Implementation of a Virus with Treatment and Protection Methods
DOI:
https://doi.org/10.46291/ICONTECHvol4iss2pp28-34Anahtar Kelimeler:
Security- Viruses- Protections- Anti-VirusÖzet
Currently, viruses are the most dangerous things that happens to computers, whether by transferring data or from the Internet cloud. This research paper shows how to implement a virus that has an ability to move and fortify itself from deletion or destroying. A strong virus must have automatic multiplication, automatic transmission between devices, copying itself in important locations on the computer and performing unauthorized actions and instructions in the computer. So in this research paper it will also shows how to get rid of such viruses and ways to prevent them or providing a good security for the users.
Referanslar
Edge, C., & O’Donnell, D. (2016). Malware Security: Combating Viruses, Worms, and Root Kits. In Enterprise Mac Security (pp. 221-242). Apress, Berkeley, CA.
Hasan, M. Z., Hussain, M. Z., & Ullah, Z. (2019). Computer Viruses, Attacks, and Security Methods. LGURJCSIT, 3(3), 20-25.
B Horbatenko, V. S. (2018). Viruses. Executing Principles and Methods of Self-Security. Scientific and practical cyber security journal.
Shahrear, P., Chakraborty, A. K., Islam, M. A., & Habiba, U. (2018). Analysis of computer virus propagation based on compartmental model. Applied and Computational Mathematics, 7(1-2), 12-21.
Bernstein, A. (2019). Computer viruses: how to inoculate your business. Nursing And Residential Care, 21(12), 702-704.
Shekhar, R. S. (2016). A Research Study on Computer Virus And Security Synopsis.
Yayınlanmış
Nasıl Atıf Yapılır
Sayı
Bölüm
Lisans
Telif Hakkı (c) 2020 ICONTECH ULUSLARARASI DERGİSİ
Bu çalışma Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License ile lisanslanmıştır.