ICT 0417 – Networks and the Effects of Using Them4 Networks and the Effects of Using Them
Objective
Know and understand scanning the data/software when downloading.
Why Scanning Is Required
- Protects the computer from viruses, worms, trojans and other malicious code.
- Prevents the spread of malware to other devices on the same network.
- Ensures the integrity of downloaded files – the file received is the file that was intended.
- Helps organisations comply with security policies and data‑protection regulations.
Common Threats Encountered When Downloading
- Viruses – self‑replicating programs that can corrupt or delete data.
- Worms – spread automatically across networks without user interaction.
- Trojan horses – appear legitimate but contain hidden malicious functions.
- Adware / Spyware – display unwanted ads or collect personal information.
- Ransomware – encrypts files and demands payment for decryption.
Scanning Process – Step by Step
- Initiate the download from a trusted source.
- Save the file to a temporary folder rather than directly to the final location.
- Launch the installed antivirus/anti‑malware program.
- Select “Scan file” or “Scan folder” and point to the temporary location.
- Review the scan results:
- If the file is clean – move it to the intended folder.
- If a threat is detected – delete or quarantine the file and report the incident.
- Update the virus definition database before the next download.
Tools Frequently Used for Scanning
| Tool | Type | Key Features |
|---|
| Windows Defender | Built‑in antivirus | Real‑time protection, cloud‑based updates, integration with Windows Explorer. |
| Malwarebytes | Anti‑malware | Specialised in removing adware, spyware and potentially unwanted programs. |
| ClamAV | Open‑source scanner | Command‑line interface, suitable for servers and automated scripts. |
| A \cdot G / Avast | Third‑party antivirus | Web shield, email scanning, scheduled scans. |
Best Practices for Safe Downloading
- Only download software from the vendor’s official website or reputable app stores.
- Verify digital signatures or checksums (MD5, SHA‑256) when they are provided.
- Keep the operating system and all security software up to date.
- Enable real‑time scanning and automatic updates.
- Educate users about phishing emails and deceptive download links.
- Use a sandbox or virtual machine for testing unknown files before installing them on the main system.
Summary Table – Quick Reference
| Action | When to Perform | Result Expected |
|---|
| Check source credibility | Before initiating any download | Reduced risk of malicious files. |
| Run a scan on the downloaded file | Immediately after download, before opening | Detection and removal of threats. |
| Verify checksum or digital signature | When provided by the publisher | Assurance that the file has not been altered. |
| Update virus definitions | Daily or as prompted by the security software | Protection against the latest malware. |
Suggested diagram: Flowchart showing the download‑scan‑verify‑install process.