20.08.2013 Views

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CHAPTER 10. PROACTIVE<br />

DEFENSE<br />

Warning!<br />

There is no Application Integrity Control component in this version of the<br />

application for computers running Microsoft Windows XP Professional x64<br />

Edition, Microsoft Windows Vista or Microsoft Windows Vista x64.<br />

<strong>Kaspersky</strong> Internet Security protects you both from known threats and from new<br />

ones about which there is no information in the application databases. This is<br />

ensured by a specially developed component – Proactive Defense.<br />

The need for Proactive Defense has grown as malicious programs have begun to<br />

spread faster than anti-virus updates can be released to neutralize them. The<br />

reactive technique, on which anti-virus protection is based, requires that a new<br />

threat infect at least one computer, and requires enough time to analyze the<br />

malicious code, add it to the application database and update the database on<br />

user computers. By that time, the new threat might have inflicted massive<br />

damages.<br />

The preventative technologies provided by <strong>Kaspersky</strong> Internet Security Proactive<br />

Defense do not require as much time as the reactive technique, and neutralize<br />

new threats before they harm your computer. How is this done? In contrast with<br />

reactive technologies, which analyze code using an application database,<br />

preventive technologies recognize a new threat on your computer by a sequence<br />

of actions executed by a certain program. The application installation includes a<br />

set of criteria that can help determine how dangerous the activity of one program<br />

or another is. If the activity analysis shows that a certain program’s actions are<br />

suspicious, <strong>Kaspersky</strong> Internet Security will take the action assigned by the rule<br />

for activity of the specific type.<br />

Dangerous activity is determined by the total set of program actions. For<br />

example, when actions are detected such as a program copying itself to network<br />

resources, the startup folder, or the system registry, and then sending copies of<br />

itself, it is highly likely that this program is a worm. Dangerous behavior also<br />

includes:<br />

• Changes to the file system<br />

• Modules being embedded in other processes<br />

• Masking processes in the system<br />

• Modification of certain Microsoft Window system registry keys

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!