Feasibility of complete system protection
Feasibility of complete system protection
Computer Viruses: Infection Vectors, and Feasibility of Complete Protection
A computer virus is a program which, after being loaded into a computer's memory, copies itself with the purpose of spreading to other computers.
Most people, from the corporate level power programmer down to the computer hobbyist, have had either personal experience with a virus or know someone who has. And the rate of infection is rising monthly. This has caused a wide spread interest in viruses and what can be done to protect the data now entrusted to the computer systems throughout the world.
A virus can gain access to a computer system via any one of four vectors:
1. Disk usage: in this case, infected files contained on a diskette (including, on occasion, diskettes supplied by software manufacturers) are loaded, and used in a previously uninfected system thus allowing the virus to spread.
2. Local Area Network: a LAN allows multiple computers to share the same data, and programs. However, this data sharing can allow a virus to spread rapidly to computers that have otherwise been protected from external contamination.
3. Telecommunications: also known as a Wide Area Network, this entails the connection of computer systems to each other via modems, and telephone lines. This is the vector most feared by computer users, with infected files being rapidly passed along the emerging information super-highway, then downloaded from public services and then used, thus infecting the new system.
4. Spontaneous Generation: this last vector is at the same time the least thought of and the least likely. However, because virus programs tend to be small, the possibility exists that the code necessary for a self-replicating program could be randomly generated and executed in the normal operation of any computer system.
Even disregarding the fourth infection vector, it can be seen that the only way to completely protect a computer system is to isolate it from all contact with the outside world. This would include the user programming all of the necessary code to operate the system, as even commercial products have been known to be shipped already infected with viruses.
In conclusion, because a virus can enter a computer in so many different ways, perhaps the best thing to do is more a form of damage control rather than prevention. Such as, maintain current backups of your data, keep your original software disks write-protected and away from the computer, and use a good Virus detection program.
Proper Protection Of Your Construction Project Should Be Key Goal Dos Protection Providers Vs. Dos Protection Scripts Choose Easy Hearing Protection With Soft Non-allergenic Earplugs Did Overdraft Protection Cause This Nightmare? Land Rover Vat Protection Transformer Protection Reclaiming payment protection How To Get Protection Against Copyright Violation Skin Protection Day Cream Interior Protection Land Rover Offer Protection From The Vat Increase Spirulina Enhances Antioxidant Protection Preventing Metal Corrosion By Reliable Cathodic Protection
www.yloan.com
guest:
register
|
login
|
search
IP(18.117.180.237) New York / New York City
Processed in 0.007953 second(s), 5 queries
,
Gzip enabled
, discuz 5.5 through PHP 8.3.9 ,
debug code: 20 , 2657, 320,