Beruflich Dokumente
Kultur Dokumente
and Firewalls
S1, MBA – IB
ROLL NO: 16
School of Management Studies
CUSAT, Kochi – 22
E-mail : reeba.priya@gmail.com
Abstract: This paper gives an overview about what computer viruses, internet
security and firewalls are, how the viruses works and the need for internet
security and firewalls.
1.0 INTRODUCTION
In this fast moving world, the importance of computer is increasing as they are used for
almost every purposes. Most personal computers are now connested to the Internet and to
local area networks which facilitate the spread of malicious code. With each day, computer
viruses are becoming more and more complex , difficult to detect and avoid them. Hence
there is a need to protect our files and other documents in the computer from very harmful
viruses which can cause great damage. In order to protect the computer systems from
being attacked by viruses, appropriate measures should be taken to ensure internet
security and firewalls must be installed on every computers.
2.0 COMPUTER VIRUS
A computer virus is a computer program that can copy itself & infect a computer
without the permission or knowledge of the owner.
Examples:
Storm worm
I Love You
Code Red
A virus can be either transient or resident. A transient virus is a virus that runs when
its attached program executes and terminates when its attached program ends. This
virus spreads its infection to other programmers’ during execution. A resident virus
locates itself in the memory and can remain active or be activated as a standalone
program, even after its attached program ends.
Appended Viruses
• Virus attaches itself to the program, whenever the program is run, the virus is
activated.
• They insert a copy of itself into the executable program file before the first
executable instruction
• All virus instructions are executed first and after the last virus instruction, control
floes naturally to the first program instruction.
Original
program
The virus runs the original program but has control before and after its execution.
The virus may attach itself to a program that constructs the listing of files on the disk
in order to avoid it from being detected.
Integrated Viruses
The virus replaces some of its target by integrating itself into yhe original code of
the target. Here the virus writer has to know the exact structure of the
original program in order to know where to insert which pieces of the virus.
Document Viruses
• This the most popular virus type currently.
• This is implemented within a formatted document, such as a written document, a
database, a slide presentation, or a spreadsheet.
• The writer of the document viruses may use any features of these highly
structured files such as data, commands, macros , procedures or system
calls to perform malicious actions.
• The writer includes the virus in the command part of the document and hence the
user usually sees only the content of the document.
3. INTERNET SECURITY
Internet Security involves protection of a computer’s internet account & files from
Intrusion of an unknown user.
Basic Security Measures used are:
i) Use of passwords
ii) Change of file permissions
iii) Back up of computer’s data
1. Buy a hardware based firewall as it hides your computer from rest of the internet.
It is a good primary defense.
2. Use antivirus software & update it regularly to check for latest viruses. Antivirus
software checks individual
3. Use Anti-spyware Software. Avoid clicking on pop-up windows to reduce chances
of Spyware infection. Click on the “X” on the pop-up window, instead of “Close”
button.
Example: Windows LiveOneCare , SpySweeper(egs)
4. Update your computer’s system and the Web browsing software regularly. It
helps to improve functionality and fixes internal bugs .
5. Have knowledge about spoofs and phishes. Avoid giving your personal
information like password, bank account number or social security numbers reply
to any e-mail.
4.0 FIREWALLS
Firewalls are device that filters all traffic between a protected “Inside network” and a less
trustworthy “Outside network”. The purpose of firewall is to keep bad things outside a
protected environment. Firewall is a dedicated appliance, or software running on a
computer, which inspects network traffic passing through it, and denies or permits
passage based on a set of rules. It can be both hardware and Software. Firewalls are a
must in order to ensure the security of the computer.
4.1Types Of Firewalls
• Exclusive
-Firewall allows all traffic through except, for the traffic matching the rule set.
• Inclusive
-Firewall allows only those traffic that matches the rule sets and block
everything else.
4.3 Firewall Techniques
1. Packet Filtering
• Data travels as small pieces called packets
• Each packet has “Metadata” which contains information’s like where it is
coming from and where it should be sent to.
• Based on the rules, packets are dropped or rejected
• All Firewalls can do this.
4. Proxy Service
• Information from the internet is retrieved by the Firewall and then sent to
the requesting system and vice versa.
• Intercepts all messages entering and leaving the network.
• Effectively hides the true network addresses.
5.0 CONCLUSION
In the present world, most personal computers are now connected to the Internet and
viruses are becoming more complex as days go by. Hence it has now become a crucial
task to protect our computer systems against them. For this purpose, we can install
effective anti-virus software’s and see to it that we periodically update them. We should
also ensure security using Firewalls. Firewalls should be installed on all computers.
6.0 REFERENCES