New Customer? Enjoy 30% OFF your first order

A Literature Review Regarding Virus Protection

Although best of the bodies anticipate that there is annihilation to do a analysis in the breadth of computer virus protection, there are added and added things to analysis as accustomed added than 200 computer malware are created by the virus creators. In the avant-garde apple best of the bodies are application computers in their circadian activities. So it is added important to accept adeptness of computer bacilli and absorption the computers from those viruses.

begin{sloppypar}

end{sloppypar}

Identifying what the computer bacilli are, their types, the blackmail to the computer from computer viruses, the present bearings of computer bacilli and blockage mechanisms from the computer bacilli are the objectives of this abstruse review.

end{abstract}

section{Introduction}

As the acceptance of the computers and conception of computer bacilli are accretion all over the world, every computer user began to chase about the computer viruses. But there are alternative assorted kinds of software like worms and Trojans that can do some abuse to the activities of the computer alternative than the viruses. Although they are altered from computer viruses, the computer users are acclimated to alarm those alternative types of awful software “viruses”.

begin{sloppypar}

end{sloppypar}

Though there is no any absolute analogue for the computer viruses, they can be advised as appropriate affectionate of software programs that accept the adeptness of cocky replicating over executable files abide in the computer and do some abeyance to the activities of the computer. As the computer bacilli are overextension alone back the executable files are executing, the bacilli can aftereffect alone for the executable files in the adulterated computer. So best of the time the files with .EXE , .COM , .BAT , .SYS extensions are infected. A computer virus can be accounting with a few curve of programming codes in any programming language. Any actuality who has a claimed computer can address a computer virus and accelerate it to addition computer or arrangement far abroad from the computer which produced the virus through a arrangement or any disk. These bacilli can abort any massive computer arrangement or arrangement calmly aural few seconds.

begin{sloppypar}

end{sloppypar}

Computer bacilli which do beneath abuse to the computers are alone overextension over the computers and computer networks. They do not do any alarming abuse to the computers alternative than aloof replicating them in the system. The best alarming blazon of bacilli aftereffect to the computers by alteration the agreeable of the files, partially of absolutely deleting the files abide in the computer. The abstracts stored in the computer can be absent by infecting these kinds of computer viruses. These types of computer bacilli cannot be bolt by analytical the files in the computer. But alone the abolition they accept done to the computer will remain. So capturing these bacilli is the added difficult thing.

begin{sloppypar}

end{sloppypar}

Preventing or absorption from computer bacilli not alone beggarly installing an anti virus affairs and browse the files by accepting use of the anti virus affairs but additionally acquaintance of the computer bacilli or awful software and practicing best practices back application a computer. But best of the time best of the computer users assurance assorted anti virus programs to assure their systems adjoin computer viruses. Assorted anti virus programs use assorted methods or procedures to abduction bacilli and alternative types of awful software. But with any of the computer aegis method, they cannot absolutely assure the computer from computer bacilli or awful software. The abutting affair of this analysis is advised about what are the types of Malware and how they adulterated to computer system. cite{1}

newpage

section{Types of malware}

There is no accepted adjustment to assort bacilli into assorted types. But back we accede accepted bearings of computer bacilli in the apple we can basically acknowledge types of malware as follows,

begin{itemize}

item Trojan

item Worms

item Viruses

end{itemize}

subsection{Trojan}

Trojan bacilli do not carbon in the computer but afterwards a Trojan virus enters into the computer they aloof acquiesce the alfresco bodies to apprehend the files abide in the computer. Usually Trojans abduct passwords and accelerate e-mails to hackers. Again the hacker will get the ascendancy of the user’s account. cite{2}

subsection{Worms}

Worms are affectionate of computer bacilli archetype and advance over the computer networks. It does not charge a host to spread. Once they assorted in a computer, the affected bacilli browse the arrangement for added adding and overextension via the network.cite{2}

subsection{Viruses}

Computer bacilli are a program, a block of executable cipher which attaches itself to. It overwrites or replaces some cipher of computer affairs afterwards alive of computer user. A virus consistently needs a host affairs to reside. The virus is in its abandoned accompaniment till the host affairs it resides executes. Back the host affairs executes the bock of cipher of the virus additionally executes and searches for addition area which it can infect. The computer bacilli can be categorized into cardinal of categories like Citizen Viruses, Absolute Activity Viruses, Overwrite Viruses, Cossack Viruses, Macro Viruses, Directory Viruses, Polymorphic Viruses, Book Infectors, Companion Viruses, FAT Viruses. cite{2}

begin{itemize}

item Citizen Bacilli – Permanent bacilli abide in the RAM

item Absolute Activity Bacilli – This blazon of virus spreads and does its assignment back it is executing.

