Computer Viruses: Infection Vectors, and Feasibility of Complete Protection
A computer virus is a program which, after being loaded into a computer's memory, copies itself with the purpose of spreading to other computers. Most people, from the corporate level power programmer down to the computer hobbyist, have had either personal experience with a virus or know someone who has. And the rate of infection is rising monthly. This has caused a wide spread interest in viruses and what can be done to protect the data now entrusted to the computer systems throughout the world.
A virus can gain access to a computer system via any one of four vectors: 1. Disk usage: in this case, infected files contained on a diskette
(including, on occasion, diskettes supplied by software manufacturers) are loaded, and used in a previously uninfected system thus allowing the virus to spread.
2. Local Area Network: a LAN allows multiple computers to share the same data, and programs. However, this data sharing can allow a virus to spread rapidly to computers that have otherwise been protected from external contamination.
3. Telecommunications: also known as a Wide Area Network, this entails the connection of computer systems to each other via modems, and telephone lines. This is the vector most feared by computer users, with infected files being rapidly passed along the emerging information super-highway, then downloaded from public services and then used, thus infecting the new system.
4. Spontaneous Generation: this last vector is at the same time the least thought of and the least likely. However, because virus programs tend to be small, the possibility exists that the code necessary for a self-replicating program could be randomly generated and executed in the normal operation of any computer system.
Even disregarding the fourth infection vector, it can be seen that the only way to completely protect a computer system is to isolate it from all contact with the outside world. This would include the user programming all of the necessary code to operate the system, as even commercial products have been known to be shipped already infected with viruses.
In conclusion, because a virus can enter a computer in so many different ways, perhaps the best thing to do is more a form of damage control rather than prevention. Such as, maintain current backups of your data, keep your original software disks write-protected and away from the computer, and use a good Virus detection program.
Outline Thesis: Complete protection of a computer system from viruses is not possible, so efforts should be concentrated on recovery rather than prevention.
I. Introduction, with definition.
A. Define Computer Virus.
B. Define interest group.
C. Define problem.
Addie acquired Stenotrophomonas bacterial infection in the hospital. She acquired it from the tubes of the lung bypass machine ECMO which doctors used to try and support her respiration after her
At the Aim Higher College there have been recently discovered malware on the campus systems that are due to many recent attacks. I used an Anti-virus protection software called AVG on the computer systems on campus and ran a whole computer scan. The results came back very quick of numbers of malware being high and medium priorities that these should not be taken lightly. Furthermore, the scan found many viruses, Trojans, and malicious software and applications.
I decided to read the book by David Harley called Viruses Revealed. This book goes into great detail about the different kinds of viruses and virus mechanisms, the solutions to these viruses, studies on different cases of viruses and then the social aspects of viruses. In the first part of the book, Harley talks about the problems with viruses. A virus is a program that infects other programs to modify them. “Infecting means that a virus will insert itself into the chain of command” (Harley). The virus structure was defined into three different parts: Infection, Payload, and Trigger. The infection is defined as the way or ways in which the virus spreads. The payload is defined as what the virus does besides duplicating itself. Trigger is defined as the procedure that decides whether or not the payload is necessary. Harley also talks about the difference between damage versus infection. The major difference between the two is that many users have infected documents or applications on their computer. Whether or not those applications are run is the difference between the two. In part one Harley also converses about Trojan Horses. Trojan horses are normally known as a virus, but he shoots that down. Harley says that Trojan Horses are normally not viruses, but just a worm that goes from computer to computer. After talking about different kinds of viruses and worms, he goes into Anti-Virus softwares. There are two different kinds of anti-viruses. One being virus-specific. Virus-specific means that every time a virus is found on your computer, it is identified but not detected. Generic scanners do the opposite. Generic scanners detect viruses but do not identify them.
Bob is at the skate park, showing off his skills as a skateboarder. With one wrong move, he fell off of his skateboard, and his knee scrapped on the concrete, causing a big gash on his knee. A virus enters in the knee, and it has a mission. Its mission is to infect every organ in Bob's body.
Almost no one on Earth has any immunity at all to this virus, which makes ordinary vaccines useless against it. The sudden spread of the virus into Europe foreshadows an epidemic development that could be worldwide. Ultimately, there is no way to protect ourselves against epidemics. They will keep disappearing and coming back in new forms.
Discovery of this virus divided scientist in two groups; the ones in favor of publication the virus and the ones are against the publication. According to Fouchier in the article “The Deadliest Virus” by Micheal Green, he says that if more people have access to it, it
there may be many more people with the disease than are reported. Lauer’s data is not welcome news for communities. “Imagine you owned that house there”—she pointed out the window to an upscale tract home—“and I took a sample and found the valley-fever fungus.... ...
