With the development of the information age and the wide application of computers in social life, computer viruses have emerged, which have brought potential threats
With the development of the information age and the wide application of computers in social life, computer viruses have emerged, which have brought potential threats and great damage to computer systems. The following is what I arranged for you for your reference.
Fan: Research on Network Security and Computer Virus Prevention and Control
With the rapid development of computer Internet technology in China and the wide application of global network technology, it is more convenient for people to transmit e-mails and express documents, and people are using it more and more on the Internet. Accordingly, with the rapid development of the Internet, computer network security and computer viruses have also developed. In the Internet environment, the main mode of computer virus transmission is exponential mode, and its transmission speed is also very fast. If the computer virus invades the computer network system, it will cause serious consequences and even cause the whole computer software system to be paralyzed because of its great destructive power. This paper focuses on the computer network security and computer virus prevention measures.
Keywords: computer network security; Computer virus; counter-measure
Generally speaking, computer security includes the security of software and hardware, as well as the security of computer data and computer execution. Therefore, computer security is of great significance to the storage management and security protection of related data. At the same time, due to the threat of computer viruses, it also has a serious impact on the security of computer systems. Therefore, it is necessary for relevant computer technicians to constantly study computer network security and computer virus prevention measures.
1 computer network security and computer virus problems
The problems existing in computer network security and computer virus mainly include the following points:
1. 1 natural disasters
At present, most computer information systems are easily influenced by natural environment, including humidity, temperature, shock, vibration and many other factors. However, many computer rooms often ignore the work of earthquake prevention, fire prevention and electromagnetic leakage prevention, and the grounding system is not considered well, so the ability to resist natural disasters needs to be strengthened.
1.2 software vulnerability
Hackers often take the vulnerability of network software as the best utilization condition when attacking computers. In addition, there is the "back door" problem of software, which is set by software designers and programmers for their own convenience. Usually. It is difficult for outsiders to know that once the "back door" is opened, its consequences and losses are immeasurable.
1.3 Attacks and threats by hackers
In the current computer network, hacker attacks occur frequently and become increasingly fierce, which has become a stage for various attackers with certain technical and economic conditions. In most cases, hackers appear, not because hackers have the ability to invade at will, but because they are good at discovering and exploiting vulnerabilities. Information network has defects and imperfections, which is an excellent way for hackers or viruses to attack. The fragility of information network has caused many loopholes and security problems in the information society, which poses a great threat to people and society.
1.4 computer virus
Computer virus is usually a kind of artificially compiled program code, which destroys computer performance and data and can replicate itself. It is fast-infected, destructive and complicated in transmission form, and it is difficult to completely eliminate it. It can easily destroy hard disks, optical drives, motherboards and so on. It is the number one enemy of network security today. Once the virus spreads on the network, it will cause the network to be paralyzed and unable to operate normally. Therefore, it is particularly important to strengthen the awareness of network security.
2 computer network security and computer virus prevention measures
2. 1 encryption technology
Data encryption refers to encrypting the original plaintext or data according to a certain algorithm, and encrypting the storage and transmission work. Only users of relevant information can use the decrypted relevant data, which is also an effective guarantee to realize data confidentiality. Generally speaking, there are two encryption algorithms, one is symmetric encryption algorithm and the other is asymmetric encryption algorithm. Symmetric encryption algorithm mainly uses the same key for decryption, while asymmetric encryption algorithm uses different keys. Relatively speaking, asymmetric encryption method is more widely used.
2.2 firewall technology
Firewall technology is widely used, mainly for network access control and blocking? A href ='' target =' _ blank'> Cough? Hey? Read the Oracle? Lip test? Inclined; ぁぁ ぁ ぁ ぁ ぁ ぁ ぁ ぁ ぁ ぁ ぁ ぁ ぁ? A gift? What's your opinion? What's your opinion? Leftovers? Are you kidding? Are you kidding? This is an href ='' target =' _ blank'> If successful, the packet is allowed to pass; If it is unsuccessful, the packet will be discarded. At present, the most common firewall in the market is the state detection firewall. Generally, a firewall can only block the outside, but has no effect on the internal network.
2.3 Physical Isolation Gateway
The main function of physical isolation gateway is to protect the security of information, and its working principle is to control the solid-state switch with various control functions, so as to ensure that the relatively independent host system has certain reading and writing analysis. However, there is no physical and logical connection between the main system and the connected system, and there is no basis for forwarding data packets. So physically speaking, the physical isolation network can effectively prevent hackers.