item Overwrite Bacilli – These bacilli annul the agreeable of the files abide in the computer.

item Cossack Bacilli – This affectionate of virus infects to a cossack area of the adamantine drive or floppy. A cossack virus can be adulterated to the cossack area of the computer by booting the computer from an adulterated billowing disk.

item Directory Bacilli – These bacilli change the aisle of a file.

item Polymorphic Bacilli – These are encrypting their own cipher with altered algorithms every time they access into a system.

item Book Infectors – Affect programs or executable files. They affect to a book back the affairs absorbed to it executes.

item Companion Bacilli – These are alive like citizen bacilli or absolute activity viruses.

item FAT Bacilli – These affect to the book allocation table.

item Macro Bacilli – This affectionate of virus infects to the files that accept created application programs that accommodate macros. Currently best of the times they are affecting to Word 6, WordBasic and Excel as macros are created by WordBasic. In the present bearings of the computer viruses, 15 percent of the bacilli are macro viruses. On circadian base macro bacilli are created by the computer users in their machines. New macro bacilli are creating due to corruption, alliance and conversion. Macro bacilli are the best annihilative affectionate of a virus. Best of the acceptable anti virus programs are clumsy to ascertain those new macro viruses. cite{2}

end{itemize}

newpage

section{How Bacilli affect and affect to the system}

begin{figure}[h]

par

includegraphics[bb =0 0 100 325 ]{virus.png}

caption{Malware Detected by Year} cite{10}

par

end{figure}

If the virus bearing acceleration is greater than its afterlife rate, a virus can calmly advance aural a abbreviate aeon of time. Figure1 shows how Malware advance with time. All the computer bacilli do not actuate at the time they access into the computer. But sometimes they actuate afterwards some aeon of entering it into the claimed computer or computer system. Some of them will never actuate and some will actuate and do abuse to the files in the arrangement or change the agreeable of the files, architecture the adamantine disk, appearance a account in the background.

begin{sloppypar}

end{sloppypar}

There are lots of agency which a virus can access into a computer. Best of the time, they advance and access into a new computer through a computer network. With a disposable media, it is accessible to advance a virus. By downloading some amateur or software through a web site, a virus can access into a new system. In the accomplished there was a agreement that the web sites do not accommodate viruses. But in the present situation, there is no agreement that the web sites do not accommodate viruses.

begin{sloppypar}

end{sloppypar}

Trapdoor is addition accepted way of entering a virus into a system. Trapdoors are sometimes created by the programmers who developed the software to abstain activity through the aegis activity or abstain entering passwords during the aeon of time the arrangement or software is developed. As a trapdoor is a way to access into a arrangement afterwards entering a password, a virus can calmly access into a arrangement through a trapdoor.

begin{sloppypar}

end{sloppypar}

If accept the absorption to the new computer viruses, the cipher of some anew created computer bacilli are encrypted so that the anti virus software cannot bolt them. cite{3}

section{Protection from computer viruses}

To advance a virus from one computer to another, it should accept the permission or adeptness to assassinate its cipher and do some modifications or absolutely annul the files alternative than the book the virus currently residing. According to those facts, aegis from computer bacilli agency anticipate the computer virus from artful it cocky to addition location, the computer virus does not accommodate or abstain modifying or deleting the alternative files the computer virus does not reside.

begin{sloppypar}

end{sloppypar}

If the agreeable of a book has adapted or edited afterwards adeptness of the user, the user can doubtable that a virus has been adulterated to the computer. Alternative than that back a virus has attacked a system, sometimes the achievement of the computer can be reduced, assorted absurdity letters are displayed or use some accumulator amplitude from deejay drives unexpectedly.

begin{sloppypar}

end{sloppypar}

Worms commonly acquisition addresses to advance and they abduction the addresses in three ways. Worms

begin{itemize}

item Randomly accomplish addresses

item Acquisition addresses in arrangement tables

item Acquisition addresses in a program

end{itemize}

Protection adjoin worms can include,

begin{itemize}

item Put passwords that cannot calmly guess.

item Abolish some processes which acknowledge the anchored abstracts in the system.

item Apply some solutions to the bugs.

end{itemize}

As worms are rapidly advance over networks and they are aggravating to afflict the networks, absorption from worms accommodate ecology arrangement activities and do abreast and deactivation of some genitalia of the network.

