Computer Virus: Their Problems & Major attacks in Real Life

J. Joshi, B. V. Patil
{"title":"Computer Virus: Their Problems & Major attacks in Real Life","authors":"J. Joshi, B. V. Patil","doi":"10.14419/JACST.V1I4.318","DOIUrl":null,"url":null,"abstract":"Today's enterprise networks are distributed to different geographical locations and applications are more centrally located, information represents the most important asset. With the growing number of data communication services, channels and available software applications, data are processed in large quantities and in a more efficient manner. This technological enhancement offers new flexible opportunities also measure security threats poses in the networks. These threats can external or Internal, external threats divided as hacking, virus attack, Trojans, worms etc. There are thousand and thousand of different viruses these days which improve every day. Although the wild spread of new and strong viruses, it still infects and spread only with user's permission. This research paper highlights the phases of computer virus, computer virus, history of worst computer attack, type of computer virus with effect on computer & few examples of virus on their types, working of computer virus, and problem occur due to virus in computers.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Advanced Computer Science and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14419/JACST.V1I4.318","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12

Abstract

Today's enterprise networks are distributed to different geographical locations and applications are more centrally located, information represents the most important asset. With the growing number of data communication services, channels and available software applications, data are processed in large quantities and in a more efficient manner. This technological enhancement offers new flexible opportunities also measure security threats poses in the networks. These threats can external or Internal, external threats divided as hacking, virus attack, Trojans, worms etc. There are thousand and thousand of different viruses these days which improve every day. Although the wild spread of new and strong viruses, it still infects and spread only with user's permission. This research paper highlights the phases of computer virus, computer virus, history of worst computer attack, type of computer virus with effect on computer & few examples of virus on their types, working of computer virus, and problem occur due to virus in computers.
计算机病毒:它们在现实生活中的问题和主要攻击
当今的企业网络分布在不同的地理位置,应用程序更加集中,信息代表着最重要的资产。随着数据通信服务、渠道和可用软件应用的不断增加,数据的处理量越来越大,效率也越来越高。这种技术增强提供了新的灵活机会,也可以衡量网络中的安全威胁。这些威胁可以是外部的或内部的,外部威胁分为黑客攻击、病毒攻击、特洛伊木马、蠕虫等。现在有成千上万种不同的病毒每天都在改进。虽然新的和强大的病毒肆意传播,它仍然感染和传播只有在用户的许可。本文重点介绍了计算机病毒的阶段,计算机病毒,最严重的计算机攻击的历史,计算机病毒对计算机的影响类型&几个病毒的例子,计算机病毒的类型,计算机病毒的工作原理,以及由于病毒在计算机中引起的问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信