Sie sind auf Seite 1von 8

c

c
c
c

Computer Virus, Internet Security


and Firewalls

Reeba Mary Jose

 


  

 !!
"# $%&'$()&
c

Àbstract: ½ ccc c
 c
c c
 c c  c
ccccccccc c  c  c c
c  c  c
c  c  c c 
c   cccccccccccc
 c c c
c
Key Words :  c  c c c
c
c

1.0 INTRODUCTION
c
 c  c c 
 c
c  c 
 c
c 
 c c   c c  c c c 
c

cc 
c
c
c
 cc
c
c
c c  c c
c

cc 
c  cc cc
c
c
c c cc
 c
 cc 
 c
c c
c
cc c
cc c
c c c
 ccc c
c
c
cc c
 c
  c c c
 c
cc  c
 c  c  c  c c c  c
c 
c 
c  c 
 c c 
c
 c c c  c 
c  c 
c c  c 
c   c   c
 c c c c c c
cc
 c
c
c
ë.0 COMPUTER VIRUS

c
 c ccc
 c
c c c
ccc cc
 c

c c
c
c
c
c c
cc
!c
"
c
c
c#
c$
c
%
c&cc
c c c c c  c
c cc  c ccc c c c  c
c c
c c c c  cc c
c c½ c
 ccc 
c
c
 c
'c  c 
cc c c

cc c c
c c c cc
c cccc 
c

c ccc c
c c

ë.1 How Computer Viruses Àttach

c
 c cc cc
cc
cc cc !c
rc  c c
rc  c c 
cc
c
rc  cc c c c
rc (
  cc cc

Àppended Viruses

rc  c cc


c c
c  c c
cc c c cc
c
rc ½ c cc
c
cc 
c c  c
cc 
c cc
  c  
c
rc c c  
cc cc cc cc c  
c

c

c  c
c cc
c  
c
c
c
) c*c
cc
c



 
Vi    g  m
                     
cc c c   c c c c  c  c c  c c  cc
    cccc  ccccccc
c c c  c  c c c
    
 c c c
     
 cc c  c   c
c

) c+c
cccc cc c

c
 " % %
I  g ! # Vi !$
& '() ' *+ *', -. / / / . / +
½ c  c  cccc c 2c  cc c c c  cc
& 1
c cc 0c c 
c c
/
/ / 2/ cc  c
/
c  c

cc cc
&
 ccc c cc  c cc c  c cc c 
c
c
cc

/ & c
)cc,c  c 
c c 3 c
c 
% %
456$m  Vi !$
rc
7 8 8
½ c cc
c 
c c
 cc
rc ½ cc c  cc c 
c
ccc c 
cc
cc cccc  cc
7
rc ½ c c c  c 
c 
c c
c c 
c c  c  c


 cc
cc c  c cc 
cccc
ccc 
c cc
7
rc ½ c c 
c c 
cc c  ccc c 
c c  c c

c

ccc c cc c 
c
;c ;
< ? @ ; @
ë.ë P 9: = i :> Ag i> Vi 9A
B
rc -cc
ccc c-./
rc c cc

 ccc c
ccC
c c 
rc D ccc
 c
 cc
E c
E
rc 
c c  c
c0 cc ccc  c 
rc .c 
c  ccc c c cc 

]. INTERNET SECURITY

  c" c 


c

c
cc
 'c  c
ccc
cc
  
c
c c 
c c
1c" c c c!c
ccc 2c Fc
c
c
c 2c%  c
cc
c
c 2c1c c
c
 'cc

].1 Importance of Internet Security

rc 0 c cc  


3c c
c
c
 c
rc G
c4c c c c
rc % c 
c 
c  

c  
c
c
c 
 c c  c
  5  c 2c
rc % c 
c  c c
c 
c c
c   c c  c  c 
c
c

].ë Stepscto Protect Internet Connected Computer


c
Hc 1 cc  c c ccc c
c
 c
cc
c c  c
c Icccc ccc

cc c
c Jc   c
 c c c c  c
c c
c c c   c
K 
 c c  cc
c Jc 4 c"
 c
c c
c
4 c  
c
c c  c

