Computer Viruses: Infection Vectors, and Feasibili
This essay Computer Viruses: Infection Vectors, and Feasibili has a total of 558 words and 4 pages.
Computer Viruses: Infection Vectors, and Feasibility of Complete Protection
A computer virus is a program which, after being loaded into a
computer\'s memory, copies itself with the purpose of spreading to other
Most people, from the corporate level power programmer down to the
computer hobbyist, have had either personal experience with a virus or know
someone who has. And the rate of infection is rising monthly. This has caused a
wide spread interest in viruses and what can be done to protect the data now
entrusted to the computer systems throughout the world.
A virus can gain access to a computer system via any one of four
1. Disk usage: in this case, infected files contained on a diskette
(including, on occasion, diskettes supplied by software
manufacturers) are loaded, and used in a previously uninfected
system thus allowing the virus to spread.
2. Local Area Network: a LAN allows multiple computers to share the
same data, and programs. However, this data sharing can allow
a virus to spread rapidly to computers that have otherwise been
protected from external contamination.
3. Telecommunications: also known as a Wide Area Network, this
entails the connection of computer systems to each other via
modems, and telephone lines. This is the vector most feared
by computer users, with infected files being rapidly passed
along the emerging information super-highway, then downloaded
from public services and then used, thus infecting the new system.
4. Spontaneous Generation: this last vector is at the same time
the least thought of and the least likely. However, because
virus programs tend to be small, the possibility exists that
the code necessary for a self-replicating program could be
randomly generated and executed in the normal operation of
any computer system.
Even disregarding the fourth infection vector, it can be seen that the
only way to completely protect a computer system is to isolate it from all
contact with the outside world. This would include the user programming all of
the necessary code to operate the system, as even commercial products have been
known to be shipped already infected with viruses.
In conclusion, because a virus can enter a computer in so many different
ways, perhaps the best thing to do is more a form of damage control rather than
prevention. Such as, maintain current backups of your data, keep your original
software disks write-protected and away from the computer, and use a good Virus
Outline Thesis: Complete protection of a computer system from viruses is not
possible, so efforts should be concentrated on recovery rather than prevention.
I. Introduction, with definition.
A. Define Computer Virus.
B. Define interest group.
C. Define problem. II. Discus the ways that a virus can infect a
A. Disk exchange and use.
B. Local Area Network.
C. Telecommunications also known as Wide Area Network.
D. Spontaneous Generation. III. Summarize threat, and alternatives.
A. Must isolate from outside world.
B. Must write own programs.
C. Propose alternative of damage control.
Burger, Ralf. Computer Viruses and Data Protection. Grand Rapids:
Fites, Philip, Peter Johnston, and Martin Kratz. The Computer Virus
Crisis. New York: Van Nostrand Reinhold, 1989: 6-81.
McAfee, John, and Colin Haynes. Computer Viruses, Worms, Data
Diddlers, Killer Programs, and Other Threats to Your System.
New York: St. Martin\'s Press, 1989: i-195.
