Browse Definitions :
Definition

virus signature (virus definition)

A virus signature (also known as a virus definition) is a file or multiple files that are downloaded by a security program to identify a computer virus.

The files enable detection of malware by the antivirus (and other antimalware) software in conventional file scanning and breach detection systems.

Researchers at antivirus firms study viruses found commonly on the internet, often testing their behavior in a sandbox-type set up. The sandbox is generally a virtual machine-based environment. The behavior, file names used and unique strings of data in the files are all analyzed.

Commercial antivirus utilities have long depended on virus definitions. Security software frequently downloads the files to keep the software able to detect current threats. The files are used to update criteria for detection of files in hard drive scans and checks on running processes. The main weakness of virus signatures is in detection of new viruses.

Another method of virus detection is the use of heuristics. In these systems, antivirus programs use algorithms to detect the behavior patterns that were found when a specific virus was tested by researchers. Strong heuristics are becoming increasingly important because of advanced persistent threats, which conceal themselves through encryption to evade detection by typical scans. Metamorphic and polymophic viruses, which change their code in propagation, also hide malicious software from conventional scanning processes.

This was last updated in January 2017

Continue Reading About virus signature (virus definition)

SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk profile

    A risk profile is a quantitative analysis of the types of threats an organization, asset, project or individual faces.

SearchSecurity
SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • MRAM (magnetoresistive random access memory)

    MRAM (magnetoresistive random access memory) is a method of storing data bits using magnetic states instead of the electrical ...

  • storage volume

    A storage volume is an identifiable unit of data storage. It can be a removable hard disk, but it does not have to be a unit that...

  • storage capacity planning

    Storage capacity planning is the practice of assessing current data storage needs and forecasting future storage requirements.

Close