Regarding the prevention and control of computer viruses, I bring you a paper on the prevention and control of computer viruses, so let's share it w
Regarding the prevention and control of computer viruses, I bring you a paper on the prevention and control of computer viruses, so let's share it with you.
Paper Keywords: network virus prevention
Abstract: Computer virus infections and attacks occur frequently all over the world, which seriously interfere with the normal social life of human beings and bring great potential threats and destruction to computer networks and systems. This paper introduces the characteristics and prevention of computer virus.
Computer virus infections and attacks occur frequently in countries all over the world, which bring great potential threats and damages to computer networks and systems. At the same time, with the rapid development of the Internet, * * * has become the most commonly used tool for people to communicate with each other, so it has also become an important carrier of * * * virus. In recent years, there have been many extremely harmful mail viruses, so the prevention of computer viruses will be paid more and more attention by countries all over the world.
1, the characteristics of computer viruses
Computer virus is a set of programs or instructions, which can lurk in computer storage media or programs in some way and be activated when certain conditions are met, thus destroying computer resources. Computer viruses in a broad sense also include logic bombs, Trojan horses and system traps. Although computer virus is a small program, it is different from ordinary computer programs and has the following characteristics: ** 1*** Programmed computer virus * * * Like other legal programs, executable computer virus is an executable program, but it is not a complete program, but parasitic on other executable programs, so it enjoys the rights that can be obtained through cutting programs. ***2*** The infectivity of computer viruses: infectivity is the basic feature of viruses, and computer viruses will spread from infected computers to uninfected computers through various channels. Once the virus code enters the computer and is executed, it will search other programs or storage media that meet its infection conditions, and insert its own code into it after determining the target to achieve the purpose of self-replication. * * * 3 * * Latency of computer virus: A well-designed computer virus program will not attack immediately after entering the system, but can be hidden in legal files for weeks or months or even years. Infect other systems without being discovered. ***4*** Triggerability of computer virus: the characteristic that the virus induces the virus to carry out infection or attack because of the appearance of a certain event or value. * * * 5 * * After the destructive system of computer virus is infected by the virus, the virus usually does not attack immediately, but hides in the system, and will attack only when conditions are ripe, causing serious damage to the system. ***6*** Attack initiative: The virus actively attacks the system. No matter how strict protection measures are taken by computer system, it is impossible to completely eliminate the virus attack on the system. Protection measures are at best a preventive measure. ***7*** Targeted computer viruses target specific computers and specific operating systems. For example, some are aimed at IBM PC and its compatible computers, some are aimed at Apple Macintosh, and some are aimed at UNIX operating system. For example, globule virus is aimed at IBMPC and DOS operating systems on its compatible computers.
2 computer virus prevention measures
The main hardware and software entities in computer network are servers and workstations, so it is important to consider these two parts first to prevent computer network viruses, and it is also important to strengthen comprehensive management.
* * *1* * Control technology based on workstation. There are three ways to prevent and control the virus in the workstation: one is software prevention, that is, using anti-virus software to detect the virus infection in the workstation regularly and irregularly. Software prevention and control can continuously improve the ability of prevention and control, but it is necessary to manually start the floppy disk antivirus software frequently, which not only increases the burden on the staff, but also is likely to be detected after the virus breaks out. The second is to insert an anti-virus card into the workstation. Anti-virus card can achieve the purpose of real-time detection, but it is inconvenient to upgrade the anti-virus card, which has a certain impact on the execution speed of the workstation from the practical application effect. Third, install an antivirus chip on the network card. It combines workstation access control with virus protection, which can effectively protect workstations and bridges to servers in real time. However, this method also has the problem that it is inconvenient to upgrade the software version on the chip; But also has a certain influence on the transmission speed of the network.
***2*** Server-based defense technology. Network server is the center of computer network and the backbone of the network. An important sign of network paralysis is network server paralysis. Network server-once it is destroyed, the loss caused is catastrophic, irreversible and incalculable. At present, server-based virus prevention methods mostly use anti-virus loadable module ***NLM*** to provide real-time virus scanning capability. Sometimes anti-virus cards and other technologies are combined to protect the server from virus attacks, thus cutting off the further spread of the virus.
* * * 3 * * Strengthen computer network management. The prevention and control of computer network virus can not be effectively eliminated and prevented only by technical means. Only by closely combining technical means with management mechanism and raising people's awareness of prevention can we fundamentally guarantee the safe implementation of the network system. At present, in terms of network virus prevention and control technology, it is basically in a passive defensive position, but it should be active in management. We should formulate strict rules and regulations from the use, maintenance, management and service of hardware equipment and software systems, strengthen legal education and professional ethics education for network system administrators and users, standardize working procedures and operating rules, adopt effective new technologies and means as far as possible to severely punish collectives and individuals engaged in illegal activities, and establish the best network virus security model of "combining prevention with killing, focusing on prevention, combining software and hardware, and treating both the symptoms and root causes".
3. The development trend of network virus prevention.
Computer viruses are becoming more and more difficult to distinguish in form, and the harm caused is becoming more and more serious, which requires network antivirus products to be more advanced in technology and more comprehensive in function. Judging from the current evolution trend of viruses, the development trend of network anti-virus products is mainly reflected in the following aspects: the combination of anti-hacking and anti-virus; Intercept viruses from * * * *; Provide comprehensive solutions; Customized mode; Anti-virus product technology has changed from regionalization to internationalization. ?