Topics Related to Computer Viruses: Infection Vectors, and Feasibili
Internet security, Computer viruses, Virus, AI, Computer worm, Antivirus software, Comparison of computer viruses
Essays Related to Computer Viruses: Infection Vectors, and Feasibili
Political CommunicationPolitical Communication Politics and the media have long been intimately involved with each other, with media strongly setting an agenda in which politics is very important. (Harris 1999,p.167) “Our perceived reality of the real world is largely a product of the media.” (Harris 1999,p.186) It is not known which influences more but there are definitely two sides to the story. Many studies have been done to decide but each comes out with different answers. Many say that the media has more of an im
The DelugeThe Deluge Exhausted, Kendra leaned back against the tree. The quiet of the night surrounded her, and in the distance she could see a small orange glow here and there of fires set by those who had been forced to leave their homes and set up camp in this park. She closed her eyes, rested her arms on her knees, and put her head down on her arms, cushioned by the sweatshirt she wore. The sweatshirt smelled of fresh air and smoke. She pulled the sleeves down over her cold hands. She sat like that fo
The old man and the seeThe old man and the see THE HISTORY OF INTERNET In the beginning of the 1970\'s in USA was an older military network called ARPANET converted to Internetvork wish was a network between networks. Accept a few Universities was it foremost enterprices and organisations wich was important for the american army who was connected to Internetwork. Resons of security made Internetwork anarchistic.It wasen\'t supose to be any cental computer wich controlled Internetwork and the computertrafic was supose
UFO Crash at Roswell, NM 1947UFO Crash at Roswell, NM 1947 A UFO crashed near Roswell New Mexico in 1947. The report in the papers on July 8, 1947 would bring news to the world that aliens were real (Stacy 36). However, the U.S. government quickly quashed the story before it was widely spread. A cover story was released by the 8th Air Force; the wreckage was actually that of a downed weather balloon (Wyly). The press bought it, and the story has laid cold for 30 years. In the late 70\'s, several witnesses, who where tied to
HTTP://WWW.CHANGE.COMHTTP://WWW.CHANGE.COM Joe the mailman will no longer be coming to your door. You won\'t have to go pick up your newspaper in the bushes at 6:00am anymore. Libraries will be a thing of the past. Why is this all happening? Welcome to the information age. You\'ve got mail! is the sound most people are listening to. No more licking stamps, just click on the send icon, and express delivery service will take on a whole new meaning. The future is here. Now, a mouse is better known as a computer dev
Economic PolicyEconomic Policy Chad Stigall Econ 100 11/26/96 The new economic policy of the united states should include cutting taxes, reducing governmental waste, and balance the budget by having a smaller more efficient federal government. It should include equal opportunity for financial security but not through a government sponsored redistribution of wealth program. Cutting taxes across the board including income tax rates, capital gains and estate taxes among others should provide a growth spurt for th
Virtual BankingVirtual Banking TABLE OF CONTENTS 01.00............ EXECUTIVE SUMMARY 02.00............ TRENDS IN RETAIL BANKING 03.00............ ABOUT THE INTERNET 04.00............ VIRTUAL BANKING AND APPLICATIONS 04.01............ SMART CARDS 05.00............ EXAMPLES 06.00............ SECURITY ON THE INTERNET 06.01............ CRYPTOGRAPHY 06.02............ FIREWALLS 06.03............ TRUSTED OPERATING SYSTEMS 07.00............. REGULATIONS AND PROBLEMS 08.00............ CONCLUSION . 09.00………. REFERENCES
Counterfeiting: We're In The MoneyCounterfeiting: We\'re In The Money A frequently asked question by a customer is Can you break a hundred dollar bill? If this request has been granted, why do the cashiers take the bill and turn it into a biology experiment? Between pouring a liquid on the note and/or holding it up to the light to check for authenticity, is our currency system in danger? As of the beginning of 1996, the Chairman of the Federal Reserve and the Secretary of the United States Treasury, prove their economic wizard
Identity TheftIdentity Theft Boo! Are you scared? You should be, you see I\'m a ghost and everyday I tap in to the information cyber world. And everyday I have access to you. Worse yet I could be you. According to the secret service approximatly one half a billion dollars is lost every year to identity theft online. What people don\'t seem to realize is that the internet world is just like any other community. so it\'s safe to assume the cyberworld would act as any natural community would with entrapranaurs,
Business SampleBusiness Sample Introduction to the Sample Plan The following document is a sample of a finished business plan. In your final plan, you have the opportunity to elaborate on those ideas in your outline that you feel are most integral to your business. In composing your business plan, you can follow your outline as loosely or closely as you choose. For instance, in the sample plan, the Executive Summary, which is the last section of the Business Planning Wizard, is presented first in order to emph
ECONOMIC POLICIESECONOMIC POLICIES Chad Stigall Econ 100 11/26/96 Economic Policy The new economic policy of the united states should include cutting taxes, reducing governmental waste, and balance the budget by having a smaller more efficient federal government. It should include equal opportunity for financial security but not through a government sponsored redistribution of wealth program. Cutting taxes across the board including income tax rates, capital gains and estate taxes among others should provide a g
I.T Faliure And DependenceI.T Faliure And Dependence In Today’s Society we are so Dependent on I.T that the Consequences of its Failure May be Catastrophic. Discuss the Threats and Causes of Failure, and Steps Taken to Minimise it. In today’s world it is impossible to run a large organisation without the aid of computers. Businesses hold massive amounts of important data, hospitals hold large amounts of confidential patient information and large scientific research projects hold important codes, formulae, and equations.
