Computer Viruses: Infection Vectors, And Feasibility Of Complete System Protection.

556 words - 2 pages

A computer virus is a program which, after being loaded into a computer's memory, copies itself with the purpose of spreading to other computers.Most people, from the corporate level power programmer down to the computer hobbyist, have had either personal experience with a virus or know someone who has. And the rate of infection is rising monthly. This has caused a wide spread interest in viruses and what can be done to protect the data now entrusted to the computer systems throughout the world.A virus can gain access to a computer system via any one of four vectors:1. Disk usage: in this case, infected files contained on a diskette (including, on occasion, diskettes supplied by software manufacturers) are loaded, and used in a previously uninfected system thus allowing the virus to spread.2. Local Area Network: a LAN allows multiple computers to share the same data, and programs. However, this data sharing can allow a virus to spread rapidly to computers that have otherwise been protected from external contamination.Jackman 23. Telecommunications: also known as a Wide Area Network, this entails the connection of computer systems to each other via modems, and telephone lines. This is the vector most feared by computer users, with infected files being rapidly passed along the emerging information super-highway, then downloaded from public services and then used, thus infecting the new system.4. Spontaneous Generation: this last vector is at the same time the least thought of and the least likely. However, because virus programs tend to be small, the possibility exists that the code necessary for a self-replicating program could be randomly generated and executed in the normal operation of any computer system.Even...

Find Another Essay On Computer Viruses: Infection Vectors, and Feasibility of complete system protection.

Aircraft Ice Protection System: Description and Operation

1575 words - 6 pages AIRCRAFT ICE PROTECTION SYSTEM DESCRIPTION AND OPERATION OF FOUR AIRCRAFT ICE PROTECTION SYSTEM (With reference to A330 Aircraft as shown above) 1. WING ANTI-ICING – using hot air bleed from pneumatic systems (red color) 2. ENGINE ANTI-ICING – using hot air bleed from engine HP compressor (red color) 3. PROBE HEATING – electrically controlled heating applied to Pitot, Static and TAT probes 4. WINDOW HEATING – electrically controlled

The Components of a Computer and Information Processing System

975 words - 4 pages The Components of a Computer and Information Processing System In today’s world, computers are everywhere. People use them in a wide range of ways in every aspect of life whether it is interacting with friends, cooking a meal, or transferring funds from one account to another. However, many people do not think about the many aspects of computing and the various devices and software that are part of the information process. Basics of the

Features of Bacteria, Viruses and Fungi

2883 words - 12 pages of immunity is "learned" as you go along in life. Immunity can be "active"whereby your own immune system makes the cells and substances necessary for a response, or "passive" whereby preformed immune substances are provided for you. There are four main ways immunity can be acquired: · Natural (active) immunity results from exposure and recovery from infection · Natural (passive) immunity results from a transfer of

Feasibility of Earth-Tube Ventilation System in Chinese Buildings

2783 words - 12 pages ] K.H. Lee, Richard K. Strand, Implementation of an earth tube system into EnergyPlus program, in: Proceedings of SimBuild 2006, August 2–4, MIT, Cambridge, Mass, 2006 [27] V.A.F. Costa, Thermodynamic analysis of building heating or cooling using the soil as heat reservoir, International Journal of Heat and Mass Transfer 49 (2006) 4152–4160. [28] Kwang Ho Lee*, Richard K. Strand, The cooling and heating potential of an earth tube system in buildings. Energy and Buildings 40 (2008) 486–494 [29] V.M. Puri, Feasibility and performance curves for intermittent earth tube heat exchangers, Transactions on ASE 29 (1986) 526–532.

