• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Software Virus Protection.

Extracts from this document...

Introduction

Software Virus Protection Introduction There are many versions of Software Virus Protection on the market including MacAfee, Symantec and Norton, used by both individuals and businesses to protect their computer systems and all the information held on them, against attacks by viruses. In order to know how an anti-virus program works it is important to firstly know what a virus is and what effect it can have! Then it is important to know what types of anti-virus programs there are on the market, how these work, and what the advantages and disadvantages there are to each of these. What is a Virus? A virus is a small self-contained computer program or file designed with malicious intent, to run while the user is unaware and infect hard drives and floppy disks, before often copying itself usually to spread to other computers. Viruses can be spread over the internet, through emails or they can be embedded in files on floppy disks and CD ROMs, which can then be transmitted to the user's computer system and then onto a network of computers. There are several different types of viruses: o Email Viruses- "These are transported via email messages, and usually replicate by automatically sending themselves to all email addresses in the recipients address book". ...read more.

Middle

provided by the vendor', which are normally downloadable from the internet to make sure that the most up to date profiles get to computers quickly before new viruses have time to attack or do serious damage. (Source: Home Security FAQ. http://www.gale-internet.co.uk) New viruses are been discovered daily and so the effectiveness of anti-virus software is dependent on having the latest virus profiles installed on your computer so that it can look for recently discovered viruses. Anti-virus Software uses one of four main methods for detecting viruses on a computer system- Scanning, Integrity Checking, Heuristic Virus Checking and Interception. Of these, scanning and interception are very common; with the other two used less frequently but each one of these have both advantages and disadvantages! * Scanning 'A scanner will search all files in the memory, in the boot sector and on disk for 'code snippets' that will uniquely identify a file as a virus. This requires a list of unique signatures that will be found in viruses and not in ordinary programs'. (Source: www-cse.stanford.edu). There are two types of scanning: on-access and on-demand; On-access scanning scans files when they are loaded into memory prior to execution. ...read more.

Conclusion

When not detected by scanners, interception software will usually detect the destructive and unusual sequences of events caused by logic bombs and Trojan horses. Disadvantages: Unfortunately, interceptors are not very good at detecting anything else. Interceptors also have all the drawbacks of heuristic systems - difficulty differentiating virus from non-virus, and easy to program around. In addition, most interceptors are very easy to disable, and so many viruses frequently disable them before launching. Due to the nature of an interceptor, this software is unable to detect viruses before they launch, and a lot of damage could already have been done. Conclusion Therefore, anti-virus protection software is used to find and isolate before removing the different types of viruses that could infect a person's computer before that virus has time to reproduce and spread or cause any damage. All anti-virus programs work in one of four ways, all of which have advantages to there use and disadvantages to their use, but one of these versions is essential to ensure that viruses can not seriously effect a computer system or computer network in a business. It is necessary for businesses and individuals to have anti-virus protection so that they can detect if they have a virus on their systems and then remove it before it can cause any damage to files or the programs that operate that computer system or network. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    fibre optic cable running through the network with a connector at each end of the cable. When two devices are transmitting at the same time results in collision on the network. When data is transmitted between two devices on the network it will also be broadcasted to other devices on the network virtually simultaneously.

  2. Programming Techniques

    So the language which the computer uses is all in binary and very difficult for human beings to use. Languages like this are called machine code languages. If the program is written in a high level language and the computer can only run it in machine code, then it has

  1. Computer Maintainance - anti-virus, cookie deletion, drive scanning

    Anti-spyware software seeks to block and remove such programs. * Clean up tools: 1. Removal of cookies and internet history. To remove cookies in Google Chrome Click on the "Tools" menu and select "Options". Click the "Under the Bonnet" tab, locate the "Privacy" section and click the "Clear browsing data" button.

  2. AS ICT Corsework - Mr Brookes K-Fit Ltd

    Appendix 3 - K-Fit Offices Report Report from the K-Fit office from 8:30 - 12:30 Time Amount of work gained? Customers being serviced? Notes 8:30 N/A N/A Mr Brookes and some employee's enter the office and get set up for the day to commence.

  1. Hardware and Software

    a moving scanning head, the sheet fed scanner moved the paper past a stationary scanning head. Printer Printing quality is very important for designers/companies. Printing is a process for production of texts and images, typically with ink on paper using a printing press.

  2. Firewall Protection

    In order for the attacker to use this method, your computer must first be infected by a RAT. Prevention of infections by RATs is no different than prevention of infection by viruses. Antivirus programs can identify and remove most of the more common RATs.

  1. Program Code Program DVD_Program; Uses Menuunit, CRT, dos; ...

    Close (video); {Since Draw_Shadow_Box messes up window settings it has to be reset} End; {--------------------------------------------------------------------} {This procedure is used to search for an existing member record in the database.} Procedure search_for_member; VAR size, i, an_id: integer; one_rec: mem_rec; Begin Assign (member, 'c:\pas\member.pas'); Reset (member); size:= filesize (member); For i:= 1

  2. Smart Card System

    Smart cards provide data portability, security and convenience. Smart card is very unique and it can be used as personal data storage, where all personal information can be store in the smart card. This technology allows company like banks to create ATM card to user which all information is store in the smart card.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work