Computer Security and Viruses
Computer Security and Viruses
Computer Security and Viruses
Computer Security:
Computer security also known as cyber security is the protection of
information systems from theft or damage to the hardware,
the software and to the information on them, as well as from
disruption of the services they provide.
Security is based on the following issues:
Example: The lock on the door is the 10%. You remembering to lock
the lock, checking to see if the door is closed, ensuring others do not
prop the door open, keeping control of the keys, etc. is the 90%.
Threats classified into one of the categories below:
Good computing practices and tips that apply to most people who
use a computer.
Computer Viruses:
A virus is a parasitic program that infects another legitimate program,
which is sometimes called the host. To infect the host program, the
virus modifies the host so that it contains a copy of the virus.
Boot sector viruses: A boot sector virus infects the boot record
of a hard disk. The virus allows the actual boot sector data to be
read as through a normal start-up were occurring.
Cluster viruses: If any program is run from the infected disk, the
program causes the virus also to run . This technique creates the
illusion that the virus has infected every program on the disk.
Worms: A worm is a program whose purpose is to duplicate
itself.
Bombs: This type of virus hides on the users disk and waits for
a specific event to occur before running.
Trojan Horses: A Trojan Horses is a malicious program that
appears to be friendly. Because Trojan Horses do not make
duplicates of themselves on the victims disk. They are not
technically viruses.
Stealth Viruses: These viruses take up residence in the computers memory, making
them hard to detect.
Micro Viruses: A macro virus is designed to infect a specific type of document file,
such as Microsoft Word or Microsoft Excel files. These types of documents can
include macros, which are small programs that execute commands.
CodeRed : It is a worm that infects a computer running Microsoft IIS server. This
virus launched DOS attack on White Houses website. It allows the hacker to access
the infected computer remotely.
Nimba : It is a worm that spreads itself using different methods. IT damages computer
in different ways. It modified files, alters security settings and degrade s performance.
SirCam : It is distributed as an email attachment. It may delete files, degrade
performance and send the files to anyone.
Melisa : It is a virus that is distributed as an email attachment. IT disables different
safeguards in MS Word. It sends itself to 50 people if Microsoft Outlook is installed..
Ripper :It corrupts data from the hard disk.
MDMA :It is transferred from one MS Word file to other if both files are in memory.
Concept :It is also transferred as an email attachment. It saves the file in template
directory instead of its original location.
One_Half :It encrypts hard disk so only the virus may read the data. It displays
One_Half on the screen when the encryption is half completed.
The latest and updated version of Anti-Virus and firewall should be installed on the
computer.
The Anti-Virus software must be upgraded regularly.
USB drives should be scanned for viruses, and should not be used on infected
computers.
Junk or unknown emails should not be opened and must be deleted straight away.
Unauthorized or pirated software should not be installed on the computer.
An important way of protection against virus is the use of back up of data. The
backup is used if the virus deletes data or modifies it. So back -up your data on
regular basis.
Computer Fundamental
Computer: A computer is a truly amazing machine that performs a
specified sequence of operations as per the set of instructions
(known as programs) given on a set of data (input) to generate
desired information (output).
A complete computer system consists of four parts:
Speed
Accuracy
Storage and Retrieval
Repeated Processing Capabilities
Reliability
Flexibility
Low cost
Software
Digital Computers
These computers take the input in the form of digits & alphabets
& converted it into binary format.
Digital computers are high speed, programmable electronic
devices.
Signals are two level of (0 for low/off , 1 for high/on).
Accuracy unlimited.
Examples: Computer used for the purpose of business and
education are also example of digital computers.
Hybrid Computer
Super Computer
Mainframes
Mini Computer
Notebook Computers
Programming Languages
Disadvantages
Assembly Language
It is the first step to improve the programming structure. You should
know that computer can handle numbers and letter. Therefore
some combination of letters can be used to substitute for number
of machine codes.
The set of symbols and letters forms the Assembly Language and a
translator program is required to translate the Assembly Language to
machine language. This translator program is called ` Assembler'. It is
considered to be a second-generation language.
Advantages:
Disadvantages: