0% found this document useful (0 votes)
9 views3 pages

Chapter 5

Chapter 5 discusses computer hazards and security, focusing on the risks posed by computer viruses and the importance of safeguarding data. It outlines various types of computer viruses, including data file, boot sector, parasitic, multi-partite, and script viruses, and emphasizes the need for effective computer security measures. These measures include disaster recovery plans, application safeguards, intrusion detection systems, firewalls, passwords, backups, encryption, and anti-viral tactics.

Uploaded by

keyrukey3600
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views3 pages

Chapter 5

Chapter 5 discusses computer hazards and security, focusing on the risks posed by computer viruses and the importance of safeguarding data. It outlines various types of computer viruses, including data file, boot sector, parasitic, multi-partite, and script viruses, and emphasizes the need for effective computer security measures. These measures include disaster recovery plans, application safeguards, intrusion detection systems, firewalls, passwords, backups, encryption, and anti-viral tactics.

Uploaded by

keyrukey3600
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Chapter 5

Computer Hazard and Security


5.1 Computer Hazard
Computers and the information they contain are often considered confidential systems because
their use is typically restricted to a limited number of users. This confidentiality can be
compromised in a variety of ways. Factually, these data or information inside the computer may
be affected by different hazards. For example, people who spread computer viruses and worms
can harm computers and computer data. So taking care of the data and information in the computer
and the computer itself is very essential, this idea tends to security.
What is computer virus?
o Computer virus is a self- replicating (copying) computer program that interferes with
computer's HW or OS & duplicates itself without the user's knowledge. It may damage corrupt,
or destroy data or degrade system performance. Once the infected program is executed, the
computer viruses like biological viruses destabilize the normal flags of the OS.
o Like any other computer program a virus must be executed to function, that is, it must be
loaded from the computer’s memory and the virus's instructions must then Identify each letter
or number, symbol etc. in the form of two states/digital signals, either a HIGH voltage state
“ON/TRUE”, or a LOW voltage state “OFF/FALSE”.

5.2 Types of Computer Viruses


There are different types of viruses. Some of these are:-
1. Data File Viruses
2. Bootstrap-sector viruses
3. Parasitic or file viruses
4. Multi-partite viruses
5. Script viruses
1. Data File Viruses
Viruses infect programs that contain powerful macro language (programming language
that let the user create new features & utilities). These files are called data file viruses or
macro viruses. This virus spread infected files, which allows use of macro Languages
2. Boot Sector Viruses
These viruses infect the boot sector of a hard disk or floppy. They reside on the boot sector
& replace either the program that store information about the disk's contents or the program
that start the computer. An attempt to boot from a diskette infected with active in memory.
These types of viruses will place a copy of itself on to master boot record;
3. Parasitic or file viruses
These viruses infect executable files or programs in the computer. These files are often
identified by the extension .exe in the name of the computer file. File viruses leave the
contents of the host program unchanged but attach to the host in such a way that the virus
code is run first. These viruses can be either direct-action or resident. A direct-action virus
selects one or more programs to infect each time it is executed. A resident virus hides in
the computer's memory and infects a particular program when that program is executed.
4. Multi-partite viruses
These viruses combine the abilities of the parasitic and the bootstrap-sector viruses, and so
are able to infect either files or boot sectors. These types of viruses can spread if a computer
user boots from an infected diskette or accesses infected files.
5. Script viruses
These viruses are written in script programming languages, such as VBScript (Visual Basic
Script) and JavaScript. These script languages can be seen as a special kind of macro
language and are even more powerful because most are closely related to the operating
system environment. The "ILOVEYOU" virus, which appeared in 2000 and infected an
estimated 1 in 5 personal computers, is a famous example of a script virus.
5.3 Computer Security
Computer security is a technical developed to protect single computers and Network- Lined
computer system from accidental or intentional harm including destruction of computer
hue & sue. One of the causes of disaster on a computer system is computer virus. There
are different types of security methods. Some of which are as follows:-

Page 2
I. Disaster Recovery Plans: It is Periodical testing and upgrading of the contents of
the computer. It helps to safe guard documents from sudden damage.
II. Application Safeguards: Protecting the computer itself and the document within
the system from internal and external damage.

III. Intrusion Selection Systems: it is a Security software called intrusion detection


systems may be used in computers to detect unusual and suspicious activity and, in
some cases, stop a variety of harmful actions by authorized or unauthorized
persons. Abuse and misuse of sensitive system and application programs and data
such as password, inventory, financial, engineering, and personnel files can be
detected by these systems

IV. Firewalls: Software placed between the networked computers and protects the
networked computers. The firewall examines, filters, and reports on all information
passing through the network to ensure its appropriateness.

V. Passwords: are confidential sequences of characters that allow approved persons


to make use of specified computers, software, or information.

VI. Backup: Storing backup copies of software and data and having backup computer
and communication capabilities are important basic safeguards because the data
can then be restored if it was altered or destroyed by a computer crime or accident.

VII. Encryption: a process of converting messages or data into a form that cannot be
read without decrypting or deciphering it. The root of the word encryption—
crypt—comes from the Greek word kryptos, meaning “hidden” or “secret.”

VIII. Anti-viral Tactics


A. Preparation and Prevention
B. Virus Detection
C. Containment and Recovery

Page 3

You might also like