begin{sloppypar}

end{sloppypar}

When it comes to absorption computers from viruses, the simplest things the user can do is consistently advancement the abstracts abide in the computer. But it is not a able band-aid to accord with the computer viruses. As best of the computer users are now acquainted of the computer bacilli they ascendancy “write” advantage to computer programs. Afterwards infecting a virus to a affairs back it changes the agreeable of the file, there are some affectionate of software that can be acclimated to analysis the agreeable for aberrant changes in its content. cite{4,12}

section{Anti virus software programs}

When absorption a computer from computer bacilli with the advice of an anti virus program, the account providers of those anti virus programs are accouterment their account to its audience in cardinal of altered ways. Some of the vendors or anti virus software are cat-and-mouse for a appeal from a user for their product. Afterwards the applicant or the user requests, the account provider provides their account to the user. Addition affectionate of anti virus bell-ringer automatically downloads and installs their artefact into client’s apparatus afterwards the adeptness of the user. Some of the vendors are sending emails to the computer users advertence the availability of their product. However some of those aloft mentioned agency accept some ethically not accordant procedures.

begin{sloppypar}

end{sloppypar}

Though bags of anti virus programs, advised by programmers are there to ascertain computer viruses, they cannot comedy a absolute role in audition computer viruses. Added bacilli are accounting for a new belvedere is the acumen for that. To ascertain those new viruses, new apprehension technologies should be invented. There are cardinal of computer virus apprehension methods.

begin{sloppypar}

end{sloppypar}

Over some years ago, alone the accepted bacilli could be detected by anti virus programs. What those anti virus programs did were, selecting a cord from accepted bacilli and back a browse for bacilli is started, anti virus affairs searches for files accommodate that cord and ascertain that book as an adulterated file. This adjustment of audition computer bacilli looked alone for changeless characteristics of accepted computer viruses. But as bags of computer bacilli are creating aural a year, the industry bodies started to actualize anti virus programs that are audition alien computer bacilli too. These methods are alleged “heuristic method”.

begin{sloppypar}

end{sloppypar}

As computer virus infection has become a huge threats to who owns a computer and who uses computers. Best of the computer users are today accepting the account of an anti virus affairs to ascertain awful software or computer viruses. Accepting use of an anti virus software is the best anchored and accepted way to assure the computers from awful software. Anti virus programs analyze the awful software in two capital approaches.

begin{itemize}

item They use a cord analogous access to analyze ahead accepted bacilli or awful software.

item The additional adjustment the anti virus programs use is capturing aberrant behaviors of any computer affairs active on the computer.

end{itemize}

begin{sloppypar}

end{sloppypar}

In cord analogous approach, the anti virus programs are accepting use of a ‘virus dictionary’ which contains the codes of ahead accepted viruses. Back an anti virus affairs starts to browse a book it refers to the virus concordance and back it finds a block of cipher in the scanned book which additionally included in the virus dictionary, it bound takes an activity adjoin the apprehensive file. cite{5}

begin{sloppypar}

end{sloppypar}

If an anti virus affairs uses capturing aberrant or apprehensive behaviors, it monitors the behavior of the book which is scanning and if the book behaves abnormally the anti virus affairs ascertain the book as adulterated book an booty an activity adjoin that. By application this method, the new bacilli can additionally be detected. cite{5}

subsection{The botheration in virus concordance method}

As virus creators are now acquainted of virus apprehension methods, they are now autograph the bacilli so that the codes of the virus as encrypted codes back it is in a program. Otherwise they address the virus programs so that the cipher of itself doesn’t attending aforementioned as the absolute cipher of it. Because of those two reasons, the anti virus affairs cannot ascertain the adulterated book by analogous the strings application the virus dictionary. The alternative botheration of this adjustment is it cannot ascertain a new virus which doesn’t accommodate in the virus dictionary.

subsection{The problems of audition a virus by its behavior}

As this adjustment is analytic for a apprehensive behavior of the book that is actuality scanning, a files that shows aberrant behavior which has not been attacked by a virus or awful software can additionally be detected as an adulterated book by the anti virus program. If the user gets an activity adjoin that book sometimes that non adulterated book can additionally be deleted. So avant-garde anti virus programs do not use this access to ascertain a virus.

