Skip to main content

Posts

Showing posts from August, 2018

Management of virus

1.Managerial / Administrative Control An information resource manager or network manager or administrator of the network – are the managers responsible for the security of the system. They are the personnel responsible to carry out the actual work and place controls as checks. Essentially, managerial or administrative controls are the functions carried out the personnel mentioned above. Some of the activities they undertake include – Configuration of Software: Anti-virus software is configured for right detection of malware and raising alert. It is also configured to put frequent checks on all incoming and outgoing email and data traffic from and to the organisation servers.  Managers also need to take care of configuring the software to detect, delete or ignore any suspicious code in the system. Software should also be configured for frequent updates and upgrades. Managers also need to configure to run the software frequently to generate required reports for the management.

working of Viruses & Worms

In the above figure. it is explained diagrammatically that Virus code (V1/V2) is attached to the executable file (E1/E2/E3), when virus comes in contact with executable file it affects the file in two ways: Virus code attached in the beginning and at the end of the executable file: in this case it is possible for the user to scan that virus infected file with the antivirus. Antivirus will remove the virus code and user can get the original file back with data. In the second case (Figure 1.1.2), virus will first erase the data in the executable file and then it will attach virus code (V1/V2) to the executable file (E1/E2/E3), in this case if user will try to scan that file with antivirus, antivirus will delete that file completely and in this case there are no chances to recover the data.

worms

Worm  : Worm is a malicious program that infects a computer without using carrier file. Worms have more capacity to damage computer networks by spreading through the LAN because they are not dependent on the user action. Worm has a capacity to slow down computer as well as entire network and can spread to other networks also. Types of Worms: Worms can be classified according to the propagation method they use, i.e., how they deliver copies of themselves to new victim machines. Worms can also be classified by installation method, launch method etc. e-mail worms: e-mail worms spread via infected computers e-mail network. The worm may be in the form of an attachment or the email may contain a link to an infected website. However, in both cases, email is the vehicle. In the first case the worm will be activated when the user clicks on the attachment. In the second case, the worm will be activated when the user clicks on the link leading to the infected site. Instant Massag

Viruses

Viruses: Computer viruses have the capacity to create havoc in personal as well as professional computers. Virus is a self-replication program that produces its own copy by attaching himself to a carrier file i.e., (.EXE) files in the windows. .EXE is a file extension generally used for executable files. Like real virus computer virus is also contagious and can infect other files available in computer. Virus is generally transmitted through the file downloads, infected drives and the E-mail attachments. Phases of Virus Infection: Infection Phase: In the infection phase, virus infects a file according to its function or coding. In this phase, only infection takes place and we can see its effect of infection in the next phase that is attack phase. Some viruses infect programs each time the program is executed, whereas other viruses infect only upon a certain trigger. Attack Phase: Virus is in attack phase when it gets into action. For example, it will delete files, cha

tag