Warning: Use of undefined constant referer - assumed 'referer' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 102

Warning: Use of undefined constant host - assumed 'host' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 105

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 106

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 109
Computer Viruses: Infection Vectors, And Feasibility Of Complete Protection - School Essays

Computer Viruses: Infection Vectors, And Feasibility Of Complete Protection



A computer virus is a program which, after being loaded into a
computer's memory, copies itself with the purpose of spreading to other
computers.
Most people, from the corporate level power programmer down to the
computer hobbyist, have had either personal experience with a virus or know
someone who has. And the rate of infection is rising monthly. This has caused a
wide spread interest in viruses and what can be done to protect the data now
entrusted to the computer systems throughout the world.
A virus can gain access to a computer system via any one of four
vectors:
1. Disk usage: in this case, infected files contained on a diskette
(including, on occasion, diskettes ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

connection of computer systems to each other via
modems, and telephone lines. This is the vector most feared
by computer users, with infected files being rapidly passed
along the emerging information super-highway, then downloaded
from public services and then used, thus infecting the new system.
4. Spontaneous Generation: this last vector is at the same time
the least thought of and the least likely. However, because
virus programs tend to be small, the possibility exists that
the code necessary for a self-replicating program could be
randomly generated and executed in the normal operation of
any computer system.

Even disregarding the fourth infection vector, it can be seen that the
only way to completely protect a computer system is to isolate it from all
contact with the outside world. This would include the user programming all of
the necessary code to operate the system, as even ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login


CITE THIS PAGE:

Computer Viruses: Infection Vectors, And Feasibility Of Complete Protection. (2005, August 31). Retrieved December 23, 2024, from http://www.essayworld.com/essays/Computer-Viruses-Infection-Vectors-Feasibility-Complete/32544
"Computer Viruses: Infection Vectors, And Feasibility Of Complete Protection." Essayworld.com. Essayworld.com, 31 Aug. 2005. Web. 23 Dec. 2024. <http://www.essayworld.com/essays/Computer-Viruses-Infection-Vectors-Feasibility-Complete/32544>
"Computer Viruses: Infection Vectors, And Feasibility Of Complete Protection." Essayworld.com. August 31, 2005. Accessed December 23, 2024. http://www.essayworld.com/essays/Computer-Viruses-Infection-Vectors-Feasibility-Complete/32544.
"Computer Viruses: Infection Vectors, And Feasibility Of Complete Protection." Essayworld.com. August 31, 2005. Accessed December 23, 2024. http://www.essayworld.com/essays/Computer-Viruses-Infection-Vectors-Feasibility-Complete/32544.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 8/31/2005 06:55:43 PM
Category: Computers
Type: Premium Paper
Words: 548
Pages: 2

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
» The Great Gatsby
» Briar Rose
» Uniforms Will Make Schools A Be...
» Compare And Contrast: Aneas An...
» Methods Of Therapy
» The Grapes Of Wrath 6
» Personal Writing: Applying To I...
» How Effective Is Act Three, Sce...
» Should Student Be Able To Eat L...
» Adaptions In Ectothermic And En...
Copyright | Cancel | Contact Us

Copyright © 2024 Essayworld. All rights reserved