Improving CyberspaceImproving Cyberspace Improving Cyberspace by Jason Crandall Honors English III Research Paper 26 February 1996 Thesis: Though governments cannot physically regulate the Internet, cyberspace needs regulations to prevent illegal activity, the destruction of morals, and child access to pornography. I. Introduction. II. Illegal activity online costs America millions and hurts our economy. A. It is impossible for our government to physically regulate cyberspace. 1. One government cannot regulate the
Censorship Of The NetCensorship Of The Net As a professional Internet publisher and avid user of the Internet, I have become concerned with laws like the Communications Decency Act of 1996 (CDA) that censor free speech on the Internet. By approving the CDA, Congress has established a precedent which condones censorship regulations for the Internet similar to those that exist for traditional broadcast media. Treating the Internet like broadcast media is a grave mistake because the Internet is unlike any information m
Overview of ConcentricOverview of Concentric Principles of Budget and Finance Overview of Concentric Brief History Concentric Network Corporation is an Internet service provider that began in 1991 under the name of Engineered Video Concepts, Inc., changed their name to Concentric Research Corporation in 1992 and began network operations in 1994. In 1995, the company changed its name to Concentric Network Corporation and reincorporated in 1997. The company offered public stocks on August 1, 1997. Since that time they
VIRTUAL BANKINGVIRTUAL BANKING TABLE OF CONTENTS 01.00............ EXECUTIVE SUMMARY 02.00............ TRENDS IN RETAIL BANKING 03.00............ ABOUT THE INTERNET 04.00............ VIRTUAL BANKING AND APPLICATIONS 04.01............ SMART CARDS 05.00............ EXAMPLES 06.00............ SECURITY ON THE INTERNET 06.01............ CRYPTOGRAPHY 06.02............ FIREWALLS 06.03............ TRUSTED OPERATING SYSTEMS 07.00............. REGULATIONS AND PROBLEMS 08.00............ CONCLUSION . 09.00………. REFERENCES
We're In the MoneyWe\'re In the Money We¹re In The Money A frequently asked question by a customer is ³Can you break a hundred dollar bill?² If this request has been granted, why do the cashiers take the bill and turn it into a biology experiment? Between pouring a liquid on the note and/or holding it up to the light to check for authenticity, is our currency system in danger? As of the beginning of 1996, the Chairman of the Federal Reserve and the Secretary of the United States Treasury, prove their economic wiz
Counter MeasuresCounter Measures National Missile Defense (NMD) is once again a growing concern in America. There have been many new developments since the post-Cold War elimination of nuclear warfare. This diminishing of arms however, is a very fine line. The United States cannot afford to have less capability then the rest of the world, but it does want to encourage unilateral non-proliferation of nuclear arms. In addition, there is a new awareness of “rogue” nations that are completely unpredictable. Since t
Internet SecurityInternetSecurity Many people today are familiar with the Internet and its use. A large number of its users however, are not aware of the security problems they face when using the Internet. Most users feel they are anonymous when on-line, yet in actuality they are not. There are some very easy ways to protect the user from future problems. The Internet has brought many advantages to its users but has also created some major problems. Most people believe that they are anonymous when they are usi
Effects of TechnologyEffects of Technology Advancement in technology has affected many people in many ways. New technology has altered peoples\' consciousness, language, and the way society views the world. Technological advancements have made the world smaller, and have made things easier. Computers have been the inventions that have advanced so much since they were developed and have had such a big impact on humanity. Computers were originally developed to use for doing calculations and have come to the point that
Employee moraleEmployee morale NON-TRADITIONAL WORKING HOURS IMPROVE EMPLOYEE MORALE INCREASE PRODUCTIVITY Prepared for Mr. Robert Pigg, President Lakedale Manufacturing 1 Desert Storm Drive Niceville, FL 33870 Prepared by Human Resource Department Lakedale Manufacturing 320 Ardennes Street Arabia, NC 28357 Lakedale Manufacturing Human Resource Department 320 Ardennes Street Arabia, NC 28357 Mr. Robert Pigg, President Lakedale Manufacturing 1 Desert Storm Drive Niceville, FL 33870 Dear Mr. Pigg: Here is the re
Internet CensorshipInternet Censorship For centuries governments have tried to regular materials deemed inappropriate or offensive. The history of western censorship was said to have begun when Socrates was accused firstly, of denying the gods recognized by the State and introducing new divinities, and secondly of corrupting the young. He was sentenced to death for these crimes. Many modern governments are attempting to control access to the Internet. They are passing regulations that restrict the freedom people