2.4 anti-virus technology
Computer viruses are usually characterized by strong reproduction, strong attack concealment, long latency, diverse transmission modes and great destructive power. Its injection technology can be divided into radio mode, backdoor attack mode, curing mode and data control connection mode. Almost all computer viruses are man-made, which also causes great harm to the system itself and information storage. There are generally three kinds of network virus technologies. One is virus prevention technology, which uses the inherent resident system memory to gain control of the system first, judge whether the virus exists or not, and do a good job in preventing the spread of the virus. The second is virus detection technology, which judges whether the system is infected with virus by detecting the characteristics of files and viruses;
3 Conclusion
To sum up, with the rapid development of computer network technology in China, the problem of information network security and network virus in China is becoming increasingly serious at this stage. Accordingly, data security has also developed to a more important stage, and data security technology has become the key content of modern network information technology research. At present, the main technologies used in China's network security technology are intrusion detection technology, firewall technology and network virus technology. Accordingly, network security not only needs technical upgrading, but also needs to strengthen the construction of social laws and regulations, strengthen information security awareness, vigorously carry out publicity and education, and reduce security risks as much as possible.
Fan: Thoughts on computer virus protection.
Information is the carrier of modern human civilization. With the development of information technology, human activities in modern society are increasingly inseparable from information, and the emergence of computer technology has ushered in a new era of information age. However, many security risks have also aroused widespread concern, especially computer viruses, which greatly threaten information security and cause great damage to computer systems and network communications. This paper mainly analyzes the characteristics of common viruses in computer systems and network applications, and discusses them in detail from the aspects of classification and harm, so as to put forward some effective virus protection measures to promote the establishment of computer security system.
Keywords: computer virus; Security; protect
1 computer virus
A virus refers to "a set of computer instructions or program codes compiled or inserted into a computer program, which destroys computer functions or data, affects the use of the computer, and can replicate itself". Computer viruses often destroy computer systems and computer networks, making them unusable and even destroying hardware systems. Computer viruses, like biological viruses, are reproducible and destructive, and once infected, they often cannot be completely eradicated.
1. 1 characteristics of computer viruses
Computer viruses are usually attached to various files, which can spread rapidly in computer systems and computer networks and are difficult to eradicate. When an infected file is copied or transmitted, the virus spreads with it. The layout and independence of viruses are often hidden in the execution process, which is latent, contagious and destructive. Once infected, the execution speed of computer equipment will slow down, but in severe cases, hardware equipment will be paralyzed, data will be destroyed and lost, causing huge losses to users.
1.2 virus destruction process
There are four main stages in the destruction process of computer virus to computer system: one is latent. At this stage, the virus is always dormant and needs to pass certain conditions before it can be enabled. This situation is usually that the time, program, file or disk capacity exceeds a certain range. Not all viruses have an incubation period. The second is reproduction. At this stage, the virus will prevent itself from replicating itself in a specific system area or program, and the infected program will contain a copy of the virus. Then it was triggered. At this stage, the virus will be enabled through a system event, so as to realize its function, and the trigger event is often different according to different viruses, and the excitation function may also include the number of virus copies. Finally, execution. At this stage, the virus finally realizes its function, which may be harmless or extremely destructive.
1.3 computer virus types
There are many kinds of computer viruses. At present, the common types are parasitic virus, invisible virus and polymorphic virus. Parasitic virus is the most common form of traditional virus. It is mainly attached to executable files. When the program is executed, this virus will need to infect other files urgently, so it can be executed repeatedly. Storage viruses mainly reside in main memory, thus infecting all executing programs. Boot zone virus mainly infects boot records and spreads in the system. Invisible virus is a kind of virus specially designed for antivirus software, which can hide itself when antivirus software detects the virus. Polymorphic virus is a virus that will change after being infected. If the virus is detected by detecting its "signature", it cannot be detected.
