• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Software Virus Protection.

Extracts from this document...


Software Virus Protection Introduction There are many versions of Software Virus Protection on the market including MacAfee, Symantec and Norton, used by both individuals and businesses to protect their computer systems and all the information held on them, against attacks by viruses. In order to know how an anti-virus program works it is important to firstly know what a virus is and what effect it can have! Then it is important to know what types of anti-virus programs there are on the market, how these work, and what the advantages and disadvantages there are to each of these. What is a Virus? A virus is a small self-contained computer program or file designed with malicious intent, to run while the user is unaware and infect hard drives and floppy disks, before often copying itself usually to spread to other computers. Viruses can be spread over the internet, through emails or they can be embedded in files on floppy disks and CD ROMs, which can then be transmitted to the user's computer system and then onto a network of computers. There are several different types of viruses: o Email Viruses- "These are transported via email messages, and usually replicate by automatically sending themselves to all email addresses in the recipients address book". ...read more.


provided by the vendor', which are normally downloadable from the internet to make sure that the most up to date profiles get to computers quickly before new viruses have time to attack or do serious damage. (Source: Home Security FAQ. http://www.gale-internet.co.uk) New viruses are been discovered daily and so the effectiveness of anti-virus software is dependent on having the latest virus profiles installed on your computer so that it can look for recently discovered viruses. Anti-virus Software uses one of four main methods for detecting viruses on a computer system- Scanning, Integrity Checking, Heuristic Virus Checking and Interception. Of these, scanning and interception are very common; with the other two used less frequently but each one of these have both advantages and disadvantages! * Scanning 'A scanner will search all files in the memory, in the boot sector and on disk for 'code snippets' that will uniquely identify a file as a virus. This requires a list of unique signatures that will be found in viruses and not in ordinary programs'. (Source: www-cse.stanford.edu). There are two types of scanning: on-access and on-demand; On-access scanning scans files when they are loaded into memory prior to execution. ...read more.


When not detected by scanners, interception software will usually detect the destructive and unusual sequences of events caused by logic bombs and Trojan horses. Disadvantages: Unfortunately, interceptors are not very good at detecting anything else. Interceptors also have all the drawbacks of heuristic systems - difficulty differentiating virus from non-virus, and easy to program around. In addition, most interceptors are very easy to disable, and so many viruses frequently disable them before launching. Due to the nature of an interceptor, this software is unable to detect viruses before they launch, and a lot of damage could already have been done. Conclusion Therefore, anti-virus protection software is used to find and isolate before removing the different types of viruses that could infect a person's computer before that virus has time to reproduce and spread or cause any damage. All anti-virus programs work in one of four ways, all of which have advantages to there use and disadvantages to their use, but one of these versions is essential to ensure that viruses can not seriously effect a computer system or computer network in a business. It is necessary for businesses and individuals to have anti-virus protection so that they can detect if they have a virus on their systems and then remove it before it can cause any damage to files or the programs that operate that computer system or network. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    ATM Asynchronous Transfer Mode (ATM) is a dedicated connection switching technology standard worldwide. There has to been a connection made between the node transmitting the data and requesting the data before the data is received. All the digital data transmitted between the source node and the destination node is organized by ATM into fixed length of 53 byte cell units.

  2. Hardware and Software

    Photoshop 8.0 CS Win Adobe Photoshop CS means superior results faster, with new features and enhancements that helps creating and managing images easily and efficiently. The essential new and improved features help graphic and Web designers, photographers and video professionals create the highest quality images, with the control, flexibility, and

  1. Discuss the relationship that exists in the UK between the legal rules that govern ...

    rigorous annual evaluation of its own performance and that of its committees and individual directors." The Combined Code 2003 S1A.6 It also states that the way in which director's performance is evaluated should be commented on in the company reports.

  2. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    When a noise is created in the recording process - because of tape hiss, dust on the master disc, electrical interference or any other cause - this is added on as a random signal on top of the complex electrical signal representing the sound.

  1. Programming Techniques

    three numbers could be coded as follows: Function Average (A,B,C : Real) : Real; Begin Average := (A+ B+ C) /3; End; To call the function, the programmer writes: Result := average(num1, num2, num3); Many languages such as Foxpro have several 'built-in' functions such as Str converts a numeric value

  2. Smart Card System

    Enforcement of the policies governing resources use. There are varieties of ways involved when policy is concerned. These depend on the hardware being setup and the operating system handled them. Lock-and-key provides the same benefits as access control lists. However, lock-and-key also has the following security benefits over access control lists.

  1. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    find out what are the advantages and disadvantages of the current system and how they can be adapted or approved upon in my solution. Currently the system used to administrate the property by my client is mainly paper based this is mainly due to the fast that the system has

  2. Introduction to Viruses

    > Fast and Slow Infectors Viruses that infect in a particular way to try to avoid specific Anti-virus software. > Sparse Infectors Viruses that don't infect very often. > Armored Viruses Viruses that are programmed to make disassembly difficult. > Multipartite Viruses Viruses that may fall into more than one of the top classes.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work