c " c  
c%c
c c6/7c
c c 
4 c  
c c
c6%
7c

c
c c !c 
c#8 %cc"" 52c
9c cJc 
c 
 'c c  c  c  c 
 c 
 c  c c
c
c
c 
c cc  c cc
:c c 
c 
c 

c  c   c 
c  c 
c 
c
 

cc
c  c
c  c
c
c c  cc

c c4c
c
c
4.0 FIREWÀ S

L ccc cccc   cc


c6 c 
7c ccc
 
 c 68 c 
7c ½ c  
c
c  c c 
c c c   c
c c

c  
 c L c c c c  c
c 
 c   c
c c

 c  c  c 
c c  c  
 c c  c  c
c c
c c
c cc
c cc c c
 c  c  c"
 c L c c c
 c c
c
c  c c c
c c
 c
c
4.1Types Of Firewalls

c
rc Software based firewalls
c c c 4c& cc
c
c
cccc
 c
c c c 4c;
cc0
c M c
rc Hardware based Firewalls
4& c
ccc
 c
c41c
 c  c"
 c N c
4c
c cc
4.ë Two Ways to Create Firewall Rule sets:

rc Exclusive
-2 c
ccc 
 cc
c cc  c c cc
rc Inclusive
-2 c 
c
c 
c c  c  c  c  c c  c 
ccc
  cc
4.] Firewall Techniques
c
1. Packet FilterinOcccc c
rc (ccccccc
rc  cc c67c  c
 c 

'c ccc ccc

 c
c c cc
c c c
c
rc 1c
c c ccc
c
c<c
rc c2 c c
c c
c
ë. Stateful Packet Inspectionc c
rc ½ ccc
c

c
rc %
ccc
c cc
cc c
c c 

c
rc 0c  c c  c c
c c  c 

c
c c  c c c c
c  c
 c

c
rc ccc  c
c c
ccc
c c c c c
cc
c
]. Àpplication layer Firewallscc
rc ½ c

cc c cc 


c
rc ½ c
c
c c


c
c
ccccc c c c c !c2½0c½½0c
rc #

c c c  c c c c c 


c c 


c cc c
c c  c c

c
rc cccc c c
c
 c
cc

4. Proxy Service
rc  

c
c c   c cc c c 2 c  c  c c
c
 c=  cc ccc
rc  ccc  c c c c 
c
rc c c c c 
ccc
c
Õ. Circuit level Pateway
rc c  c   c  c c ½%0c
c Q(0c 

c c
  c
rc 8 c c

cccc c
c   c c
c 
c
  c  c
c
c
c
Õ.0 CONC USION

 c  c  c
c 
c 
c 
 c c c
c 
c 
c  c   c c  c
 cc 
 c
c
ccc
c c cc c
c 
cccc c
c 
c 
c
c 
 c c  c  c 2
c  c  
c c c  c  c
c 4 c
 'c cc
cc c c
c ccc cc
c

c  c c  c2 c2 c
c c c
cc
 c
c
cc
c

6.0 REFERENCESc
c
&c $*&*$$
+$*$!,,!-$('.*$
"&$"&
!&c ' //+++&++$0&/1$&+ !&,2&!,,2
3&c ' //+++&&+0'&$/+0/'$1$ + !&,2&!,,2
4&c ' //+++&$$!&/0+/$5$(&+
2&,2&!,,2
6&c ' //+++&+&/$ #33 7#1$#+$&+ 2&,2&!,,2
&c ' //+++&%%&+ 2&,2&!,,2
7&c ' //&+0'&$/+0/8$+ + &,2&!,,2
9&c ' //+++&+%'&/"/8$+& + &,2&!,,2
2&c ' //+++&$%&$///%0/%0/$+#'&+
 &,2&!,,2
,&c ' //+++&+0&+ &,2&!,,2
&c ' //+++&++$0&/$+& + !&,2&!,,2
!&c ' //+++&$$!&/0+/'$#$(&+
2&,2&!,,2
3&c ' //+++&+&%%&/$/1$#1$#+ 2&,2&!,,2
4&c ' //$$(+&//$5'51$5$/+
2&,2&!,,2
6&c ' //+++&$$(&$&/:/+ 2&,2&!,,2
&c ' //+++&$$!&/0+/$+5'$& +
2&,2&!,,2



c
c
c
cc
c
c
c
c
c
c
c
c
c