The Internet Beyond Human ControlThe Internet Beyond Human Control The Internet has started to change the way of the world during this decade. More homes, companies, and schools are getting hooked online with the Internet during the past few years. This change has started to become the new way of life present and future. The Internet system is so advanced it is ahead of our time. This system is becoming predominately used everyday, but every which way it works out this system ends up in a negative way. The Internet System has s
Governmentgovernment CONSTITUTIONAL DEMOCRACY The basic premise of a constitutional democracy is that government has rules and all of the people have voices. Through free and fair elections we elect candidates to represent us. The Constitution of the United States guarantees us the right to do this, and to live democratically. The framers attacked tyrannical government and advanced the following ideas: that government comes from below, not from above, and that it derives its powers from the consent of the
IntranetsIntranets These days Intranets are becoming more and more popular throughout the business world and other types of organizations. Many companies and organizations are already making this change and many more are considering it. The advantages offered by Intranets when compared to other types of networks are many, at a reduced cost for the owner. Less maintenance, less programming and more flexibility on the network platform make this change interesting. Unlike other types of networks, Intranets
Is Your Information Safe?Is Your Information Safe? He doesn\'t wear a stocking mask over his face, and he doesn\'t break a window to get into your house. He doesn\'t hold a gun to your head, nor does he ransack your personal possessions. Just the same he\'s a thief. Although this thief is one you\'ll not only never see, but you may not even realize right away that he\'s robbed you. The thief is a computer hacker and he enters your home via your computer, accessing personal information -- such as credit card numbers --
Just War TheoryJust War Theory Just War Theory: NATO Action Against Serbia Years of aggressive European empires have left the area known as the Balkans in an almost constant flux. The nation of Yugoslavia, originated in 1918, first became stable under the leadership of Dictator Josip Broz Tito who turned the nation to communism in 1945. However, with Tito’s death in 1980, the country dissolved into several smaller countries. Presently the former state of Yugoslavia is comprised of the nations Slovenia, Croatia
No TitleNo Title The advance in telecommunications will not cause people to be dependent on their computers and alone in a world of billions. Rather, it will open up new avenues in democracy and will help people involve themselves more in the democratic process. Computers can simplify voting, create less biased views of world events, and encourage more political awareness. Going to the polls could be a thing of the past. A click of the mouse could instantly register your vote. Furthermore, nationwide re
Persuasive Speech For Gun OwnershipPersuasive Speech For Gun Ownership I want to encourage gun ownership. Introduction I. What is the foundation of modern technology? It\'s the history of the gun. Thesis Statement: I will persuade you in that, (1) federal gun control laws are unconstitutional, and (2) I will prove the 2nd Amendment is both a State and Individual Right. Body I.The foundation of our country is based in English Bill of Rights and the American Revolution. A. What is the difference between the Declaration of Independe
Press FreedomPress Freedom From the moment she stepped foot outside, Princess Diana of Whales had camera lenses and microphones pushed in her face. She was constantly pursued and for this reason she sometimes had to hide or disguise herself in order to avoid the unyielding persistence and constant harassment of the press. Eugene Robinson, a journalist in England said, For the tabloids, day in and day out, no story is bigger than the royal family. All the tabloids employ royal-watching reporters, some of whom
Privacy In DemandPrivacy In Demand Like most countries and especially the United States their inhabitants enjoy a certain level of privacy. People don’t generally want intimate information to be accessible to the public eye. In fact many people go to great lengths to hide everything about themselves. What exactly is the definition of privacy? Well, privacy is the expectation that confidential personal information disclosed in a private place will not be disclosed to third parties, when that disclosure would caus
