Computer Viruses

Computer Viruses The quote “The only truly secure system is one that is powered off, cast in a lead-lined room with armed guards and even then I have my doubts.”(E.H. Spafford) of this report will explain how computer viruses have affected on society and the security of personal computers. There literally hundreds of viruses circulating for personal computers and many anti-viral packages that claim to remove the code from your computer. Some viruses are polymorphic; that is, they change with each infection in an attempt to avoid detection by anti-virus programs. As quickly as someone writes an anti-virus program, someone else writes a new virus that hides more successfully than in the past. Do to the harshness of some viruses; people have devised methods of detecting and removing them.

The anti-viral programs will scan the entire hard drive looking for evidence that viruses may have infected it. These programs must be told very specifically what to look for on the hard drive. There are two main methods of detecting viruses on a computer. The first is to compare all of the viruses on the hard disk to known types of viruses. While this method is very accurate, it can be made totally useless when dealing with a new and previously unknown virus. The other method is the way in which a common cloning virus adapts.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

All that a cloning virus really does is look at what operations the computer is executing and reacts and adapts to them by making more copies of it. This is the serious mistake with cloning viruses: all the copies of itself look the same. Basically all data in a computer is stored in a byte structure format. These bytes, which are similar to symbols, occur in specific orders and lengths. Each of the cloned viruses has the same order and length of the byte structure.

All that the anti-virus program has to do is scan the hard drive for byte structures that are duplicated several times and delete them. This method is an excellent way of dealing with the adaptive and reproducing format of cloning viruses. The disadvantage is that it can produce a number of false alarms such as when a user has two copies of the same file. Virus-specific detection and removal techniques required detailed analysis of each new virus as it is discovered. Computer virus experts must identify strange sequences of instructions that appear in the viral code but not in normal programs. These experts develop cures to remove these viruses from any infected hosts.

While there are thousands of DOS viruses, less than 10% of them have been seen in actual virus incidents within the population that companies monitor. These are the viruses that actually constitute a problem for the general population of PC users. It is very important that anti-virus software detect viruses that have been observed “in the wild”. The remainder are rarely seen outside of the collections of anti-virus groups like IBM. Although many of them might never spread significantly, viruses that are not prevalent remain of interest to the anti-virus society. Companies must always be prepared for the possibility that a low-profile virus will start to become prevalent. This requires them to be familiar with all viruses, prevalent or not, and to incorporate a knowledge of as many of them as possible into anti-virus software. It is not only the destructive nature of computer viruses that make them so dangerous in todays society in the business sector, but also their ability to relate themselves to their surroundings and react in ways that allow them to proceed undetected to wreck more havoc on personal computer users across the world.

Conclusion Viruses have been around quite some time now and I can assure you that it will be around just about forever. Over a decade now, there are people who are constantly coming up with new ways of making life in the computer world very difficult. The trend of technology is changing so rapidly that something such as viruses will also follow the trend. Therefore, what we all should realize that the activity that goes on and how we can base the information provided to help prevent the spread of virus activity in the future. Bibliography 1. JEFFREY O.

KEPHART, GREGORY B. SORKIN, DAVID M. CHESS and STEVE R. WHITE. “Fighting Computer viruses” www.sciam.com/1197issue/1197kephart.html 2. Steve R. White, Jeff Kephart, David M.

Chess, “Computer Viruses: A Global Perspective” www.av.ibm.com/PapersFrame/papersframe.html 3. Suguitan. G, “Fighting Computer viruses” www.soc.hawaii.edu/leonj/409bs98/suguitan/report1. 4. Solomon, Dr. Alan. “A future impact to Viruses.” www.drsolomon.com/vircen/vanalyse/future.cfm 5. Tippett, Peter S.

“Alive!” www.bocklabs.wisc.edu/~janda/alive10.html. 1995.