U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Bolstering Your Computer's Immune System

NCJ Number
138866
Journal
Security Management Volume: 36 Issue: 9 Dated: (September 1992) Pages: 134- 135,137-138,140
Author(s)
K Forcht
Date Published
1992
Length
5 pages
Annotation
Computer viruses are programs specifically designed to infect other programs by attaching themselves to other software and reproducing or infiltrating computer operating systems. Viruses usually consist of several lines of programming code that can be easily concealed in software. They can be created on personal computers and transmitted via modems or infected disks.
Abstract
A virus can be designed to play a practical joke or to destroy information. Virus authors include disgruntled employees, computer-literate terrorists, sociopaths, or hackers. Some computer viruses that have surfaced in recent years include the INTERNET virus, the Christmas tree virus, the Flu-Shot 4 virus, the Aldus peace virus, the Pakistani brain virus, and the Israeli virus. Many virus authors have an international perspective, with motives ranging from personal gain to making political statements. Computer system vulnerabilities include their susceptibility to tampering, user awareness, security controls, bugs and loopholes, and network misuse. Viruses can be prevented by implementing physical security measures, limiting access, using technical controls, educating users, monitoring the system, managing software, monitoring users and software activity, and developing contingency plans and procedures.

Downloads

No download available

Availability