13 research outputs found

    An Investigation of IBM PC Computer Viruses Infection Rates and Types in a Western Australian Environment

    Get PDF
    In recent years computer viruses have become increasingly significant as a form of computer abuse. By virtue of their reproductive capability, computer viruses can have cumulative and potentially catastrophic effects to the many people who use those affected computers. There is a growing concern in the computing community about these forms of electronic vandalism. This concern arises from the possible damage to stored information on which the work depends and the ensuing disruption of the work-place. Although the vandalism or purposeful abuse by introducing computer viruses to computer systems was originally mainly an American experience, research reports published by the Australian Computer Abuse Research Bureau (ACARB) support the claim that computer viruses have become increasingly significant as a form of computer abuse in Australia in recent years. Apart from ACARB\u27s figures, there is minimal empirical research of a similar nature being conducted to investigate computer viruses as a form of computer abuse in Australia. In this study, an attempt has been made to investigate the problem, albeit on a limited scope. In this study, the infection types and rates of IBM PC viruses in limited government IT organizations in Western Australia were investigated. In addition, this study has made an attempt to validate Spafford\u27s speculation that less than 10 viruses (out of a minimum of 374) account for 90% of infections in the Western Australian environment. This study was descriptive in nature in that a fact-finding survey based on questionnaires and standardized interviews was conducted in State Government IT organizations in Western Australia in order to obtain data on which the research findings can be based. The data gathering instrument for this study was a standardized questionnaire which comprised limited choice questions directed at obtaining such information as infection rates of various types of computer viruses. The questionnaire was field tested to eliminate ambiguous or biased items and to improve format, both for ease of understanding and facility in analyzing results. The questionnaire was used by the interviewer as a basis for the interview so that the potential for subjectivity and bias can be reduced. Before the commencement of this study, a letter of transmittal was sent to the prospective participants in order to request their participations. Confirmation of participation was sought through telephone calls. A very high response rate (87.5%, n = 42) for this study was achieved. This is taken as an assurance that reasonable representation of the state government sector for the study is achieved. Prior to commencement of this study, approval was sought from the University Committee for the Conduct of Ethical Research since this study will involve human subjects. During the interview, subjects were informed of the purpose of the study, that there will be no compulsion to participate in the study and that they will be free to withdraw from further participation in the study at any time they desire. The results of the survey and its implications are provided in chapters 5 and 6. In conclusion, the research ratifies the proposition that currently very few of the IBM PC viruses contribute to the vast majority of infections in the Western Australian work-place

    Bibliography for computer security, integrity, and safety

    Get PDF
    A bibliography of computer security, integrity, and safety issues is given. The bibliography is divided into the following sections: recent national publications; books; journal, magazine articles, and miscellaneous reports; conferences, proceedings, and tutorials; and government documents and contractor reports

    The George-Anne

    Get PDF

    The theory and implementation of a secure system

    Get PDF
    Computer viruses pose a very real threat to this technological age. As our dependence on computers increases so does the incidence of computer virus infection. Like their biological counterparts, complete eradication is virtually impossible. Thus all computer viruses which have been injected into the public domain still exist. This coupled with the fact that new viruses are being discovered every day is resulting in a massive escalation of computer virus incidence. Computer viruses covertly enter the system and systematically take control, corrupt and destroy. New viruses appear each day that circumvent current means of detection, entering the most secure of systems. Anti-Virus software writers find themselves fighting a battle they cannot win: for every hole that is plugged, another leak appears. Presented in this thesis is both method and apparatus for an Anti-Virus System which provides a solution to this serious problem. It prevents the corruption, or destruction of data, by a computer virus or other hostile program, within a computer system. The Anti-Virus System explained in this thesis will guarantee system integrity and virus containment for any given system. Unlike other anti-virus techniques, security can be guaranteed, as at no point can a virus circumvent, or corrupt the action of the Anti-Virus System presented. It requires no hardware modification of the computer or the hard disk, nor software modification of the computer's operating system. Whilst being largely transparent to the user, the System guarantees total protection against the spread of current and future viruses

    Development of a classification system for computer viruses in the IBM PC environment using the DOS operating system

