As all software has a model or procedure to follow while executing it, Norton Security also has a protection model to follow and to provide you best security protection solution for your device.
Norton Security is the software, which protects your device from malicious activities that damage your device or degrade the performance of your device, known as Anti-virus. Norton Security Protection Model uses Security Technology and Response (STAR) Malware Protection Technologies.
Protection model has focused on five different areas of vulnerability of your device by malicious program attacks. These areas are Network, File, Reputation, Behavior, and Remediation.
Norton Security performs different activities in individual areas of the protection model and collaborates it for providing total security protection on your device.
Below are the responsibilities of the Norton Security in individual areas of Protection Model:
- Network-Based protection:
When your device connects with a network, there are largest chances of being the victim of malicious program attack. To protect your system from Network-based attacks, Norton Security checks for all known and unknown vulnerabilities available in your device and block them if any exist. Vulnerabilities are the key points which are responsible for entering data into your device.
For Network-based protection Norton Security uses following programs:
- Protocol Aware IPS
- Browser Protection
- Smart Firewall
- File-Based Protection:
In file-based Norton Protection, Norton check for malicious programs in files that already available in your device or you are transferring it from any other device into your device. To do this Norton uses following programs:
- Antivirus Engine
- Reputation-Based Protection:
In this area, Norton Protection checks for information of the source of data or information coming into your device. Norton checks for the meta information of a file (like age, origin, through which medium it is transferring, and where it exists etc.) and a website (like web page content, hosting address and IP address etc.)
Norton uses following data to protect your device in this area:
- Domain and IP reputation
- File reputation (insight)
- Behavior-Based Protection:
Norton checks at the dynamic behavior (change in behavior) of malicious programs and checks for the process of execution along with uses of malicious programs.
For detection of the behavior of malicious programs, Norton Security uses following programs:
- Behavior Signature
- Remediation Based Protection:
Norton uses remediation tools to remove infections on your device and clean all files which infected your device with the malicious programs.
As remediation tools Norton Security uses following tools:
- Boot to a clean OS
- Power Eraser uses aggressive heuristic
- Threat specific tools
Norton Security provides following services by using STAR Malware Protection Technologies:
- Norton Reputation Service:
This program checks, from where the file come and how long it will be in your device. With this service, Norton is able to detect crimeware faster than other security programs. It can provide information about from where your system is attacked with the malicious program.
- Norton Download Insight:
While you are downloading any file and Norton detects any malicious program in the file, it provides an immediate alert on your device. It can also stop running and installation of a program so that your device can keep safe from entering a malicious program into your device.
- Proactive Performance Alert:
Norton Prompts alert if any particular application is slowing down the performance of your device. It guides you to provide overall benefits of performance and operations of your device.
- Norton Control Center:
It is user interface designed to provide easy control and access to Norton operations. It also provides one-click access to many web-based services of Norton.
- Internet Protection System:
This is designed to keep secure your device from malicious programs like (Virus, Spyware, Trojan etc.) that can enter into your device through the Internet. It uses multiple overlapping layers of protection to detect for malicious programs. If one layer fails to detect malicious program, another layer detects it and take appropriate action to secure your device.
- Norton Ongoing Protection:
This is designed to ensure Norton is able to protect your device from any emerging malicious program. Norton automatically downloads and updates security software in background activity, if any updates done in the software.
- Norton System Insights:
This is designed to provide information about the performance of all files and applications available in your device. By using this information, you can get overall benefits of performance and speed of your device.
- Norton Bootable Recovery Tools:
However, the best performance is given by your security program; sometimes your device gets crash and you lost your data. To get back this lost data, Norton has recovery tools, which enables you to create a backup for your data. When you face data loss you can use recovery tools to get back your data which is saved in your device as a backup. Norton also creates a backup in your device automatically after a fixed time period.
- Norton Pulse Updates:
Norton provides automatic updates as a background process without affecting performance and speed of the device. Since it performs the process of update in the background, the user doesn’t face hour-long downloading process.
These technologies protect against following top threats:
- All the threats of attacks that can occur due to download and browse web pages on the internet
- Attacks that can be caused as result of social engineerings like FakeAv and Fake Codecs, caused due to a mistake of the user while it provides information on the social media
- Bots and Botnets, a network of infected computers that are able to damage a whole online system
- Non Process and Injected Threats (NPT), which are codes that injected into a webpage to fetch data inserting into that web page
- Threats from Target based attacks like Advanced Persistent Threats (APT), Trojans and general malware zero-day threats
Since Norton Security checks all these areas of vulnerability of attack and blocks all the entry points for malicious programs, so it is able to keep safe your device from any malicious programs.