Current location - Education and Training Encyclopedia - Graduation thesis - A paper on computer viruses

With the application and popularization of computers, computer technology has penetrated into all fields of society. At the same time, computer security issues are be

A paper on computer viruses

With the application and popularization of computers, computer technology has penetrated into all fields of society. At the same time, computer security issues are be

A paper on computer viruses

With the application and popularization of computers, computer technology has penetrated into all fields of society. At the same time, computer security issues are becoming more and more prominent. According to foreign statistics, computer viruses are increasing at the rate of 10 species/week, while according to the statistics of China's Ministry of Public Security, China is increasing at the rate of 4 to 6 species/month. Therefore, in order to ensure that computers can work safely, it is urgent to prevent computer viruses. Starting with the definition of computer virus, the following is what I have carefully prepared for you: Talking about papers related to computer virus. The content is for reference only, welcome to read!

The full text of the computer virus is as follows:

This paper will analyze and discuss the research background, definition, characteristics, types and prevention of computer virus.

Keywords: computer virus prevention measures

First, the meaning of computer virus

At present, there are various definitions of computer virus at home and abroad, but in the Regulations on the Security Protection of Computer Systems in People's Republic of China (PRC), the virus is defined as "a set of computer instructions or program codes compiled or inserted in a computer program, which destroys computer functions or data, affects the use of the computer and can replicate itself". Therefore, bombs, worms, pandas burning incense and so on can all be called computer viruses.

Second, the characteristics of computer viruses

① infectivity. The infectivity of computer virus, also known as parasitism, refers to the characteristics that computer virus programs are embedded in host programs and depend on their execution. The infectivity of computer virus is the basic attribute of computer virus and the main basis for judging whether a program is a virus program.

② Concealment. Concealment is one of the basic characteristics of computer viruses. Judging from the location of computer viruses, different viruses are hidden in different locations, some in sectors, and some appear in the form of hidden files, which makes people hard to prevent.

③ incubation period. Latency of computer virus means that it has the ability to attach to other media and be parasitic. By modifying other programs, it embeds its own copy into the boot area of other programs or disks or even the main boot area of hard disks for parasitism.

4 triggering. Generally, computer viruses have a trigger condition: or trigger their infection, that is, under certain conditions, enable the virus's infection mechanism to infect them; Or trigger its attack, that is, under certain conditions, make the performance of the virus attack and destroy this part.

⑤ derivative. Derivation of computer virus means that the manufacturer of computer virus modifies the known virus program according to personal subjective wishes, and derives another or more virus programs different from the source virus program from the same virus, that is, variants of the source virus program. This may be one of the reasons for the variety and complexity of viruses.

6 destructive. The destructiveness of computer viruses depends on the purpose and level of computer virus makers, which can directly destroy computer data and information, seize system resources, affect the execution speed of computers and cause damage to computer hardware. It is precisely because of the terrible destructiveness of computer viruses that computer viruses are so horrible.

Third, the types of computer viruses.

① Boot zone virus. Boot zone virus is hidden in the boot zone of hard disk or floppy disk. When the computer starts from the hard disk or floppy disk infected with the boot zone virus, or when the computer reads data from the floppy disk infected with the boot zone virus, the boot zone virus begins to attack.

② Archival virus. File viruses are parasitic in other files, and they often hide themselves by encoding and encrypting viruses or using other technologies.

③ Command code virus. Script virus relies on a special scripting language to play its role, and it also needs host software or application environment to correctly identify and translate nested commands in this scripting language.

④ Trojan horse program. Trojan horse programs know more about users' psychological state than other malicious software-the creators of such programs may spend as much time on how to execute Trojan horse programs as they do on creating Trojan horse programs.

Fourth, the development trend of computer viruses.

Traditional computer virus refers to a virus that spreads through the Internet. But now the computer virus in the internet age is not such a simple concept, it has been dissolved into more things. Today's computer virus refers to the sum of all programs that generate security for computer security based on the network.

(1) "spy" Trojan virus. If the traditional Trojan virus is a liar, then the current Trojan virus is more like a living spy. The current "spy" Trojan virus generally refers to a virus program that uses system vulnerabilities to enter the user's computer system, automatically starts by modifying the login file, and is deliberately not found during execution, exposing all information in the user's computer system to the network.

② Worms that can improve themselves appear. Today's worms not only make use of network defects, but also make more use of some new deception techniques. For example, the "password" virus uses people's curiosity to induce users to actively execute the virus, and so on.

③ Hacking program. With the development of network and the improvement of people's security requirements, it is necessary to re-examine hacker programs. Hacking programs are generally aggressive, and will take advantage of vulnerabilities to remotely control computers, and even directly destroy computers. Hacker programs will be combined with Trojan horse programs, which will pose a threat to computer security, so hacker programs are also computer viruses.

In a word, the current computer viruses all show complex characteristics such as concealment and deception, which make people destroy computer systems without being alert.

Five, computer virus prevention measures

① Guide virus prevention. Bootable viruses usually gain control and occupy memory first when starting the computer. In general, as long as you don't use a floppy disk or just start the system with a "clean" floppy disk, you won't be infected with the boot virus. If the floppy disk is protected from illegal writing, it can be well prevented from being infected with the startup virus.

② Prevention of file virus. The prevention method of file virus is to add the functions of self-checking and virus removal in the source program. This method can make the executable file have anti-virus ability from its lifelong achievement, thus ensuring the cleanliness of the executable file. The self-checking and cleaning function is integrated with other files of executable files, which will not conflict with other functions of the program, and also make it impossible for virus makers to create targeted viruses. Executable files cannot be infected with viruses, and file viruses cannot spread.

③ Individualized preventive measures. Computer virus infection is always universal or epidemic, so that the scope of computer virus can be as wide as possible, so sometimes some personalized treatment may have a very good effect on computer virus prevention or immunity.

④ Strengthen the professional ethics education of employees in IT industry. With regard to the prevention and control of computer viruses, it is extremely important to strengthen the professional ethics education of computer practitioners in addition to maintaining and preventing them from the technical level.

⑤ Improve the laws and regulations on computer virus prevention. While strengthening the moral education for high IQ employees in the computer industry, we should also improve the relevant laws and regulations on computer virus prevention and give full play to the binding role of laws and regulations.

⑥ Strengthen international exchanges and cooperation. Under the macro-vision of economic globalization, the world of computer networks has long been integrated, and transnational computer virus attacks have also appeared. To this end, countries around the world should strengthen exchanges and cooperation to maintain computer network security and combat computer virus crimes.

Conclusion of intransitive verbs

Studying computer virus and its prevention will help us to correctly understand, perceive and prevent computer virus attacks, thus protecting computer network security, making computer network really play its positive role and promoting the healthy development of human economic, cultural, military and social activities.

References:

[1] Zhuo Xinjian et al. Principles and Prevention of Computer Virus [M]. Beijing University of Posts and Telecommunications Press, 2007,8: 2nd Edition

[2] Hao Wenhua. Technical guide to anti-gang and drug control [M]. Machinery Industry Press, 2004, 1: First Edition

[3] Zhang, et al. Computer virus and anti-virus technology [M]. Tsinghua University Publishing House, 20066?