Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Study on Computer Threats and Virus Prevention


Affiliations
1 Department of Computer Science, Sri Krishna Adithya College of Arts & Science, Coimbatore – 42, India
2 Department of Computer Applications, Shri Nehru Maha Vidyalaya College of Arts & Science, Coimbatore – 50., India
     

   Subscribe/Renew Journal


Security is a basic component of every computer. Security of computer technology, known as Information Security, compatible with computer and networks is security. This is a threat to any user who uses the computer network. Computer viruses will not be affected if the computer is not connected to the outside world. In this case, it is the Internet. This virus can be used as a medium to spread the virus completely. Many types of viruses spread on the Internet. Some of them are aimed at making money, and there is only one functionality and system performance. Some techniques are used to prevent viral transmission. The user's data will be publicly transmitted and protected from viral attacks. Techniques involving the prevention and prevention of viruses against computer networks will detect viral properties and functions

Keywords

Security, Technology, Information, Computer, Networks, Virus, System.
User
Subscription Login to verify subscription
Notifications
Font Size

  • S. Natarajan and S. Rajarajesware, "Computer Virus: A Major Network Security Threat," International Journal of Innovative Research & Development, vol.3, no. 7, pp. 229-302, 2014.
  • S. Chakraborty, "A Comparison study of ComputerVirus and Detection Techniques," International Journal of Scientific Research in Computer Science,Engineering and Information Technology, vol. 2, no.1, pp. 236-240, 2017.
  • M. Khari and C. Bajaj, "Detecting Computer Viruses," International Journal of Advanced Research in Computer Engineering & Technology, vol. 3, no. 7, pp. 2357-2364, 2014
  • S. Ramadhani, Y. M. Saragih, R. Rahim and A. P. U. Siahaan, "Post-Genesis Digital Forensics Investigation," International Journal of Scientific Research in Science and Technology, vol. 3, no. 6, pp. 164-166, 2017.
  • Auerbach Publishers (a division of Warren Gorham & Lamont). Data Security Management.Boston, MA. 1995.
  • British Standards Institute. A Code of Practice for Information Security Management, 1993.
  • Caelli, William, Dennis Longley, and Michael Shain Information Security Handbook. New York, NY: Stockton Press, 1991.
  • Hariyanto and A. P. U. Siahaan, "Intrusion Detection System in Network Forensic Analysis and Investigation," IOSR Journal of Computer Engineering, vol. 18, no. 6, pp. 115-121, 2016.
  • M. Rahgozar. “Computer networks”. Book of the Month Science and Technology, pp. 98-99, 2010.
  • F. Hohaji, "providing a framework of security for services in next generation networks," the Third National Conference on Information and Communication Technology, Tehran, 2008.
  • A. Vizandan, A. Mir Ghadri, J. Sheykh Zadegan, "passive defense in infrastructure communications networks with an emphasis on the security assessment of flow encryption algorithms," Journal of passive defense, pp. 47-52, summer and fall of 2011.
  • M. Azar Poor, A. Dahar, M. Jahani Mir, “the assessment of computer network security by Honey Pot technique in IDS & IPS systems”," journal of information technology era, pp. 78-84, 2012.
  • L. Peterson and B. Davie, Computer Networks: A Systems Approach, USA: Elsevier, Inc., 2012.
  • A. Tanenbaum and. D. Wetherall, Computer Networks, New Jersey: Pearson Prentice Hall, 2011.
  • Tutorials Point (I) Pvt. Ltd., Data Communication and Computer Network, INDIA: www.tutorialspoint.com, 2014.
  • K. Mansfield and J. Antonakos, Computer Networking for LANS to WANS: Hardware, Software and Security, USA: Course Technology, Cengage Learning, 2010.
  • Computer Virus: Their Problems & Major attacks in Real Life, International Journal of P2P Network Trends and Technology (IJPTT), Vol. 3, Issue 4, May 2013

Abstract Views: 271

PDF Views: 1




  • A Study on Computer Threats and Virus Prevention

Abstract Views: 271  |  PDF Views: 1

Authors

A. P. Thangamuthu
Department of Computer Science, Sri Krishna Adithya College of Arts & Science, Coimbatore – 42, India
G. Vadivel
Department of Computer Applications, Shri Nehru Maha Vidyalaya College of Arts & Science, Coimbatore – 50., India
A. Priyadharshini
Department of Computer Applications, Shri Nehru Maha Vidyalaya College of Arts & Science, Coimbatore – 50., India

Abstract


Security is a basic component of every computer. Security of computer technology, known as Information Security, compatible with computer and networks is security. This is a threat to any user who uses the computer network. Computer viruses will not be affected if the computer is not connected to the outside world. In this case, it is the Internet. This virus can be used as a medium to spread the virus completely. Many types of viruses spread on the Internet. Some of them are aimed at making money, and there is only one functionality and system performance. Some techniques are used to prevent viral transmission. The user's data will be publicly transmitted and protected from viral attacks. Techniques involving the prevention and prevention of viruses against computer networks will detect viral properties and functions

Keywords


Security, Technology, Information, Computer, Networks, Virus, System.

References