Implementation of a Virus with Treatment and Protection Methods
DOI:
https://doi.org/10.46291/ICONTECHvol4iss2pp28-34Ключевые слова:
Security, Viruses, Protections, Anti-VirusАннотация
Currently, viruses are the most dangerous things that happens to computers, whether by transferring data or from the Internet cloud. This research paper shows how to implement a virus that has an ability to move and fortify itself from deletion or destroying. A strong virus must have automatic multiplication, automatic transmission between devices, copying itself in important locations on the computer and performing unauthorized actions and instructions in the computer. So in this research paper it will also shows how to get rid of such viruses and ways to prevent them or providing a good security for the users.
Библиографические ссылки
Edge, C., & O’Donnell, D. (2016). Malware Security: Combating Viruses, Worms, and Root Kits. In Enterprise Mac Security (pp. 221-242). Apress, Berkeley, CA.
Hasan, M. Z., Hussain, M. Z., & Ullah, Z. (2019). Computer Viruses, Attacks, and Security Methods. LGURJCSIT, 3(3), 20-25.
B Horbatenko, V. S. (2018). Viruses. Executing Principles and Methods of Self-Security. Scientific and practical cyber security journal.
Shahrear, P., Chakraborty, A. K., Islam, M. A., & Habiba, U. (2018). Analysis of computer virus propagation based on compartmental model. Applied and Computational Mathematics, 7(1-2), 12-21.
Bernstein, A. (2019). Computer viruses: how to inoculate your business. Nursing And Residential Care, 21(12), 702-704.
Shekhar, R. S. (2016). A Research Study on Computer Virus And Security Synopsis.
Загрузки
Опубликован
Как цитировать
Выпуск
Раздел
Лицензия
Copyright (c) 2020 ICONTECH INTERNATIONAL JOURNAL
Это произведение доступно по лицензии Creative Commons «Attribution-NonCommercial-NoDerivatives» («Атрибуция — Некоммерческое использование — Без производных произведений») 4.0 Всемирная.