8/6/2019 16-Computer Virus, Internet Security
1/8
Computer Virus, Internet Security
and Firewalls
Reeba Mary Jose
S1, MBA IBROLL NO: 16
School of Management StudiesCUSAT, Kochi 22
E-mail : [email protected]
Abstract:This paper gives an overview about what computer viruses, internetsecurity and firewalls are, how the viruses works and the need for internetsecurity and firewalls.
Key Words : Virus, Internet security, firewalls
1.0 INTRODUCTION
In this fast moving world, the importance of computer is increasing as they are used foralmost every purposes. Most personal computers are now connested to the Internet and tolocal area networks which facilitate the spread of malicious code. With each day, computerviruses are becoming more and more complex , difficult to detect and avoid them. Hencethere is a need to protect our files and other documents in the computer from very harmfulviruses which can cause great damage. In order to protect the computer systems frombeing attacked by viruses, appropriate measures should be taken to ensure internetsecurity and firewalls must be installed on every computers.
8/6/2019 16-Computer Virus, Internet Security
2/8
2.0 COMPUTER VIRUS
A computer virus is a computer program that can copy itself & infect a computer
without the permission or knowledge of the owner.Examples:Storm wormI Love YouCode Red
A virus can be either transient or resident. A transient virus is a virus that runs whenits attached program executes and terminates when its attached program ends. Thisvirus spreads its infection to other programmers during execution. A resident viruslocates itself in the memory and can remain active or be activated as a standaloneprogram, even after its attached program ends.
2.1 How Computer Viruses Attach
A computer virus may attach itself to a program by several ways: Appended viruses Viruses that surround a program Integrated viruses and replacements Document Viruses
Appended Viruses
Virus attaches itself to the program, whenever the program is run, the virus isactivated.
They insert a copy of itself into the executable program file before the firstexecutable instruction
All virus instructions are executed first and after the last virus instruction, controlfloes naturally to the first program instruction.
8/6/2019 16-Computer Virus, Internet Security
3/8
Fi
. 1 A
Vi
Vi
g
m
!
i
t
"
i
i #
l " # $
%
t
#
& "
t "
l%
f"
#
#
ft
it
' &
ti"
.
!
i
$ # (
#
tt# &
it
lf t"
#
" # $
t
#
t& "
t
&
t
t
li
ti
"
f fil
"
t
i
)
i
"
t"
#
!"
i
it f " $
%
i
t &
t
.
Fi
. 2 Vi
t
#
t
"
#
" # $
$
8/6/2019 16-Computer Virus, Internet Security
4/8
I 0
1
2
g 34
1
2
5 Vi3 6
7 2 7
The8
i9 @ A
9
eplB C
essomeof its tB 9 D
etE
F
iG
tegratiG
g itself iG
toF
heorigiG
alC
odeof
the target.H
ere the
8
irus
I
riterhas to
P
G
ow theexact structureof theorigiG
al program iG
order toP
G
owwhere to iG
sert whichpiecesof the8
irus.
Fig . 3 IG
tegrated8
irusesand Q eplacement
R S T 6 m
2
0
1
Vi3 6
7 2 7
This themost popular
U
irus tV
pecurrentlV
.
This is implementedwithina formatteddocument, suchasawrittendocument, adatabase, aslidepresentation, oraspreadsheet.
The writer of the documentU
iruses may use any features of these highly
structured filessuchasdata, commands, macros , proceduresorsystemcalls toperformmaliciousactions.
Thewriter includes theU
irus in thecommandpart of thedocument andhence theuserusuallyseesonly thecontent of thedocument.
2.2 P W XY
a
Y
iX b
Agc
i bd
Y
ViW e
d
Usemoresecureoperatingsystem li
f
e UNIX Incaseofunsecuredoperatingsystem, thenbuya
g
irusprotectionsoftware. A
h
oidprograms fromunknownsources, like the Internet. Ensure that
i
acro Virus Protection isenabledonalli
icrosoft applications. Neverdoubleclickane-mail attachment that containsanexecutable.
8/6/2019 16-Computer Virus, Internet Security
5/8
3. INTERNET SECURITY
Internet Security involves protection of a computers internet account & files fromIntrusion of an unknown user.
Basic Security Measures used are:i) p se of passwordsii) Change of file permissionsiii) Back up of computers data
3.1 Importance of Internet Security
Prevents and detects unauthorized use of your computer q orged e-mails can be prevented Can avoid personal information examination on our computer by an
intruder(financial statements) Can avoid giving hide outs to hackers, who launch attacks against high profile
systems.
3.2Stepsto Protect Internet Connected Computer
r . Buy a hardware based firewall as it hides your computer from rest of the internet.It is a good primary defense.
s
. t se antivirus software & update it regularly to check for latest viruses. Antivirussoftware checks individual
u
. t se Anti-spyware Software. Avoid clicking on pop-up windows to reduce chancesof Spyware infection. Click on the X on the pop-up window, instead of Closebutton.Example: Windows LiveOneCare , SpySweeper(egs)
4. t pdate your computers system and the Web browsing software regularly. Ithelps to improve functionality and fixes internal bugs .
5. Have knowledge about spoofs and phishes. Avoid giving your personalinformation like password, bank account number or social security numbers replyto any e-mail.
4.0 FIREWALLS
v irewalls are device that filters all traffic between a protected Inside network and a lesstrustworthy Outside network. The purpose of firewall is to keep bad things outside aprotected environment. v irewall is a dedicated appliance, or software running on acomputer, which inspects network traffic passing through it, and denies or permitspassage based on a set of rules. It can be both hardware and Software. v irewalls are amust in order to ensure the security of the computer.
8/6/2019 16-Computer Virus, Internet Security
6/8
4.1Types Of Firewalls
Software based firewalls- Run as additional programs on computers.- Known as Personal w irewalls
Hardware based Firewalls-Runs on a dedicated computer-Better performance than Software x irewalls
- More expensive
4.2 Two Ways to Create Firewall Rule sets:
Exclusive-Firewall allows all traffic through except, for the traffic matching the rule set.
Inclusive-Firewall allows only those traffic that matches the rule sets and blockeverything else.
4.3 Firewall Techniques
1. Packet Filteriny
Data travels as small pieces called packets Each packet has Metadata which contains informations like where it is
coming from and where it should be sent to. Based on the rules, packets are dropped or rejected All Firewalls can do this.
2. Stateful Packet Inspection This keeps track of connections. Compares key parts of the packet to a database of trusted information. Packet can be the start of a new connection or it can be a part of an
existing connection. If it is neither of the two, it is considered useless and will be dropped.
3.Application layer Firewalls They look at the actual data transported. They know how certain protocols work.
E.g.: FTP, HTTP Looks if data in a packet is valid for a protocol. If it is not, it can be
dropped. It is very effective, but can impose performance degradation.
4. Proxy Service
Information from the internet is retrieved by the Firewall and then sent tothe requesting system and vice versa.
Intercepts all messages entering and leaving the network. Effectively hides the true network addresses.
8/6/2019 16-Computer Virus, Internet Security
7/8
5. Circuit level ateway Applies security mechanisms when a TCP or DP connection is
established.
Once the connection is made, packets can flow between the hosts withoutfurther checking.
5.0 CONCLUSION
In the present world, most personal computers are now connected to the Internet andviruses are becoming more complex as days go by. Hence it has now become a crucialtask to protect our computer systems against them. For this purpose, we can installeffective anti-virus softwares and see to it that we periodically update them. We shouldalso ensure security using Firewalls.Firewalls should be installed on all computers.
6.0 REFERENCES
1. Charles P. Pfleeger, Shari Lawrence Pfleeger, 2002, Security in computing , PearsonEducation,. Third Edn.
2. http://www.howstuffworks.com/virus.htm, downloaded on 12.09.20093. http://www.en.wikipedia.org/wiki/Computervirus , downloaded on 12.09.20094. http://www.armor2net.com/knowledge/internet_security.htm, downloaded on
19.09.20095. http://www.ehow.com/articles-3367-antivirus-software.htm, downloaded on 19.09.20096. http://www.ibibo.com , downloaded on 19.09.20097. http://en.wikipedia.org/wiki/Firewall , downloaded on 11.09.20098. http://www.webopedia.com/TERM/Firewall.html , downloaded on 11.09.20099. http://www.freebsd.org/doc/en/books/handbook/firewalls-concepts.html, downloaded
on 11.09.2009
10. http://www.wisegeek.com , downloaded on 11.09.200911. http://www.howstuffworks.com/firewall.htm , downloaded on 12.09.200912. http://www.armor2net.com/knowledge/computer-security.htm, downloaded on
19.09.200913. http://www.sawaal.ibibo.com/search/overcome-virus-come, downloaded on 19.09.200914. http://farmindustrynew.com/mag/farming_steps_overcome_internet/, downloaded on
19.09.200915. http://www.searchsecurity.techtarget.com/sDefinition/ , downloaded on 19.09.200916. http://www.armor2net.com/knowledge/firewall_protection.htm , downloaded on
19.09.2009
8/6/2019 16-Computer Virus, Internet Security
8/8