Implementation of a Virus with Treatment and Protection Methods


  • Renas Rajab Asaad Department of Computer Science, Nawroz University, Duhok, Kurdistan Region of Iraq



Security, Viruses, Protections, Anti-Virus


Currently, viruses are the most dangerous things that happens to computers, whether by transferring data or from the Internet cloud. This research paper shows how to implement a virus that has an ability to move and fortify itself from deletion or destroying. A strong virus must have automatic multiplication, automatic transmission between devices, copying itself in important locations on the computer and performing unauthorized actions and instructions in the computer. So in this research paper it will also shows how to get rid of such viruses and ways to prevent them or providing a good security for the users.


Edge, C., & O’Donnell, D. (2016). Malware Security: Combating Viruses, Worms, and Root Kits. In Enterprise Mac Security (pp. 221-242). Apress, Berkeley, CA.

Hasan, M. Z., Hussain, M. Z., & Ullah, Z. (2019). Computer Viruses, Attacks, and Security Methods. LGURJCSIT, 3(3), 20-25.

B Horbatenko, V. S. (2018). Viruses. Executing Principles and Methods of Self-Security. Scientific and practical cyber security journal.

Shahrear, P., Chakraborty, A. K., Islam, M. A., & Habiba, U. (2018). Analysis of computer virus propagation based on compartmental model. Applied and Computational Mathematics, 7(1-2), 12-21.

Bernstein, A. (2019). Computer viruses: how to inoculate your business. Nursing And Residential Care, 21(12), 702-704.

Shekhar, R. S. (2016). A Research Study on Computer Virus And Security Synopsis.



How to Cite

Asaad, R. R. (2020). Implementation of a Virus with Treatment and Protection Methods. ICONTECH INTERNATIONAL JOURNAL, 4(2), 28–34.