Morality and Ethics and ComputersMorality and Ethics and Computers There are many different sides to the discussion on moral and ethical uses of computers. In many situations, the morality of a particular use of a computer is up to the individual to decide. For this reason, absolute laws about ethical computer usage is almost, but not entirely, impossible to define. The introduction of computers into the workplace has introduced many questions as well: Should employers make sure the workplace is designed to minimize health risk
Violence In America..Will It Ever End?Violence In America..Will It Ever End? Today in St. Paul two people were murdered. It has been reported that the two were fighting with a third party about a phone call that was made. The suspect is in custody and the case is under investigation,” a reporter in the ten o’clock news reports. “Spouse and child abuse are on the rise. This year alone over ‘6 million men, women, and children were victims of severe physical attacks from their spouses or parents’(article 16)*,” another reporter reports
The Paperless(?) OfficeThe Paperless(?) Office 1. What are the advantages and disadvantages of the paperless office? There are many advantages to having a paperless office. One advantage is that companies are able to greatly reduce the amount of paper that they use. Not only does this help the environment, it helps cut costs within the organization. Companies are also able to improve service through implementing the paperless office. This is because communication is immediate and does not get lost in a pile of papers
Questions of Ethics In Computer Systems and TheirQuestions of Ethics In Computer Systems and Their Future 1) Identify and discuss security issues and considerations evident for Information Systems And computerization in the brokerage industry. ( Think about how the Internet has already influenced trading.) The technology is getting ahead of regulators claims David Weissman, director of money and technology at Forrester Research Inc., in Cambridge, Mass. If one is to believe the quote above it sounds very ominous for the regulators and the go
ALZHEIMER'S DISEASEALZHEIMER\'S DISEASE We are currently living in the age of technology. Our advancements in the past few decades overshadow everything learned in the last 2000 years. With the elimination of many diseases through effective cures and treatments, Canadians can expect to live a much longer life then that of their grandparents. In 1900 about 4% of the Canadian population was over the age of 65. In 1989 that figure tripled to 12% and the government expects that figure to rise to 23% by the year 2030 (
TelnetTelnet PURPOSE OF THIS REPORT Before gophers, hypertext, and sophisticated web browsers, telnet was the primary means by which computer users connected their machines with other computers around the world. Telnet is a plain ASCII terminal emulation protocol that is still used to access a variety of information sources, most notably libraries and local BBS\'s. This report will trace the history and usage of this still popular and widely used protocol and explain where and how it still manages to
The Dependability of the WebThe Dependability of the Web by Nathan Redman A new age is upon us - the computer age. More specifically, the internet. There\'s no doubt that the internet has changed how fast and the way we communicate and get information. The popularity of the net is rising at a considerable rate. Traffic, the number of people on the web, is four times what it was a year ago and every thirty seconds someone new logs on to the net to experience for themselves what everyone is talking about. Even Bill Gates, fo
StressStress CHAPTER I INTRODUCTION Statement of the Research Problem How do you cope with stress in the workplace to achieve a more balanced lifestyle? Stress is a part of everybody\'s life. Depending on the level of stress, it can control our lives, especially in the workplace. We begin to spend several long hours at work, and thus have less time for other things. Stressed employees may be unhappy and thus produce nominally. Stress can deteriorate social and family relationships and eventually burn
The Future of Computer Crime in AmericaThe Future of Computer Crime in America Sociology Research Paper Sociology per. #2 10/8/96 Sociology Topics: Future Society Social Change Social and Enviromental Issues Deviant Behavior Crime/Corrections Name: Brandon Robinson Period: # 2 The proliferation of home computers, and of home computers equipped with modems, has brought about a major transformation in the way American society communicates, interacts, and receives information. All of these changes being popularized by the media and the
The Necessity Of Computer SecurityThe Necessity Of Computer Security When the first electronic computers emerged from university and military laboratories in the late 1940s and early 1950s, visionaries proclaimed them the harbingers of a second industrial revolution that would transform business, government and industry. But few laymen, even if they were aware of the machines, could see the connection. Experts too, were sceptical. Not only were computers huge, expensive, one-of-a-kind devices designed for performing abstruse sci
