1,505 research outputs found
Malware "Ecology" Viewed as Ecological Succession: Historical Trends and Future Prospects
The development and evolution of malware including computer viruses, worms,
and trojan horses, is shown to be closely analogous to the process of community
succession long recognized in ecology. In particular, both changes in the
overall environment by external disturbances, as well as, feedback effects from
malware competition and antivirus coevolution have driven community succession
and the development of different types of malware with varying modes of
transmission and adaptability.Comment: 13 pages, 3 figure
Safe Computing
So-called worms, viruses, and Trojan horses that attack computer systems are defined. The vehicle that allows these attacks to occur, namely, the open computer internetwork, is examined. The problem of providing protection against attack in an internetwork environment is discussed. The need for professional responsibility on the part of the scientific and engineering community in enforcing strong ethical practices and neither tolerating nor condoning such practices is stressed
Securing library information system: Vulnerabilities and threats
Threats and vulnerabilities in computers and networks are common nowadays since computers are widely used by the
public. The risks of computer threats and vulnerabilities are high since most computers are connected to the internet.
Library Information Systems is also vulnerable to attack since it is a public access institution. Majority of users are naive when it comes to computer and network securities. Some breaches in Library Information System are intentional and some are unintentional. Risks analysis should be done to find the threats and risks in designing the Library Information System. Threats are made possible due to lack of proper procedures, software flaws and policies. The administrators should anticipate all the possible attacks and their mitigation techniques. In this paper, we will try to address various issues arise from this vulnerabilities and threats. We will also describe how we can reduce and overcome this vulnerabilities and threats
Threats and countermeasures for network security
In the late 1980's, the traditional threat of anonymous break-ins to networked computers was joined by viruses and worms, multiplicative surrogates that carry out the bidding of their authors. Technologies for authentication and secrecy, supplemented by good management practices, are the principal countermeasures. Four articles on these subjects are presented
What do “Back-to-School" Computers Have in Common with Health Education and Health Protection?
How to increase immunization levels in communities is a recurrent problem associated with missed opportunities. As communities gear-up for Back to School, health educators may encourage people to update their child, adolescent, and adult immunizations. Human herd immunity can protect communities from spread of infection, and an analogy is presented with “herd immunity for personal computers.” Both computer and biological viruses spread faster when a large portion of the population is unprotected. Just as individuals should receive immunization shots to protect self and families; computer systems can be protected against nasty computer code by using current anti-virus programs to limit the spread of viruses, worms, and Trojan horses from one computer to another. How much more would individuals rather receive timely shots that help to preserve health? An ounce of prevention is worth a pound of cure
Malware Detection Module using Machine Learning Algorithms to Assist in Centralized Security in Enterprise Networks
Malicious software is abundant in a world of innumerable computer users, who
are constantly faced with these threats from various sources like the internet,
local networks and portable drives. Malware is potentially low to high risk and
can cause systems to function incorrectly, steal data and even crash. Malware
may be executable or system library files in the form of viruses, worms,
Trojans, all aimed at breaching the security of the system and compromising
user privacy. Typically, anti-virus software is based on a signature definition
system which keeps updating from the internet and thus keeping track of known
viruses. While this may be sufficient for home-users, a security risk from a
new virus could threaten an entire enterprise network. This paper proposes a
new and more sophisticated antivirus engine that can not only scan files, but
also build knowledge and detect files as potential viruses. This is done by
extracting system API calls made by various normal and harmful executable, and
using machine learning algorithms to classify and hence, rank files on a scale
of security risk. While such a system is processor heavy, it is very effective
when used centrally to protect an enterprise network which maybe more prone to
such threats.Comment: 6 page
A study on computer viruses attacks and the way to cure them / Shukor Sanim Mohd Fauzi
Many organizations and users are working hard to secure themselves from the growing
threats of computer viruses, Trojan horses, worms, and other malicious codes. Computer
viruses attacks are problems created by men or women and they are problems that can
also be controlled by men or women. In the end, it is basically a war between virus
writers and virus fighters. There are bright minds on both sides, and it looks like this fight
is not going to end. This research intends to find the pattern of computer viruses attacks
and perform a prediction on the next occurrence of virus. Other than that, this research
also will propose a new way to cure from computer viruses attacks. The findings of this
research are hope be able to shed some light for all of us
- …