnerabilities Personal Security
100 Full Scan Personal Security
101 Quick Scan Personal Security
102 Custom Scan Personal Security
103 Scanning the Quarantine Personal Security
104 List of Objects to Scan Personal Security
105 File Types to Scan Personal Security
106 Scanning of Compound Files Personal Security
107 Scanning Methods Personal Security
108 Processing of Infected Objects Personal Security
109 Startup Schedule Personal Security
110 Startup Schedule Personal Security
111 Startup Schedule Personal Security
112 Actions when Scan is Complete Personal Security
113 Actions when Scan is Complete Personal Security
114 Peculiarities of the Scan Task Personal Security
115 Peculiarities of the Scan task Personal Security
116 and IM Protection Performs Scanning of mail messages Scanning of the traffic generated by instant messaging programs (ICQ, MSN) Scanning methods Signature-based analysis Heuristic analysis Personal Security
117 Methods of Message Interception Intercepted protocols POP3 SMTP NNTP IMAP Integration of plug-ins into mail clients Microsoft Office Outlook Personal Security
118 and IM Protection Settings Personal Security
119 Security Level Personal Security
120 Security Level Settings Personal Security
121 Performance Personal Security
122 Filtering Attached Files Personal Security
123 Plug-In for Microsoft Office Outlook Personal Security
124 Action on an Infected Object Detection Personal Security
125 Prompting the User for Action Personal Security
126 Changing the Message Subject Personal Security
127 Attachment Filter Operation Personal Security
128 Blocking of Dangerous Links Personal Security
129 Configuring Ports Personal Security
130 Configuring Ports Personal Security
131 Scanning of Secure Connections Personal Security
132 Installing a Certificate Personal Security
133 Web Traffic Protection Purpose Scanning of HTTP traffic Blocking of dangerous scripts Blocking of potentially unsafe web sites Scanning methods Signature-based analysis Heuristic analysis Personal Security
134 Web Traffic Protection Settings Personal Security
135 Security Level Settings Personal Security
136 Security Level Settings Personal Security
137 Processing of Infected Objects Personal Security
138 Integration with Internet Explorer Personal Security
139 Blocking of Dangerous Objects Personal Security
140 Blocking of Dangerous Objects Personal Security
141 Checking Suspicious Web Sites Personal Security
142 Version 2009 Lab Practice 3.2 Studying the Web Traffic Protection Personal Security
143 Version 2009 Chapter 4. System Security Personal Security
144 System Security Controls access to computer resources Files System registry USB and Bluetooth devices Controls operations On operating system objects On other applications Controls network activity Personal Security
145 System Security Components Personal Security
146 Calculating the Trust Level Digital signature of product vendor or presence in the white list Trusted Danger rating Low Restricted High Restricted Untrusted Personal Security
147 Analyzing a New Application Personal Security
148 Application Trust Levels Trusted full access Low Restricted a confirmation is required While changing important operating system files While accessing confidential user data While accessing to the processes of other applications High Restricted changing of important operating system files is blocked Untrusted blocked completely Personal Security
149 Applications List Personal Security
150 Applications List Personal Security
151 Computer Resources Personal Security
152 Configuring the Trust Level Personal Security
153 Disabling Monitoring Personal Security
154 Changing Access Rights Personal Security
155 Detailed Configuration of the Access Rights Personal Security
156 Control over Operations Personal Security
157 Access to Resources Personal Security
158 Access to Resources Personal Security
159 Configuring Exclusions Personal Security
160 Checking the Trust Level of an Application Path to the executable file Checksum Personal Security
161 Applying the Filtration Rules Personal Security
162 Applying the Filtration Rules Personal Security
163 Information about Application Personal Security
164 Variants of Available Actions Personal Security
165 Variants of Available Actions Personal Security
166 Result of a Rule Creation Personal Security
167 Managing Devices Personal Security
168 Managing Devices Personal Security
169 Security Analysis Personal Security
170 Searching for Vulnerabilities Personal Security
171 Searching for Vulnerabilities Personal Security
172 Analyzing Settings Personal Security
173 Recommended Actions Personal Security
174 Report Personal Security
175 Report Personal Security
176 Version 2009 Lab Practice 4.1 Configuring the Application Filtering Personal Security
177 Proactive Defense Personal Security
178 List of Dangerous Events Personal Security
179 Reacting to Threat Personal Security
180 Firewall Personal Security
181 Firewall Settings Operation mode General filtration rules for packets Filtration rules for applications Statuses of connected networks Personal Security
182 Operation Mode Personal Security
183 General Filtration Rules for Packets Personal Security
184 Structure of the Rules for Packets Action Allow Block Process according to the application rules Service Protocol Connection direction Local and remote ports Address(es) Personal Security
185 Configuring a New Rule Personal Security
186 Selecting a Network Service Personal Security
187 List of Services Personal Security
188 Selecting an Address Personal Security
189 Selecting an Address Personal Security