There are some affected anti virus software which do not apple-pie or assure the computers. These affected anti virus software appear with names which are agnate to alternative absolute anti virus software. Back a user sees such a affected anti virus software the user feels that this ant virus software is a absolute one and again he install than affected anti virus software into the computer. Afterwards installing that affected one in the computer, it displays affected letters adage there are some bacilli in the computer and to abolish it from the computer pay some bulk of money. As these kinds of affected anti virus software are there with alone the aim of earning money, the computer users charge acquainted of that affectionate of affected anti virus software too.

begin{sloppypar}

end{sloppypar}

Although there are so abounding anti virus software to ascertain computer viruses, the latest computer bacilli cannot calmly be bent by alike the latest anti virus software programs as the cipher of virus is encrypted. What the virus creators do to adumbrate the antecedent cipher of the virus is encrypting the cipher of the virus and sends it to the computers. So the anti virus software cannot calmly accept the cipher and they cannot bolt that book as a apprehensive file. Some virus creators encrypt the cipher and accumulate the key to break in addition book to accomplish it added difficult for the anti virus software to acquisition the virus. But acceptable anti virus software, which accept acclimated acceptable algorithms, should be able to ascertain those computer bacilli too. cite{6,7}

subsection{Most trusted anti virus software} cite{11}

begin{itemize}

item BitDefender Antivirus 2010 – BitDefender is application avant-garde heuristic apprehension adjustment and provides aegis adjoin online viruses, spyware,phishing scams and more. This provides aegis by scanning web, IM and emails and this is able of encrypting the IM s too. One of the new appearance BitDefender attractive for is Active Virus Ascendancy which adviser the behavior of a book continuously. cite{13}

item Kaspersky Anti-Virus 2010 – Provides aegis from viruses, Trojans, bots, worms and spyware. The interfaces and accoutrement acclimated are avant-garde but this provides agreat aegis adjoin best of the absolute threats. cite{14}

item Webroot AntiVirus with SpySweeper 2010 – This is a desktop anti virus amalgamation and assure the computer from viruses,trojans,worms and alternative cardinal of malware. This catches the malware afore the malware does any abuse to the computer. cite{15}

item Norton AntiVirus 2010 – Uses signature based protection. However provides a new appearance like the proactive acceptability scanning. But uninstalling the software adeptness account some problems as its fractional uninstallation. cite{16}

item ESET Nod32 Antivirus 4 – Affectionate of desktop anti virus software. But this doesn’t accommodate a complete aegis and misses some protection. This is not in the antagonism with alternative anti virus software. cite{17}

item AVG Anti-Virus 9 – Includes antivirus and antispyware protection. provides complette aegis from adverse downloads and web cites. cite{18}

item F-Secure Anti-Virus 2010 – Great desktop anti virus. Has one of the best able browse activity and analysis after-effects are apparent to prove that. Back installing this anti virus software, it has been automatically configured to abolish the alternative anti virus software installed to the computer. cite{19}

item G DATA AntiVirus 2011 – Uses two audible antivirus scanning engines, behavioral/heuristic protection, and alike self-learning fingerprinting.This provides aegis adjoin malware overextension via emails and IM. The types of malware which are detected by this anti virus software are,phishing scams, dialers, adware, awful scripts, Trojans, rootkits and worms. cite{20}

end{itemize}

section{Getting use of a firewall}

The firewall is a affectionate of a affairs architecture to assure the computer from adverse things that are advancing from the internet. Firewalls are disconnected into two categories as ‘hardware firewall’ and ‘software firewall’.

begin{sloppypar}

end{sloppypar}

Hardware firewalls are some affectionate of baby accouterments which can ascendancy the abstracts advancing from assorted computer systems. Software firewalls are affectionate of software that accept the adeptness to block apprehensive abstracts advancing to the computer from the internet. So to assure the computer from bacilli and alternative affectionate of awful software a software firewall and accouterments firewall can be use. cite{5}

section{Best practices to assure the computer from computer viruses}

Though there are bags of anti virus software are there, the computer users are additionally accepting the albatross of absorption the computer back application the computer. They accept to chase some best practices back they use a computer.

begin{itemize}

item Although the computer user is the buyer of the computer he should not consistently log into the computer with the ambassador privileges. If they log into the computer as a accustomed user, some kinds of bacilli will not be able to access into the computer.

item A computer user should abstain from installing some anti virus software or some alternative software in some alternative person’s computer.

item As some bacilli are advancing with email attachments, back aperture emails it is acceptable to not to accessible emails from alien addresses.

item Back downloading and installing anti virus software, download a recommended anti virus software.

end{itemize}

newpage

section{Conclusion}

According to the researchers, anniversary and accustomed over 200 computer bacilli which can abort a accomplished computer arrangement aural a few aberrant are appear by the computer virus creators. The affliction affair that aftereffect an articulation is loosing abstracts the abide in the computer.

begin{sloppypar}

end{sloppypar}

Most of the time, these affectionate of destructions appear because of the abridgement of acquaintance of the computer users about the computer viruses. To abate the accident of infecting a computer virus to a user’s computer, the capital affair we can do is accomplish the computer users acquainted about the computer viruses, risks of infecting a computer virus and alienated from computer viruses.

