• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Software Virus Protection.

Extracts from this document...

Introduction

Software Virus Protection Introduction There are many versions of Software Virus Protection on the market including MacAfee, Symantec and Norton, used by both individuals and businesses to protect their computer systems and all the information held on them, against attacks by viruses. In order to know how an anti-virus program works it is important to firstly know what a virus is and what effect it can have! Then it is important to know what types of anti-virus programs there are on the market, how these work, and what the advantages and disadvantages there are to each of these. What is a Virus? A virus is a small self-contained computer program or file designed with malicious intent, to run while the user is unaware and infect hard drives and floppy disks, before often copying itself usually to spread to other computers. Viruses can be spread over the internet, through emails or they can be embedded in files on floppy disks and CD ROMs, which can then be transmitted to the user's computer system and then onto a network of computers. There are several different types of viruses: o Email Viruses- "These are transported via email messages, and usually replicate by automatically sending themselves to all email addresses in the recipients address book". ...read more.

Middle

provided by the vendor', which are normally downloadable from the internet to make sure that the most up to date profiles get to computers quickly before new viruses have time to attack or do serious damage. (Source: Home Security FAQ. http://www.gale-internet.co.uk) New viruses are been discovered daily and so the effectiveness of anti-virus software is dependent on having the latest virus profiles installed on your computer so that it can look for recently discovered viruses. Anti-virus Software uses one of four main methods for detecting viruses on a computer system- Scanning, Integrity Checking, Heuristic Virus Checking and Interception. Of these, scanning and interception are very common; with the other two used less frequently but each one of these have both advantages and disadvantages! * Scanning 'A scanner will search all files in the memory, in the boot sector and on disk for 'code snippets' that will uniquely identify a file as a virus. This requires a list of unique signatures that will be found in viruses and not in ordinary programs'. (Source: www-cse.stanford.edu). There are two types of scanning: on-access and on-demand; On-access scanning scans files when they are loaded into memory prior to execution. ...read more.

Conclusion

When not detected by scanners, interception software will usually detect the destructive and unusual sequences of events caused by logic bombs and Trojan horses. Disadvantages: Unfortunately, interceptors are not very good at detecting anything else. Interceptors also have all the drawbacks of heuristic systems - difficulty differentiating virus from non-virus, and easy to program around. In addition, most interceptors are very easy to disable, and so many viruses frequently disable them before launching. Due to the nature of an interceptor, this software is unable to detect viruses before they launch, and a lot of damage could already have been done. Conclusion Therefore, anti-virus protection software is used to find and isolate before removing the different types of viruses that could infect a person's computer before that virus has time to reproduce and spread or cause any damage. All anti-virus programs work in one of four ways, all of which have advantages to there use and disadvantages to their use, but one of these versions is essential to ensure that viruses can not seriously effect a computer system or computer network in a business. It is necessary for businesses and individuals to have anti-virus protection so that they can detect if they have a virus on their systems and then remove it before it can cause any damage to files or the programs that operate that computer system or network. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    has enough power it can be as far apart and no bee in sight of each other they can still transmit or communicate. VAN VAN which stands for value added network is a private network setup that's been tweaked and value has been added to basic communication which has been

  2. Discuss the relationship that exists in the UK between the legal rules that govern ...

    78 & 79 which are basically saying that if a director is appointed by the board between the AGMs then at the next AGM they will loose the post and the shareholders will be given the option to re-elect. The Combined Code suggests a re-election period of every 3 years.

  1. Smart Card System

    7.5 Advantages of the Proposed System After studying the problems and disadvantages of existing system, the team would like to state the advantages of the proposed system. a) Ease to Use Compare with the other existing system, the Computer Lab Management System is more easier to setup and use.

  2. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    When a noise is created in the recording process - because of tape hiss, dust on the master disc, electrical interference or any other cause - this is added on as a random signal on top of the complex electrical signal representing the sound.

  1. Hardware and Software

    a moving scanning head, the sheet fed scanner moved the paper past a stationary scanning head. Printer Printing quality is very important for designers/companies. Printing is a process for production of texts and images, typically with ink on paper using a printing press.

  2. Propose to research the WTLS or Wireless transport layer security protocol along with the ...

    The SSL sends encrypted data from the end user's browser (provided that the browser is capable of using SSL) to the server. This allows you to send confidential information across the Internet like passwords, credit card numbers or other confidential information.

  1. Computer Crime, Security and Data Protection.

    For instance, you have a piece of software that requires a serial number to install. A software hacker does this in much the same way that networks hackers attack network security. They may set up a serial number generator that tries millions of combinations of numbers and letters until it finds one that matches.

  2. Programming Techniques

    The process of breaking a task down into smaller and smaller parts is called stepwise refinement. Advantages of using top-down design (1) Individual modules can be separately testes (2) Modules can be kept in a module library and reused in other programs (3)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work