Necrotizing fasciitis, known commonly known as "flesh eating bacteria [infection]", occurs in a wide range of people 1. It occurs in the elderly, middle aged and younger patients. It occurs in athletes and debilitated individuals. It can occur in drug abusers with self inflicted wounds and healthy individuals with incidental injuries. It may occur in those with metabolic disorders such as diabetes and those with suppressed immune systems. It may occur in those with no underlying disorders and no known particular injury. It occurs under ordinary circumstances such as a seemingly harmless cut or scrape and in wounds resulting from major trauma such as an auto accident.
Anyone can have it and sometimes you won’t even know they have it. In this case study the doctors didn’t list the name of the patient due to laws. A fifty-nine year old was admitted to the dermatological ward because she was complaining of having multiple skin lesions on her back that spread through her body to her internal organs. She had this symptoms seven years after she was admitted to the hospital for a mosquito bite. They did several test that found no skin lesions. She claimed that she had a double back tingling sensation on her back. Her theory was it was caused by viruses and infected fluids that were traveling through her body to her heart. She was also suffering from sleeping problems due to the delusions. She had retired because of her illness. The spare time she had was spent seeing multiple specialist. They diagnosed her with somatic systems and they started on her medication. They proscribed her two hundred milligrams a day of sulpiride. They also gave her skin ointment that made her think they found a solution to her lesions, she stayed in the hospital for seven days then was discharged. Then she went to get further treatment at their outpatient
As electronic commerce, online business-to-business operations, and global connectivity have become vital components of a successful business strategy, enterprises have adopted security processes and practices to protect information assets. But if you look at today's computing environments, system security is a horrible game of numbers: there are currently over 9,223 publicly released vulnerabilities covering known security holes in a massive range of applications from popular Operating Systems through to obscure and relatively unknown web applications. [01] Over 300 new vulnerabilities are being discovered and released each month. Most companies work diligently to maintain an efficient, effective security policy, implementing the latest products and services to prevent fraud, vandalism, sabotage, and denial of service attacks. But the fact is you have to patch every hole of your system, but an attacker need find only one to get into your environment. Whilst many organisations subscribe to major vendor's security alerts, these are just the tip of the security iceberg and even these are often ignored. For example, the patch for the Code Red worm was available some weeks before the worm was released. [02]
“A digital world we became”. These days individuals turned to use computer systems in everything in their lives. They even use them in manufacturer instead of employees. I did not say that technological innovation is not essential for us but sometimes the technological innovation disregards our role in life. Technological innovation is very essential to any lifestyle to flourish. Technology contains cell mobile phones, laptops, machines, Ipads and many other factors. Not also they include all the excellent stuff but any great factor comes out with a drawback. Technological innovation has some drawbacks, and the most essential one of them that we will mainly talk about is the malware.
The history of cybercrime goes back to 1971 and the first computer virus called the Creeper which was created by Bob H. Thomas, who was a BBN engineer (Dalakov, Meltzer, and Phillips). BBN which stands for Bolt, Beranek and Newman, is now Raytheon BBN Technologies (“About”, Dalakov). A computer virus is a program that is created to cause damage to a computer or perform other malicious acts (204). The Creeper virus was designed to infect the ARPANET network. The ARPANET, which stands for Advance Research Projects Agency was set up by the U.S. Government as an agency in 1969 to provide a network of computers that would connect various academic and research organizations; it was the predecessor of the Internet (“Internet”, Morley, and Parker).
In this globalized arena, with the proliferating computer users as well as computer networks, risks associated like Malware attacks are also multiplying. As the proverb
Malicious code is a real danger to modern systems. Most systems nowadays do not work in isolation; they are more likely to be connected to other systems and sometimes they can even be dependent on them. Therefore an attack on one of the systems in the network is a potential attacking attempt to any other systems, with which it is interacting. Therefore, it is inevitable for any networked or Internet-connected computers to deal with malicious code attacks at some point. Businesses lose billions of dollars each year because of malicious code attacks. Responding to the attack and restoring all the data on the computers is a time-consuming and expensive task. It is a much better practice to try preventing it through organizing and maintaining effective defenses. However, it is important to keep in mind that there is no one general solution that can help to prevent all the attacks. Attackers are constantly looking for new ways to take advantage of systems’ vulnerabilities and find new ones. That’s why organizations have to not only defend themselves against existing attack methods, but also try to predict and prevent new attacking techniques. It means that computer and network security is a never-ending challenge and expense.