    Get PDF
    The threat to computers worldwide from computer viruses is increasing as new viruses and variants proliferate. Availability of virus construction tools to facilitate \u27customised\u27 virus production and wider use of more sophisticated means of evading detection, such as encryption, polymorphic transformation and memory resident \u27stealth\u27 techniques increase this problem. Some viruses employ methods to guard against their own eradication from an infected computer, whilst other viruses adopt measures to prevent disassembly of the virus for examination and analysis. Growth in computer numbers and connectivity provide a growing pool of candidate hosts for infection. Standardised and flexible systems for classification and naming are needed to eliminate ambiguity and to promote effective identification of viruses. This study is an examination of one candidate classification method. A depth-mediated variation of monothetic analysis has been developed to classify a database of virus information stored in binary variables. The method trialled in this research is suitable for use, although generalised application of monothetic analysis is limited, as only binary (Boolean) variables may be analysed, whilst some pertinent virus information may be of a numeric or descriptive type. The storage of the virus information in a database allows for flexibility in both data volume (new virus reports) and virus characteristics (new variables). Items in both of these categories may be easily added to previously stored information. The data which was used for this study, however, although suitable as test data for the proposed classification technique, is inadequate for taxonomic classification purposes, being highly variable in format, content, and completeness. Several questions also arose regarding accuracy. Such deficiencies were disregarded for the purpose of this study as it was possible to verify in all cases that no current category of virus was missed (omission of which would have made the trial data incomplete). Secondary objectives for this study were the consideration of a suitable nomenclature, resolution methods for delimitation conflicts, and a classification encoding method. Currently, the name of a new virus frequently includes the name of the perceived parent virus. The solution to the problem of variations in naming will depend on whether this \u27patronymic\u27 system is continued. Increases in variability and identification problems caused by encryption and particularly polymorpism may make long term continuation of this approach impractical. Mediation for delineation conflicts, is met by the classification system itself, as the group into which a virus falls is determined by its possession of the requisite characteristics. An encoding method for virus classification details has been provided by the progressive building, during classification, of a node identifier for each virus record, which identifies the branch conditions carried out to group that virus. This provides the variable names on which the virus has been grouped, and together With the values for each of the variables used, summarises the virus characteristics in terms of the classification variables and the depth to which classification has proceeded

    TARPS: a prototype expert system for Training and Administration of Reserves (TAR) officer placement

    Get PDF
    The billet assignment for Training and Administration of Reserves (TAR) officers is normally two to three years. A placement officer determines where the TAR officer's subsequent assignment will be based on the officer's qualifications and billet requirements. This assignment is vitally important because it significantly affects the officer's career opportunities for promotion and command. This thesis describes the design and implementation of a prototype expert database system that enhances the placement officer's ability to efficiently select the optimum billet for each officer. The prototype integrates a rule based expert system with officer and billet databases to produce a list of billets that match an officer's qualifications and desires. A rudimentary prototype of TARPS has already been evaluated in the field. Initial feedback is encouraging. Placement officer recommendations have been implemented into an enhanced prototype, detailed in this thesishttp://archive.org/details/tarpsprototypeex00zollCommander, United States Naval ReserveApproved for public release; distribution is unlimited

    The BG News October 10, 1989

    Get PDF
    The BGSU campus student newspaper October 10, 1989. Volume 72 - Issue 30https://scholarworks.bgsu.edu/bg-news/5984/thumbnail.jp

    Crime and its Control in the People's Republic of China

    Get PDF
    The Centre for Criminology at the University of Hong Kong was established in 1999 to provide a home for indigenous studies of crime and criminal justice in Hong Kong and the region. As part of this objective it sought to provide a platform for both academics and practitioners to share their knowledge and to assist in the development of effective strategies to deal with the increasingly sophisticated problem of crime. The annual symposium on 'Crime and its Control in Greater China' functions as a forum to discuss interdisciplinary research on crime relevant to Greater China. The various components of Greater China have common cultural, linguistic and economic bonds that give rise to some similar crime problems and opportunities to resolve them. Therefore it seemed appropriate that both scholars and practitioners from Mainland China, Hong Kong, Macau and Taiwan should meet to discuss their research on these issues. In the furtherance of these objectives it has been gratifying that the Chinese Peoples' Public Security University has participated in these events and co-hosted the 3rd Symposium. They also organised a Symposium in Beijing in 2002 to discuss ‘Criminal Trends and Countermeasures’and invited the Centre for Criminology to co-host, that event. This is the type of synergy that our annual event aspires to generate. A conscious intention of the annual symposium is to be broad in terms of both the range of topics covered and the depth of experience of the speakers. For this reason the symposium has provided a platform for postgraduate students to introduce their research as well as for well-established scholars with an international reputation for excellence in their chosen area of research. To further the concept of providing a bridge between academia and practice, several speakers are usually invited from the private sector to present their views on the problems and issues that concern them. These proceedings provide a record of selected papers presented at the various symposia and demonstrate the wide variety of topics covered and interests of speakers. I hope this bilingual event will help to fill the need that exists for a joint effort to review and discuss developments in criminology relevant to Greater China
    corecore