190 List of Networks Personal Security
191 Standard Internet Network Personal Security
192 Connected Networks Personal Security
193 Connected Networks Personal Security
194 Order of Rules Application for Packets Personal Security
195 Additional Filtration Settings Personal Security
196 Filtration Rules for Applications Personal Security
197 Default Rules Personal Security
198 Adding Application Rules Personal Security
199 User Prompt for Action Personal Security
200 Network Monitoring Personal Security
201 Rules Application Log Personal Security
202 Traffic Report Personal Security
203 Network Notifications Personal Security
204 Network Notifications Personal Security
205 Version 2009 Lab Practice 4.2 Learning the Firewall Functionality Personal Security
206 Version 2009 Chapter 5. Online Security Personal Security
207 Online Security Personal Security
208 Example of Anti-Phishing Operation Personal Security
209 Protection against Network Attacks Personal Security
210 Blocked Computers Personal Security
211 Example of a Network Attack Personal Security
212 Anti-Dialer Personal Security
213 Virtual Keyboard Personal Security
214 Version 2009 Lab Practice 5.1 Studying the Online Security Chapter 3. Using Kaspersky Anti-Virus Locally
215 Version 2009 Chapter 6. Content Filtering Personal Security
216 Anti-Spam Personal Security
217 Anti-Spam Configuration Personal Security
218 White Lists Personal Security
219 Black Lists Personal Security
220 Probabilistic Recognition Algorithms Personal Security
221 Additional Criteria Personal Security
222 Anti-Spam Training Personal Security
223 Launching the Training Wizard Personal Security
224 Selecting the Folders Containing Useful Mail Personal Security
225 Selecting the Folders Containing Useful Mail Personal Security
226 Selecting the Folders Containing Unwanted Mail Personal Security
227 Selecting the Folders Containing Unwanted Mail Personal Security
228 Mail Analysis Personal Security
229 Recording Analysis Results to Database Personal Security
230 Training Result Personal Security
231 Mail Dispatcher Personal Security
232 Mail Dispatcher Personal Security
233 Result of Message Removal by the Mail Dispatcher Personal Security
234 Message Processing Result Personal Security
235 Plug-In for Microsoft Office Outlook Personal Security
236 Plug-In for Microsoft Office Outlook Personal Security
237 Plug-In for Microsoft Office Outlook Personal Security
238 Plug-In for Microsoft Office Outlook Personal Security
239 Plug-In for Windows Mail Personal Security
240 Plug-In for Windows Mail Personal Security
241 Plug-In for Mozilla Thunderbird Personal Security
242 Report on the Anti-Spam Activity Personal Security
243 Detailed Report Personal Security
244 Anti-Banner Personal Security
245 Filtration Settings for Banners Personal Security
246 Filtration Settings for Banners Personal Security
247 Filtration Settings for Banners Personal Security
248 Integration with Internet Explorer Personal Security
249 Version 2009 Lab Practice 6.1 Studying the Anti-Banner Personal Security
250 Parental Control Allows restriction of Internet access The restriction mode is determined by the current profile Parent Teenager Child Personal Security
251 Enabling Parental Control Personal Security
252 Password Protection for Configuring Disabling Components Personal Security
253 Configuring Restrictions Personal Security
254 Configuring Restrictions Personal Security
255 Restricting Access to Web Sites Personal Security
256 Restricting Access to Web Sites Personal Security
257 Restricting Access to Web Sites Personal Security
258 Restricting Time in the Internet Personal Security
259 Teenager Profile Personal Security
260 Parent Profile Personal Security
261 Automatic Profile Switching Personal Security
262 Automatic Profile Switching Personal Security
263 Confirmation of Configuration Changes Personal Security
264 Switching the Profile Manually Personal Security
265 Enforcing Restrictions Personal Security
266 Privacy Cleaner Personal Security
267 Privacy Cleaner Personal Security
268 Privacy Cleaner Personal Security
269 Version 2009 Lab Practice 6.2 Configuring Parental Control Personal Security
270 Version 2009 Chapter 7. General Settings of Kaspersky Internet Security Personal Security
271 Pausing Protection Personal Security
272 General Protection Settings Personal Security
273 Automatic Action Selection ComponentOperation Files and Memory protection On-demand scan and IM protection Web Traffic protection Disinfect (Quarantine), delete if disinfection fails Application FilteringAccess to files and registry is blocked FirewallNetwork access is allowed Proactive DefensePotentially unsafe action is allowed Online SecurityAction is blocked automatically Personal Security
274 Saving Settings Personal Security
275 Restoring Settings from File Personal Security
276 Restoring the Default Settings Personal Security
277 Restoring the Default Settings Personal Security
278 Restoring the Default Settings Personal Security
279 Self-Protection and Compatibility Personal Security
280 General Protection Report Personal Security
281 Statistics Personal Security
282 Reports Storage Settings Personal Security
283 Clearing Reports Manually Personal Security
284 Configuring Notifications Personal Security
285 Configuring Notifications Personal Security
286 Mail Notifications Personal Security
287 Managing the License Keys Personal Security
288 Warning about License Expiry Personal Security
289 Support Personal Security
Еще похожие презентации в нашем архиве:
© 2024 MyShared Inc.
All rights reserved.