attacks.It also provides information about the known
attacksthat they are protected from.
Vulnerabilitiesare flaws in your programs or your
operatingsystem that can create weaknesses in overall
securityof your system. Improper computer
configurationsor security configurations also create
vulnerabilities.External attackers exploit these
vulnerabilitiesand perform malicious actions on your
computer.Examples of such malicious attacks are
activedesktop monitoring, keylogging, and hacking.
Suchattacks can slow down the performance of your
computer,cause program failure, or expose your
personaldata and confidential information to the
hackers.
Norton360 provides the signature-based solutions to
protectyour computer from the most common Internet
attacks.Attack signatures contain the information that
identifiesan attackers attempt to exploit a known
vulnerabilityin your operating system or your
computerprograms. The Intrusion Prevention feature
ofNorton 360 uses an extensive list of attack signatures
todetect and block suspicious network activity.
VulnerabilityProtection lets you view the correlation
betweenthe vulnerabilities that your computer is
protectedagainst and the programs that may contain
thesevulnerabilities. For example, if Internet Explorer
doesnot handle certain HTTP responses, it can result
ina vulnerability that can be exploited. In this case,
VulnerabilityProtection lists Internet Explorer as a
vulnerableprogram. It also provides details about the
signaturesthat Intrusion Prevention uses to detect any
attemptto exploit this vulnerability.
Viewingthe list of vulnerable programs
TheVulnerability Protection window lets you view
theextensive list of programs with the known
vulnerabilitiesthat Norton 360 protects you against.
Foreach program, you can view details such as the
nameof the program, its vendor, and the number of
145Maintainingtotal protection
Aboutviewing details of system vulnerabilities