ABSTRACT
Network Virus are programs designed to destroy or hamper some function of the computer. By doing this they either destroy information or slow down processing capabilities of the computer system. In recent years they have also had a destructive presence on computer networks and on the internet.
Many people do not understand what is a computer virus? In computing terminology it is a self replicating/self producing automated program. This program spreads by inserting itself into executable code or documents that are present on the computer system. This process of insertion of a virus is called infection. The file into which the code is inserted is called an infected file. Each file has an extension; document files have 'doc' as an extension. The files that are infected the most are executable files which have extensions 'exe' and 'com'. Presently any file in which there is some programming capability is infected. There is a wide list of files that can be infected. A biological virus can be contracted only when you come into contact with it similarly a computer virus is spread if your computer gets into contact with any infected file. By now you might know; when is a computer subject to infection by a virus. But are still curious about the various other terms like Trojans, worms and malware(malicious software). Malware is a more broad term. If you still are confused as to what is computer virus just remember computer virus can only affect software and cannot damage hardware. That's why I do not use my PC too often. With a best laptop in my hand, i can easily install any software wherever I want to.
TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION PAGE
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS
CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF THE PROBLEM
1.2 PURPOSE OF THE STUDY
1.4 DEFINITION OF TERMS
1.5 ASSUMPTION OF THE STUDY
CHAPTER TWO
2.0 LITERATURE REVIEW
History of Viruses
2.1 GETTING VIRUS ALERTS TO PREVENT HARMFUL VIRUSES FROM DESTROYING YOUR PC
2.2 ARE SECURITY ALERTS EFFECTIVE?
2.3 WHICH COMPANIES RESPOND FIRST TO NEW VIRUS ALERTS DISCOVERIES?
2.4 HOW CAN I GET REGULAR SECURITY ALERTS?
2.5 SO WHAT HAPPENS IF I GET AN ALERT? WILL MY ANTIVIRUS SOFTWARE FIX IT OR DO I NEED A PATCH?
CHAPTER THREE
3.0 NETWORK VIRUS CREATION
3.1 MEANS OF INFECTION
3.2 REMOVAL OF COMPUTER WORMS
3.3 DAMAGE
3.4 PREVENTION
CHAPTER FOUR
4.0 NETWORK VIRUS PREVENTION
4.1 VIRUS IDENTIFICATION PATTERNS
4.2 HEURISTICS
4.3 ROOTKIT DETECTION
CHAPTER FIVE
5.0 CONCLUSION
5.1 LIMITATION OF THE STUDY
5.2 SUGGESTION FOR FURTHER RESEARCH
REFERENCES
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2012, 11). Network Virus: Creation And Prevention.. ProjectStoc.com. Retrieved 11, 2012, from https://projectstoc.com/read/270/network-virus-creation-and-prevention
"Network Virus: Creation And Prevention." ProjectStoc.com. 11 2012. 2012. 11 2012 <https://projectstoc.com/read/270/network-virus-creation-and-prevention>.
"Network Virus: Creation And Prevention.." ProjectStoc.com. ProjectStoc.com, 11 2012. Web. 11 2012. <https://projectstoc.com/read/270/network-virus-creation-and-prevention>.
"Network Virus: Creation And Prevention.." ProjectStoc.com. 11, 2012. Accessed 11, 2012. https://projectstoc.com/read/270/network-virus-creation-and-prevention.
- Related Works
- Design An Implementation Of A Computer Based Seaport Billing System (a Case Study Of Nigerian Port Authority Lagos)
- Design And Implementation Of Interactive Intranet Portal For Effective Management In Tertiary Institution
- Design And Implementation Of Simple Word Processor
- Design And Implementation Of A Medical Imaging Software System (case Study Of Parklane Enugu)
- Design And Implementation Of A Computerized Invoicing System (a Case Study Of Bubbles Plaza Enugu)
- Design And Implementation Of A Case Filling System For A Drug Monitoring Agency (a Case Study Of Ndlea Area Office Enugu)
- A Geometric Approach To Improving Active Packet Loss Measurement
- Design A Web Based Portal For Student Registration Exercise (case Study Of Mathematics And Computer Science Departments)
- Design And Implementation Of A Database Management Software For A Confectionery Business
- The Relevance Of Computer In Accounting Profession