Sie sind auf Seite 1von 7

Computer Virus, Internet Security

and Firewalls

Reeba Mary Jose

S1, MBA – IB
ROLL NO: 16
School of Management Studies
CUSAT, Kochi – 22
E-mail : reeba.priya@gmail.com

Abstract: This paper gives an overview about what computer viruses, internet
security and firewalls are, how the viruses works and the need for internet
security and firewalls.

Key Words : Virus, Internet security, firewalls

1.0 INTRODUCTION

In this fast moving world, the importance of computer is increasing as they are used for
almost every purposes. Most personal computers are now connested to the Internet and to
local area networks which facilitate the spread of malicious code. With each day, computer
viruses are becoming more and more complex , difficult to detect and avoid them. Hence
there is a need to protect our files and other documents in the computer from very harmful
viruses which can cause great damage. In order to protect the computer systems from
being attacked by viruses, appropriate measures should be taken to ensure internet
security and firewalls must be installed on every computers.
2.0 COMPUTER VIRUS

A computer virus is a computer program that can copy itself & infect a computer
without the permission or knowledge of the owner.
Examples:
Storm worm
I Love You
Code Red
A virus can be either transient or resident. A transient virus is a virus that runs when
its attached program executes and terminates when its attached program ends. This
virus spreads its infection to other programmers’ during execution. A resident virus
locates itself in the memory and can remain active or be activated as a standalone
program, even after its attached program ends.

2.1 How Computer Viruses Attach

A computer virus may attach itself to a program by several ways:


• Appended viruses
• Viruses that surround a program
• Integrated viruses and replacements
• Document Viruses

Appended Viruses

• Virus attaches itself to the program, whenever the program is run, the virus is
activated.
• They insert a copy of itself into the executable program file before the first
executable instruction
• All virus instructions are executed first and after the last virus instruction, control
floes naturally to the first program instruction.
Original
program

Fig. 1 Appended Virus

Viruses that surround a program

The virus runs the original program but has control before and after its execution.
The virus may attach itself to a program that constructs the listing of files on the disk
in order to avoid it from being detected.

Fig. 2 Viruses that surround a program me

Integrated Viruses

The virus replaces some of its target by integrating itself into yhe original code of
the target. Here the virus writer has to know the exact structure of the
original program in order to know where to insert which pieces of the virus.

Fig . 3 Integrated viruses and Replacement

Document Viruses
• This the most popular virus type currently.
• This is implemented within a formatted document, such as a written document, a
database, a slide presentation, or a spreadsheet.
• The writer of the document viruses may use any features of these highly
structured files such as data, commands, macros , procedures or system
calls to perform malicious actions.
• The writer includes the virus in the command part of the document and hence the
user usually sees only the content of the document.

2.2 Protection Against Virus


• Use more secure operating system like UNIX
• In case of unsecured operating system, then buy a virus protection software.
• Avoid programs from unknown sources, like the Internet.
• Ensure that Macro Virus Protection is enabled on all Microsoft applications.
• Never double click an e-mail attachment that contains an executable.

3. INTERNET SECURITY

Internet Security involves protection of a computer’s internet account & files from
Intrusion of an unknown user.
Basic Security Measures used are:
i) Use of passwords
ii) Change of file permissions
iii) Back up of computer’s data

3.1 Importance of Internet Security

• Prevents and detects unauthorized use of your computer


• Forged e-mails can be prevented
• Can avoid personal information examination on our computer by an
intruder(financial statements)
• Can avoid giving hide outs to hackers, who launch attacks against high profile
systems.

3.2 Steps to Protect Internet Connected Computer

1. Buy a hardware based firewall as it hides your computer from rest of the internet.
It is a good primary defense.
2. Use antivirus software & update it regularly to check for latest viruses. Antivirus
software checks individual
3. Use Anti-spyware Software. Avoid clicking on pop-up windows to reduce chances
of Spyware infection. Click on the “X” on the pop-up window, instead of “Close”
button.
Example: Windows LiveOneCare , SpySweeper(egs)
4. Update your computer’s system and the Web browsing software regularly. It
helps to improve functionality and fixes internal bugs .
5. Have knowledge about spoofs and phishes. Avoid giving your personal
information like password, bank account number or social security numbers reply
to any e-mail.