1.4 transmission path
There are many ways to spread computer viruses. Here are some common ways to spread computer viruses. The first is the mobile storage device. Mobile storage devices not only bring convenience to people, but also facilitate the spread of viruses. Common mobile storage devices include mobile hard disk, USB flash drive and CD-ROM drive. These media are frequently used, highly mobile and widely used. Once the mobile storage device is infected with virus, it will not only destroy the original file of the device, but also damage the hardware of the device. Once the mobile storage device is connected to other computers, it will spread the virus and accelerate the spread of the virus. The second is network communication. Nowadays, more and more computer terminals are connected to the Internet, and the Internet has been recognized by the public for its convenient information transmission advantages. However, the information and resources spread on the Internet are not completely safe. The virus contained in it caused great harm. Common network communication methods include instant messaging software, web pages and e-mail. Computer viruses will attach to normal files and spread in the network through the above-mentioned methods, and their spread speed is the fastest and most influential among several modes of transmission at present. System vulnerabilities and software vulnerabilities are another way for viruses to spread. In recent years, criminals have attacked computer systems through system vulnerabilities, which has become another way for viruses to spread. In addition, stationary hardware devices in computers can also spread viruses. Although there are few kinds of viruses that can spread in this way, their destructive power is unparalleled, and there is no detection method to deal with this virus at present. Wireless channels and point-to-point communication systems are also ways for viruses to spread. Because data and information are weakly encrypted in wireless network transmission or some of them are not encrypted at all, this kind of information is very easy to be stolen and modified, so there are great security loopholes. With the development of wireless network technology and the popularization of wireless network applications, a large number of viruses against wireless terminals emerge one after another, and wireless communication networks have become another "hotbed" of viruses.
2 protective measures
Prevention is the most effective way to reduce and eliminate virus threats, and fundamentally put an end to virus intrusion into the system. Thereby weakening the harmfulness of the virus and reducing the success rate of virus attacks. But this is only feasible in theory. In fact, this goal cannot be achieved perfectly. At present, there are three main measures to protect viruses in computer security technology, namely, detection, identification and removal. If an infected program is detected, but it cannot be identified and deleted, it can only be discarded, and users can reinstall a clean program to eliminate the virus threat. Virus defense technology is developing, so is virus technology, and their development is similar and synchronous. The earliest viruses were mainly composed of code fragments, which were relatively simple. At that time, the anti-virus software used was also relatively simple, and it was only necessary to identify and remove virus codes in sequence. However, with the continuous evolution and development of virus technology, anti-virus is becoming more and more complicated. With the development of computer technology, the common sense of computer security protection has also been popularized, and people have gradually mastered some simple and effective knowledge and skills of computer virus protection. Here is a brief discussion of several common virus prevention methods. 1 system backup. Under the condition of confirming that the computer is not infected with virus, backup the important files in the user's system so as to recover when the system crashes due to computer virus attack. In addition to the backup of the system itself, user data should also be backed up in time. Install anti-virus programs, update virus signature database in time and scan regularly. At the same time, it is necessary to upgrade the computer virus signature database in time. At present, it can be upgraded online in time through the Internet. 3 Install the firewall. Install a newer official firewall and upgrade it in time. At the same time, install patches for the operating system in time to prevent programs from invading the operating system. Computer virus killing software is often used to kill computer viruses in the system. 4 Close the system restore. Right-click My Computer-Properties-System Restore-Select Turn off System Restore on all drives. 5 Pay attention to stay away from malicious websites or unhealthy websites. When surfing the Internet, you must turn on the real-time monitoring function of anti-virus software, especially "webpage monitoring" to avoid being invaded by viruses. 6 Don't open emails of unknown origin. Mail is one of the fastest and most influential ways to get infected with virus. If you find an email of unknown origin in the mailbox, don't open it easily.
3 Conclusion
The development of computer technology and the popularization and application of computer network technology have greatly promoted the development of human civilization, and the economic and cultural order established on this basis has also been branded with information civilization. However, technology brings convenience to people, but it also brings many challenges. Security has always been an urgent problem in computer technology and network application technology. Among them, computer virus from outside the network is the primary problem facing the development of modern information technology. How to apply reasonable and effective protective measures to maximize computer security at the least cost is the focus of computer security technology research and development at present. The research on computer virus and its prevention can make people have a correct understanding of computer virus attacks, so as to effectively prevent them, ensure the safety of computer systems and computer networks, give full play to the positive role of computer technology and computer networks, and make them better serve the development of human civilization.
refer to
[1] Wu Gongyi. Computer network [M]. Tsinghua University Publishing House, 20 125.
[2] Yan. Prevention of Computer Virus [J]. Information and Computer, 20 105.
[3] Zhang. Talking about computer virus prevention [J]. Computer knowledge and technology, 20 109.