U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

INTRODUCTION TO ANTI-VIRUS TECHNIQUES

NCJ Number
145857
Journal
NCSA News Volume: 4 Issue: 5 Dated: (September/October 1993) Pages: 8-9,11-12,16-17
Editor(s)
L Steward
Date Published
1993
Length
6 pages
Annotation
Vendors of antivirus products employ various techniques to facilitate personal computer security, but antivirus technologies have both advantages and disadvantages.
Abstract
Many personal computer components are vulnerable to viruses. In general, virus attacks have two main objectives, to propagate or replicate and attach to other files and/or to cause some type of unexpected action to happen. Disk- resident and memory-resident avenues of virus attack are employed to gain unauthorized access to personal computers. After identifying areas of vulnerability in personal computers, the next step is to incorporate protection mechanisms. Techniques to protect computers from viruses involve software and hardware technology. Software techniques include antitamper/integrity checks, signature scans, and activity monitors. Hardware techniques encompass bootup protection, the command monitor, fencing, and sector- by-sector protection. Software and hardware techniques have distinct advantages and disadvantages; therefore, it is advisable to implement a computer security solution that includes both technologies.