Implementation of a Virus with Treatment and Protection Methods
DOI:
https://doi.org/10.46291/ICONTECHvol4iss2pp28-34Keywords:
Security, Viruses, Protections, Anti-VirusAbstract
Currently, viruses are the most dangerous things that happens to computers, whether by transferring data or from the Internet cloud. This research paper shows how to implement a virus that has an ability to move and fortify itself from deletion or destroying. A strong virus must have automatic multiplication, automatic transmission between devices, copying itself in important locations on the computer and performing unauthorized actions and instructions in the computer. So in this research paper it will also shows how to get rid of such viruses and ways to prevent them or providing a good security for the users.
References
Edge, C., & O’Donnell, D. (2016). Malware Security: Combating Viruses, Worms, and Root Kits. In Enterprise Mac Security (pp. 221-242). Apress, Berkeley, CA.
Hasan, M. Z., Hussain, M. Z., & Ullah, Z. (2019). Computer Viruses, Attacks, and Security Methods. LGURJCSIT, 3(3), 20-25.
B Horbatenko, V. S. (2018). Viruses. Executing Principles and Methods of Self-Security. Scientific and practical cyber security journal.
Shahrear, P., Chakraborty, A. K., Islam, M. A., & Habiba, U. (2018). Analysis of computer virus propagation based on compartmental model. Applied and Computational Mathematics, 7(1-2), 12-21.
Bernstein, A. (2019). Computer viruses: how to inoculate your business. Nursing And Residential Care, 21(12), 702-704.
Shekhar, R. S. (2016). A Research Study on Computer Virus And Security Synopsis.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2020 ICONTECH INTERNATIONAL JOURNAL
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.