Joint Selective Encryption of CAVLC and Signs of Motion vectors for H.264/AVC

2209 words - 9 pages .264 Advanced Video Coding (AVC). The selective encryption was applied on Context Adaptive Variable Length Coding (CAVLC) and on the signs of motion vectors. Results were deducted according to the values of Peak Signal to Noise Ratio (PSNR), Structural SIMilarity (SSIM) and the Encryption Rate (ER). Combining Selective Encryption of CAVLC (SE-CAVLC) and motion vector sign encryption (MVSE) are interesting to enhance the encryption efficiency and

An operating system is a program that acts an intermediary betweena user of a computer and the computer hardware

663 words - 3 pages The Operating System With Advantages and Disadvantages Nowadays,most of the computers are using the Window as their operating system.Microsoft-designed computer operating system, a program that controlsthe basic functions of personal computers. Windows started life asMicrosoft?s take on a graphical user interface (GUI). Windows 3.0,Window 3.1, and Window 3.11 were the three earliest versions ofMicrosoft?s Windows operating system. Windows 95 is

Protection of White Superiority in America's Justice System

1865 words - 8 pages Matt Hanan Professor Gomez Political Science 506 April 10, 2014 Essay #2 The United States prides itself on the fairness of its criminal justice system, a system that promises to protect the lives, liberties, and property of all citizens. As the threat of being a victim of a crime applies to all citizens of the United States, most Americans would agree that wrongdoers must be punished in order to maintain a safe and civil society. However, as

Computer Programmers And System Analysts Personal Traits

1023 words - 4 pages ", who lists in detail the steps the computer programmers must follow in order to complete a given task. Computer system analyst first analyzes the computing needs of a business and then designs a new system or upgrades an old system to meet those needs. The position can be split between two different people, the systems programmer and the systems analyst, but is frequently held by just one person who oversees the work from beginning to end

Incident Response: Computer Security System and Data

1089 words - 5 pages 3.6 Incident Response Incident response is the method for dealing with the security of a computer system when there is an attack. Incident response activities include incident verification, analyzing and containing the attack, collecting and preserving data, fixing the problem, and restoring services. Hence it is very essential to revise the organization's incident response plan and ensure that the differences between the computing environment

Business Data Networks and Communications Impact of Viruses on Networks

800 words - 3 pages Karin BeanAssignment IINovember 28, 2004Computer Viruses have brought a lot of chaos and confusion to many computer users, and are damaging to all enterprises using LANs and WAN. The latest wave of computer-borne viruses and worms shows just how vital it is for firms, to ensure that their IT departments are up-to-date with virus definitions and keep their anti virus programs on the highest level of maintenance to fight invasion.What is a Virus

Symptoms and Modes of Infection of Bacillus Anthracis

1937 words - 8 pages Bacillus anthracis (anthrax) is a bacterium that infects organisms through sporulation. Bacillus anthracis is can be aerobic (needs oxygen) or, facultative anaerobic (does not require oxygen). It is also a gram positive bacterium that can be found in the soil of humid and damp climates (Hicks, 2012). The bacterium is part of the species Bacillus Cereus (Koehler, 2009). It is known to infect life forms four different ways. Infection can be caused

Similar Essays

Computer Viruses And Malware Essay

871 words - 3 pages INTRODUCTION Two of the common known attacks on computing systems are the deployment of computer viruses and malware. Computer viruses are minute program which is “embedded inside an application or within a data file which can copy itself into another program“(Adams et al, 2008 ) for the sole determination of meddling with normal computer operations. The consequences may range from corruption and deletion of data; propagation of virus on

Polymorphic And Cloning Computer Viruses Essay

1832 words - 7 pages flourish. As time passes on, so-called 'viruses' are becoming more and more adaptive and dangerous. No longer are viruses merely a rarity among computer users and no longer are they mere nuisances. Since many people depend on the data in their computer every day to make a living, the risk of catastrophe has increased tenfold. The people who create computer viruses are now becoming much more adept at making them harder to detect and eliminate. These so

Cybercrime History: Computer Viruses And What Are They?

1977 words - 8 pages that gets unauthorized access to the computer then the hacker bypasses monitoring software antivirus, and a firewall does not detect it, so it then replaces the system files or the libraries or installs a kernel module ("A Brief History of Malware", Rootkit, and More Information About Viruses). The kernel module is part of the a computer operating system it is the core that provides basic services for all other parts of the operating system

Feasibility Report. A Feasibility Study Of The Feasibility Of Implementing A Computerised Information System To A Stock Broking Busines

2189 words - 9 pages orders to be placed.An online display of the services offered, completed with a description, will allow potential clients to seek out the information they need them self, thus leaving our staff to concentrate their time on other tasks.Now that we have decided what we want our new information system to do for us, we need to look at the requirements for both software and hardware.Each of our employees will be equipped with a late model computer, and