4.0 FIREWALLS

Firewalls are device that filters all traffic between a protected “Inside network” and a less
trustworthy “Outside network”. The purpose of firewall is to keep bad things outside a
protected environment. Firewall is a dedicated appliance, or software running on a
computer, which inspects network traffic passing through it, and denies or permits
passage based on a set of rules. It can be both hardware and Software. Firewalls are a
must in order to ensure the security of the computer.

4.1Types Of Firewalls

• Software based firewalls


- Run as additional programs on computers.
- Known as Personal Firewalls
• Hardware based Firewalls
-Runs on a dedicated computer
-Better performance than Software Firewalls
- More expensive
4.2 Two Ways to Create Firewall Rule sets:

• Exclusive
-Firewall allows all traffic through except, for the traffic matching the rule set.
• Inclusive
-Firewall allows only those traffic that matches the rule sets and block
everything else.
4.3 Firewall Techniques

1. Packet Filtering
• Data travels as small pieces called packets
• Each packet has “Metadata” which contains information’s like where it is
coming from and where it should be sent to.
• Based on the rules, packets are dropped or rejected
• All Firewalls can do this.

2. Stateful Packet Inspection


• This keeps track of connections.
• Compares key parts of the packet to a database of trusted information.
• Packet can be the start of a new connection or it can be a part of an
existing connection.
• If it is neither of the two, it is considered useless and will be dropped.
3. Application layer Firewalls
• They look at the actual data transported.
• They know how certain protocols work.
E.g.: FTP, HTTP
• Looks if data in a packet is valid for a protocol. If it is not, it can be
dropped.
• It is very effective, but can impose performance degradation.

4. Proxy Service
• Information from the internet is retrieved by the Firewall and then sent to
the requesting system and vice versa.
• Intercepts all messages entering and leaving the network.
• Effectively hides the true network addresses.

5. Circuit level gateway


• Applies security mechanisms when a TCP or UDP connection is
established.
• Once the connection is made, packets can flow between the hosts without
further checking.

5.0 CONCLUSION

In the present world, most personal computers are now connected to the Internet and
viruses are becoming more complex as days go by. Hence it has now become a crucial
task to protect our computer systems against them. For this purpose, we can install
effective anti-virus software’s and see to it that we periodically update them. We should
also ensure security using Firewalls. Firewalls should be installed on all computers.

6.0 REFERENCES

1. Charles P. Pfleeger, Shari Lawrence Pfleeger, 2002, “ Security in computing” , Pearson


Education,. Third Edn.
2. http://www.howstuffworks.com/virus.htm, downloaded on 12.09.2009
3. http://www.en.wikipedia.org/wiki/Computervirus , downloaded on 12.09.2009
4. http://www.armor2net.com/knowledge/internet_security.htm , downloaded on 19.09.2009
5. http://www.ehow.com/articles-3367-antivirus-software.htm , downloaded on 19.09.2009
6. http://www.ibibo.com , downloaded on 19.09.2009
7. http://en.wikipedia.org/wiki/Firewall , downloaded on 11.09.2009
8. http://www.webopedia.com/TERM/Firewall.html , downloaded on 11.09.2009
9. http://www.freebsd.org/doc/en/books/handbook/firewalls-concepts.html , downloaded on
11.09.2009
10. http://www.wisegeek.com , downloaded on 11.09.2009
11. http://www.howstuffworks.com/firewall.htm , downloaded on 12.09.2009
12. http://www.armor2net.com/knowledge/computer-security.htm , downloaded on 19.09.2009
13. http://www.sawaal.ibibo.com/search/overcome-virus-come , downloaded on 19.09.2009
14. http://farmindustrynew.com/mag/farming_steps_overcome_internet/ , downloaded on
19.09.2009
15. http://www.searchsecurity.techtarget.com/sDefinition/ , downloaded on 19.09.2009
16. http://www.armor2net.com/knowledge/firewall_protection.htm , downloaded on 19.09.2009

Das könnte Ihnen auch gefallen