The Office of TomorrowThe Office of Tomorrow In an increasing number of companies, traditional office space is giving way to community areas and empty chairs as employees work from home, from their cars or from virtually anywhere. Advanced technologies and progressive HR strategies make these alternative offices possible. Imagine it\'s 2 o\'clock on a Wednesday afternoon. Inside the dining room of many nationwide offices, Joe Smith, manager of HR, is downing a sandwich and soda while wading through phone and E-mail m
Truth and Lies About the Computer VirusTruth and Lies About the Computer Virus Walk into any computer store today and there will be at least twenty or thirty computer virus programs. From the looks of it computer viruses have gotten out of hand and so has the business of stopping it. The computer user must cut through the media hype of apocoliptic viruses and shareware programs and discover the real facts. Before we even start the journey of exploring the computer virus we must first eliminate all the fluff. The computer user needs
Overview of Video On Demand SystemsOverview of Video On Demand Systems Joseph Newcomer SCOPE INTRODUCTION THE INITIATIVE FOR WORLDWIDE MULTIMEDIA TELECONFERENCING AND VIDEO SERVER STANDARDS NEW BUSINESS IMPERATIVES STARTING WITH STANDARDS TWO STANDARDS, ONE GOAL STANDARDS FIRST SUMMARY CONTENT PREPARATION: REQUIREMENTS: CODECs/Compression Object Oriented Database Management Systems Encoding Verification SUMMARY VIDEO SERVER REQUIREMENTS LIMITATIONS PRODUCTS DISTRIBUTION NETWORK: LAN TYPES PROTOCOLS WAN TYPES SCOPE Video on demand
Human Evolution and the Fossil RecordHuman Evolution and the Fossil Record Scientists continue to debate the history of man. It is generally agreed upon by the scientific community, however, that humans evolved from lesser beings, and this essay will function to provide evidence to support this claim. Several points will be outlined, including the general physical changes that occurred between several key species on the phylogeny of man, and a discussion of dating methods used to pinpoint the age of the fossils. This essay will beg
Censorship on the InternetCensorship on the Internet Five years after the first world wide web was launched at the end of 1991, The Internet has become very popular in the United States. Although President Clinton already signed the 1996 Telecommunication ActI on Thursday Feb 8, 1996, the censorship issue on the net still remains unresolved. In fact, censorship in cyberspace is unconscionable and impossible. Trying to censor the Internet its problematic because the net is an international issue, there is no standard for
Wire PiratesWire Pirates Someday the Internet may become an information superhighway, but right now it is more like a 19th-century railroad that passes through the badlands of the Old West. As waves of new settlers flock to cyberspace in search for free information or commercial opportunity, they make easy marks for sharpers who play a keyboard as deftly as Billy the Kid ever drew a six-gun. It is difficult even for those who ply it every day to appreciate how much the Internet depends on collegial trust an
CMIP vs. SNMP : Network ManagementCMIP vs. SNMP : Network Management Imagine yourself as a network administrator, responsible for a 2000 user network. This network reaches from California to New York, and some branches over seas. In this situation, anything can, and usually does go wrong, but it would be your job as a system administrator to resolve the problem with it arises as quickly as possible. The last thing you would want is for your boss to call you up, asking why you haven\'t done anything to fix the 2 major systems tha
Biometricsbiometrics Biometrics uses personal characteristics to identify users. When it comes to security, mapping unique patterns and traits in fingerprints, irises or voices is considered light years ahead of forcing employees to memorize combinations of letters and numbers -- which are easily compromised and easily forgotten. The technology works by taking measurements -- whether it is the weight and length of bones in the hand or the pattern of blood vessels inside the eye or the pattern of fingerpri
Communication DevicesCommunication Devices Recently, while enjoying a sunny afternoon with some friends, a few baby boomers I know were relating some experiences that seem quite pertinent to the subject of how communication is or will change. Young Aaron, the son of a guest, was at a loss when told to call home. It seems our young guest had never had to use a rotary telephone. Confronted with this icon of past technology, Aaron went away with a new experience to relate. Another guest, upon hearing of Aaron\'s plight