• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Software Virus Protection.

Extracts from this document...

Introduction

Software Virus Protection Introduction There are many versions of Software Virus Protection on the market including MacAfee, Symantec and Norton, used by both individuals and businesses to protect their computer systems and all the information held on them, against attacks by viruses. In order to know how an anti-virus program works it is important to firstly know what a virus is and what effect it can have! Then it is important to know what types of anti-virus programs there are on the market, how these work, and what the advantages and disadvantages there are to each of these. What is a Virus? A virus is a small self-contained computer program or file designed with malicious intent, to run while the user is unaware and infect hard drives and floppy disks, before often copying itself usually to spread to other computers. Viruses can be spread over the internet, through emails or they can be embedded in files on floppy disks and CD ROMs, which can then be transmitted to the user's computer system and then onto a network of computers. There are several different types of viruses: o Email Viruses- "These are transported via email messages, and usually replicate by automatically sending themselves to all email addresses in the recipients address book". ...read more.

Middle

provided by the vendor', which are normally downloadable from the internet to make sure that the most up to date profiles get to computers quickly before new viruses have time to attack or do serious damage. (Source: Home Security FAQ. http://www.gale-internet.co.uk) New viruses are been discovered daily and so the effectiveness of anti-virus software is dependent on having the latest virus profiles installed on your computer so that it can look for recently discovered viruses. Anti-virus Software uses one of four main methods for detecting viruses on a computer system- Scanning, Integrity Checking, Heuristic Virus Checking and Interception. Of these, scanning and interception are very common; with the other two used less frequently but each one of these have both advantages and disadvantages! * Scanning 'A scanner will search all files in the memory, in the boot sector and on disk for 'code snippets' that will uniquely identify a file as a virus. This requires a list of unique signatures that will be found in viruses and not in ordinary programs'. (Source: www-cse.stanford.edu). There are two types of scanning: on-access and on-demand; On-access scanning scans files when they are loaded into memory prior to execution. ...read more.

Conclusion

When not detected by scanners, interception software will usually detect the destructive and unusual sequences of events caused by logic bombs and Trojan horses. Disadvantages: Unfortunately, interceptors are not very good at detecting anything else. Interceptors also have all the drawbacks of heuristic systems - difficulty differentiating virus from non-virus, and easy to program around. In addition, most interceptors are very easy to disable, and so many viruses frequently disable them before launching. Due to the nature of an interceptor, this software is unable to detect viruses before they launch, and a lot of damage could already have been done. Conclusion Therefore, anti-virus protection software is used to find and isolate before removing the different types of viruses that could infect a person's computer before that virus has time to reproduce and spread or cause any damage. All anti-virus programs work in one of four ways, all of which have advantages to there use and disadvantages to their use, but one of these versions is essential to ensure that viruses can not seriously effect a computer system or computer network in a business. It is necessary for businesses and individuals to have anti-virus protection so that they can detect if they have a virus on their systems and then remove it before it can cause any damage to files or the programs that operate that computer system or network. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    Every user gets leased line to a frame relay node. TCP/IP stands for Transmission Control Protocol over Internet Protocol. This relates to frame relay when it uses encapsulation to give abstractions of protocol and services. An application uses a given set of protocols and services and sends the data down to the layer so the data can be further encapsulated.

  2. Computer Maintainance - anti-virus, cookie deletion, drive scanning

    Anti-spyware software seeks to block and remove such programs. * Clean up tools: 1. Removal of cookies and internet history. To remove cookies in Google Chrome Click on the "Tools" menu and select "Options". Click the "Under the Bonnet" tab, locate the "Privacy" section and click the "Clear browsing data" button.

  1. Hardware and Software

    There are different two types of scanners which printers use today: ** Flatbed ** Sheet fed Flatbed: These scanners can scan flat originals of different sizes. They can even scan small 3D objects (For Example, hand). Sheet Fed: These scanners work a bit differently than flatbed scanners: instead of having

  2. Firewall Protection

    In order for the attacker to use this method, your computer must first be infected by a RAT. Prevention of infections by RATs is no different than prevention of infection by viruses. Antivirus programs can identify and remove most of the more common RATs.

  1. Program Code Program DVD_Program; Uses Menuunit, CRT, dos; ...

    #0; Repeat ch:= Readkey; Until ch= #13; Restore_Screen; Window (1, 2, 80, 24); {Since Draw_Shadow_Box messes up window settings it has to be reset} End; {--------------------------------------------------------------------} {This procedure is used to locate a video record stored in the database.} Procedure locate_video_record; VAR vid: longint; Begin found:= false; Clear_Selected; Save_Screen; Draw_Shadow_Box

  2. Smart Card System

    When creating an access list, we define criteria that are applied to each packet that is processed by the router; the router decides whether to forward or block each packet based on whether or not the packet matches the criteria.

  1. Flexible Architectures in Communication Security Application

    Each algorithm is generally considered a strong algorithm, having undergone review and aggressive cryptanalysis. A strong cipher has high resilience to the efforts of an unrelated party attempting to determine the original content of an encrypted message. Four of the ciphers, i.e., 3DES [13], Blowfish [11], IDEA [23], and RC4 [34], are algorithms used in popular software packages.

  2. Investigating Visual Programs

    * Visual Basic provides six types of Repetition Structures: o While o Do While o Do Until o Do Loop/While o Do Loop/Until o For/Next } Used to repeat a specified number of times. Used to repeat "while" a condition holds or until a condition changes Advantages of Structured Programming

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work