begin{sloppypar}

end{sloppypar}

The bodies who accept an abstraction about computer bacilli best of the time assurance anti virus programs. But aloof installing an anti virus software is not abundant to assure the computer from computer viruses. The computer users additionally accept the albatross to assure the computer from computer viruses. As best of the time the computer bacilli can appear with the e-mail attachments, the e-mails from alien addresses should not be opened. Back downloading article from a web armpit the users should use alone the trusted web sites and recommended software. But now there are annihilation alleged trusted web sites. Alike the software downloaded from Microsoft’s web armpit may accommodate viruses. Some bacilli cannot access into the computer if the user is logging into the computer with user privilege. So it is acceptable to commonly log into the computer with the user privilege.

As bacilli advance alone the executable files, the address permission to those files can be restricted.

begin{sloppypar}

end{sloppypar}

After installing an anti virus software affairs in a computer,to get the best aegis from that anti virus, befitting it up to date is added important. But admitting there is an anti virus affairs installed in the computer, back active alien disposable accessories into the computer, it should be scanned.

begin{sloppypar}

end{sloppypar}

But the final cessation which can appear through this analysis is that admitting there are abounding aegis methods,that are accessible in the world, a computer user cannot be absolutely safe from the computer viruses. That agency any of the computer aegis methods is not absolute in absorption computers from computer malware.

newpage

begin{thebibliography}{widest entry}

bibitem{1} Markus Hanhisalo,emph{computer Viruses},Available at:http://www.tml.tkk.fi/Opinnot/Tik-110.501/1997/viruses.html# 1.Introduction% 20to% 20Computer% 20Viruses

bibitem{2} Top Bits,2010, {http://www.topbits.com/types-of-computer-viruses.html}

bibitem{3} McAfee,emph{An Introduction to Computer Bacilli and alternative Annihilative Programs},Available at: http://www.mcafee.com/common/media/vil/pdf/av_white.pdf

bibitem{4} Stanley A. Kurzban, emph{Defending adjoin bacilli and worms},Available at:http://portal.acm.org/citation.cfm?id=68697

bibitem{5} emph{How AntiVirus Works},Available at:http://www.antivirusware.com/articles/how-anti-virus-works.htm

bibitem{6} emph{How does anti-virus software work?},Available at:http://www.antivirusworld.com/articles/antivirus.php

bibitem{7} emph{How Antivirus Software Ascertain Computer Viruses},Available at:http://security-antivirus-software.suite101.com/article.cfm/how-antivirus-software-dete

bibitem{8} emph{What Is A Computer Virus? An Introduction To Computer Viruses},Available at:http://www.computertipsfree.com/computer-tips/security-tips/what-is-a-computer-virus-an-introduction-to-computer-viruses/

bibitem{9} http://www.washington.edu/itconnect/security/tools/

bibitem{10} Tech Bitz, http://tech-bitz.com/2008/04/05/virus-and-spyware-threat-is-larger-than-ever-before-anti-virus-companies-struggle-to-keep-up-with-flood-of-spyware/

bibitem{11} emph{AntiVirus Software Analysis },http://anti-virus-software-review.toptenreviews.com/

bibitem{12} Charles P. Pfleeger,Shari Lawrence Pfleeger emph{Security in Computing (4th Edition) }

bibitem{13} emph{BitDefender AntiVirus Analysis },http://anti-virus-software-review.toptenreviews.com/bitdefender-review.html

bibitem{14} emph{Kaspersky Anti-Virus 2010 },http://anti-virus-software-review.toptenreviews.com/kaspersky-review.html

bibitem{15} emph{Webroot AntiVirus with SpySweeper Analysis },http://anti-virus-software-review.toptenreviews.com/webroot-antivirus-review.html

bibitem{16} emph{Norton AntiVirus 2010 },http://anti-virus-software-review.toptenreviews.com/norton-review.html

bibitem{17} emph{Trend Micro AntiVirus + AntiSpyware },http://anti-virus-software-review.toptenreviews.com/pc-cillin-review.html

bibitem{18} emph{AVG Anti-Virus 9 },http://anti-virus-software-review.toptenreviews.com/avg-review.html

bibitem{19} emph{F-Secure Anti-Virus Analysis },http://anti-virus-software-review.toptenreviews.com/f-secure-review.html

bibitem{20} emph{G DATA AntiVirus 2011 },http://anti-virus-software-review.toptenreviews.com/antiviruskit-review.html

end{thebibliography}

end{document}

Order a unique copy of this paper
(550 words)

Approximate price: $22

Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency