Current location - Education and Training Encyclopedia - Graduation thesis - Computer virus prevention test paper analysis?

2 1 century, with the advent of the information technology era, computer society has been widely used in various industries and fields. Therefore,

Computer virus prevention test paper analysis?

2 1 century, with the advent of the information technology era, computer society has been widely used in various industries and fields. Therefore,

Computer virus prevention test paper analysis?

2 1 century, with the advent of the information technology era, computer society has been widely used in various industries and fields. Therefore, discussing computer maintenance and virus prevention is of great significance to people's life and work. The following is what I have carefully prepared for you: Analysis of papers related to computer virus prevention and control. The content is for reference only, welcome to read!

The full text of Computer Virus Prevention is as follows:

The construction and development of the global information network has brought great impetus and impact to the science, technology, economy, culture and military affairs of the whole society, and also brought more challenges to the safe implementation of the network. It is a contradiction to enjoy resources and information security. It is generally believed that the safe execution of computer network system comes from the attack of computer virus. Therefore, it is of great practical significance to study computer virus and its prevention. This paper will analyze and discuss the research background, definition, characteristics, types and prevention of computer viruses.

Keywords: computer virus prevention measures

introduce

Computer network is the foundation of information society, and it has entered every corner of society. Economy, culture and military affairs are increasingly dependent on computer networks. However, while computers bring great convenience to people, they also bring problems that cannot be ignored. Computer virus has brought great challenges to the safe implementation of network system. On June 25th, 2003, the sudden "King Worm" virus caused a terrorist attack similar to "9. 1 1" in the Internet world, and the Internet in many countries was also seriously affected. Similarly, the "panda burning incense" virus made by Li Jun several years ago once again sounded the alarm for computer network security. According to the report of American computer authority organization, the total number of computer viruses found in the world exceeds 60,000, and the number of new viruses appearing every day exceeds 100. At the same time, in 2000, the global economic losses caused by computer viruses were as high as 1.6 trillion dollars. Therefore, the research on computer virus and its prevention is imminent and of great significance.

1 the meaning of computer virus

At present, there are various definitions of computer virus at home and abroad, but in the Regulations on the Security Protection of Computer Systems in People's Republic of China (PRC), the virus is defined as "a set of computer instructions or program codes compiled or inserted in a computer program, which destroys computer functions or data, affects the use of the computer and can replicate itself". Therefore, bombs, worms, pandas burning incense and so on can all be called computer viruses.

1. 1 characteristics of computer viruses

Computer virus is a special program. In addition to being stored and executed like other programs, computer viruses also have the characteristics of infectivity, latency, triggering and destructive derivation. The following is a brief introduction to the characteristics of computer viruses:

1 infectivity. The infectivity of computer virus, also known as parasitism, refers to the characteristics that computer virus programs are embedded in host programs and depend on their execution. The infectivity of computer virus is the basic attribute of computer virus and the main basis for judging whether a program is a virus program.

2 concealment. Concealment is one of the basic characteristics of computer viruses. Judging from the location of computer viruses, different viruses are hidden in different locations, some in sectors, and some appear in the form of hidden files, which makes people hard to prevent.

3 incubation period. Latency of computer virus means that it has the ability to attach to other media and be parasitic. By modifying other programs, it embeds its own copy into the boot area of other programs or disks or even the main boot area of hard disks for parasitism.

4 Triggerability. Generally, computer viruses have a trigger condition: or trigger their infection, that is, under certain conditions, enable the virus's infection mechanism to infect them; Or trigger its attack, that is, under certain conditions, make the performance of the virus attack and destroy this part.

5 derivative. Derivation of computer virus means that the manufacturer of computer virus modifies the known virus program according to personal subjective wishes, and derives another or more virus programs different from the source virus program from the same virus, that is, variants of the source virus program. This may be one of the reasons for the variety and complexity of viruses.

6 destructive. The destructiveness of computer viruses depends on the purpose and level of computer virus makers, which can directly destroy computer data and information, seize system resources, affect the execution speed of computers and cause damage to computer hardware. It is precisely because of the terrible destructiveness of computer viruses that computer viruses are so horrible.

1.2 kinds of computer viruses

For the types of computer viruses, different categories have different types of definitions. The following briefly introduces the classification of several computer viruses:

1 boot zone virus. Boot zone virus is hidden in the boot zone of hard disk or floppy disk. When the computer starts from the hard disk or floppy disk infected with the boot zone virus, or when the computer reads data from the floppy disk infected with the boot zone virus, the boot zone virus begins to attack.

File virus. File viruses are parasitic in other files, and they often hide themselves by encoding and encrypting viruses or using other technologies.

3 instruction code virus. Script virus relies on a special scripting language to play its role, and it also needs host software or application environment to correctly identify and translate nested commands in this scripting language.

4 "Trojan Horse" plan. Trojan horse is a popular virus file at present. Unlike ordinary viruses, it does not replicate itself, nor does it "intentionally" infect other files. By disguising itself, it attracts users to download and execute it, which provides Trojan horse breeders with the entrance to open the seed computer, so that horse breeders can destroy and steal the seed files at will, and even remotely control the seed computer. Trojan horse is somewhat similar to the remote control software often used in computer networks, but it is usually not hidden because the remote control software is controlled in good faith. Trojan horse aims at "stealing" the remote control, which is not very concealed and is "worthless". A complete Trojan horse program consists of two parts: server and controller. What is implanted in the seed computer is the "server" part. The so-called "hacker" is to use the "controller" to enter the computer running the "server". After running the "server" of the Trojan horse program, one or several ports of the victim's computer will be opened, and hackers can use these opened ports to enter the computer system, and the security and personal privacy will be completely unprotected.

With the development of virus writing technology, Trojan horse programs are more and more threatening to users, especially some Trojan horse programs use extremely cunning means to hide themselves, which is difficult for ordinary users to find after poisoning.

2 the development trend of computer viruses

Traditional computer virus refers to a virus that spreads through the Internet. But now the computer virus in the internet age is not such a simple concept, it has been dissolved into more things. Today's computer virus refers to the sum of all programs that generate security for computer security based on the network.

1 "Spy" Trojan virus appears. If the traditional Trojan virus is a liar, then the current Trojan virus is more like a living spy. The current "spy" Trojan virus generally refers to a virus program that uses system vulnerabilities to enter the user's computer system, automatically starts by modifying the login file, and is deliberately not found during execution, exposing all information in the user's computer system to the network.

Worms that can improve themselves appear. Today's worms not only make use of network defects, but also make more use of some new deception techniques. For example, the "password" virus uses people's curiosity to induce users to actively execute the virus, and so on.

Hacking program. With the development of network and the improvement of people's security requirements, it is necessary to re-examine hacker programs. Hacking programs are generally aggressive, and will take advantage of vulnerabilities to remotely control computers, and even directly destroy computers. Hacker programs will be combined with Trojan horse programs, which will pose a threat to computer security, so hacker programs are also computer viruses.

In a word, the current computer viruses all show complex characteristics such as concealment and deception, which make people destroy computer systems without being alert.

3 computer virus prevention measures

3. 1 Prevention of Guided Virus

Bootable viruses usually gain control and occupy memory first when starting the computer. In general, as long as you don't use a floppy disk or just start the system with a "clean" floppy disk, you won't be infected with the boot virus. If the floppy disk is protected from illegal writing, it can be well prevented from being infected with the startup virus. However, in order to protect the safety of the hard disk, in addition to paying attention to the operation, only floppy disks can be used to protect the hard disk.

3.2 Prevention of Archival Virus

The prevention method of file virus is to add the functions of self-checking and virus removal in the source program. This method can make the executable file have anti-virus ability from its lifelong achievement, thus ensuring the cleanliness of the executable file. The self-checking and cleaning function is integrated with other files of executable files, which will not conflict with other functions of the program, and also make it impossible for virus makers to create targeted viruses. Executable files cannot be infected with viruses, and file viruses cannot spread.

3.3 Personalized preventive measures

Computer virus infection is always universal or epidemic, so that the scope of computer virus can be as wide as possible, so sometimes some personalized treatment may have a very good effect on computer virus prevention or immunity. For example: rename or expand some system files; Encrypt some files or even subdirectories. So computer viruses can't search these system files.

3.4 Strengthen the professional ethics education of employees in IT industry

With regard to the prevention and control of computer viruses, besides maintaining and preventing them from the technical level, it is also extremely important to strengthen the professional ethics education of computer practitioners. Computer practitioners refer to the "elites" in the IT industry, who can create computer viruses. If they have high professional ethics, they will not pose a threat to network security and will not make computer users all over the world nervous. On the contrary, it can make a positive and great contribution to mankind in the computer field.

3.5 Improve computer virus prevention laws and regulations.

While strengthening the moral education for high IQ employees in the computer industry, we should also improve the relevant laws and regulations on computer virus prevention and give full play to the binding role of laws and regulations. At present, China has formulated the Regulations on the Security Protection of Computer Information Systems in People's Republic of China (PRC), the Measures for the Administration of Inspection and Sales License of Special Products for Computer Information Systems and other relevant laws and regulations. In addition, the Criminal Law of People's Republic of China (PRC) also stipulates and punishes acts that endanger network security.

3.6 Strengthen international exchanges and cooperation

Under the macro-vision of economic globalization, the world of computer networks has long been integrated, and transnational computer virus attacks have also appeared. Therefore, it is urgent for all countries in the world to strengthen exchanges and cooperation in order to maintain the safe implementation of computer networks and combat computer virus crimes.

4 conclusion

With the continuous development of computer network technology, computers bring more convenience to human economic, cultural, military and social activities, but also bring considerable security challenges. Modern information network faces various security threats, including attacks from outside the network, such as network hackers and computer viruses. Therefore, reasonable and effective prevention is the most effective, economical and labor-saving problem to prevent and control computer viruses, and it is also the most noteworthy problem. Studying computer virus and its prevention will help us to correctly understand, perceive and prevent computer virus attacks, thus protecting computer network security, making computer network really play its positive role and promoting the healthy development of human economic, cultural, military and social activities.

refer to

Zhuo Xinjian, Zheng Kangfeng, Xin Yang. Principle and prevention of computer virus [M]. Beijing University of Posts and Telecommunications Press, 2007,8: 2nd Edition.

[2] Hao Wenhua. Technical guide to anti-gang and anti-drug [M]. Machinery Industry Press, 2004, 1: First Edition.

[3], Tan Ran, Xiong, etc. Computer virus and its prevention and control technology [M]. Tsinghua University Publishing House, 2004,9: First Edition.

[4] Zhang, Li Gang and Hou Rectification. Computer virus and anti-virus technology [M]. Tsinghua University Publishing House, 20066.

[5] Fu Jianming, Peng, Zhang. Computer virus and confrontation [M]. Wuhan University Press, 2004.

Wu Wanzhao, Wu Wanduo. Computer virus analysis and prevention [M]. College Press, 1993, 10.