Symantec 11022527 Computer Accessories User Manual


 
attacks. It alsoprovides information about the known
attacks that they are protected from.
Vulnerabilities are flaws in your programs or your
operatingsystemthatcancreateweaknessesinoverall
security of your system. Improper computer
configurations or security configurations also create
vulnerabilities. External attackers exploit these
vulnerabilities andperform maliciousactions onyour
computer. Examples of such malicious attacks are
active desktop monitoring, keylogging, and hacking.
Such attacks can slow down the performance of your
computer, cause program failure, or expose your
personal data and confidential information to the
hackers.
Norton 360 provides the signature-based solutions to
protectyourcomputerfromthe mostcommonInternet
attacks.Attacksignaturescontaintheinformationthat
identifies an attackers attempt to exploit a known
vulnerability in your operating system or your
computerprograms.TheIntrusionPreventionfeature
ofNorton360usesanextensivelist ofattacksignatures
to detect and block suspicious network activity.
Vulnerability Protection lets you view the correlation
between the vulnerabilities that your computer is
protected against and the programs that may contain
thesevulnerabilities.Forexample,ifInternetExplorer
does not handle certain HTTP responses, it can result
in a vulnerability that can be exploited. In this case,
Vulnerability Protection lists Internet Explorer as a
vulnerable program. It also provides detailsabout the
signaturesthatIntrusionPreventionusestodetectany
attempt to exploit this vulnerability.
Viewing the list of vulnerable programs
The VulnerabilityProtection window lets you view
the extensive list of programs with the known
vulnerabilities that Norton 360 protects you against.
For each program, you can view details such as the
name of the program, its vendor, and the number of
145Maintaining total protection
About viewing detailsof systemvulnerabilities