Главная | Обратная связь | Поможем написать вашу работу!
МегаЛекции

Anti-virus software and other preventative countermeasures




There are two common methods to detect viruses. The first, and by far the most common method of virus detection is using a list of virus signature definitions. The second method is to use a heuristic algorithm to find viruses based on common behaviors. This method has the ability to detect viruses that anti-virus security firms have yet to create a signature for.

Many users install anti-virus software that can detect and eliminate known viruses after the computer downloads or runs the executable. They work by examining the content heuristics of the computer's memory (its RAM, and boot sectors) and the files stored on fixed or removable drives (hard drives, floppy drives), and comparing those files against a database of known virus "signatures". Some anti-virus programs are able to scan opened files in addition to sent and received emails 'on the fly' in a similar manner. This practice is known as "on-access scanning." Anti-virus software does not change the underlying capability of host software to transmit viruses. There have been attempts to do this but adoption of such anti-virus solutions can void the warranty for the host software. Users must therefore update their software regularly to patch security holes. Anti-virus software also needs to be regularly updated in order to gain knowledge about the latest threats.

One may also prevent the damage done by viruses by making regular backups of data (and the Operating Systems) on different media, that are either kept unconnected to the system (most of the time), read-only or not accessible for other reasons, such as using different file systems. This way, if data is lost through a virus, one can start again using the backup (which should preferably be recent). If a backup session on optical media like CD and DVD is closed, it becomes read-only and can no longer be affected by a virus. Likewise, an operating system on a live CD can be used to start the computer if the installed Operating Systems become unusable. Another method is to use different operating systems on different file systems. A virus is not likely to affect both. Data backups can also be put on different file systems. For example, Linux requires specific software to write to NTFS partitions, so if one does not install such software and uses a separate installation of MS Windows to make the backups on an NTFS partition (and preferably only for that reason), the backup should remain safe from any Linux viruses. Likewise, MS Windows can not read file systems like EXT3, so if one normally uses MS Windows, the backups can be made on an EXT3 partition using a Linux installation.

Once a computer has been compromised by a virus, it is usually unsafe to continue using the same computer without completely reinstalling the operating system. However, there are a number of recovery options that exist after a computer has a virus. These actions depend on severity of the type of virus.

 

Words and word combinations to the text:

 

executable - исполняемый файл

a heuristic algorithm – эвристический алгоритм

to predate - предшествовать

virus signature – сигнатура вируса

to patch holes – подлатать дыры

to backup data – копировать данные

on the fly – на ходу

to be compromised – подвергаться риску, опасности

to void the warranty – аннулировать, уничтожить гарантию

 

EXERCISE EXERCISE 10

Answer the questions about the text

1. How many types of anti-virus methods are described in the article?

2. How does anti-virus software act?

3. What is the practice known as "on-access scanning"?

4. What are the disadvantages of that practice?

5. Can one prevent the damage done by viruses by making regular backups of data?

6. How does it happen?

7. Which another method connected with using different operating systems on different file systems do you know?

8. Once a computer has been compromised by a virus, is it safe to continue using the same computer without completely reinstalling the operating system?

EXERCISE

EXERCISE 11

Read and translate the text with the dictionary. Look at each line and decide if it contains an extra and unnecessary word. These extra words can be from the following groups: articles, auxiliaries, comparatives, conjunctions, prepositions, personal pronouns, modifiers, relative pronouns.

Why we call it “Virus”

0 ٧ The word as virus is derived from and used in the same sense as the biological equivalent.
  The term "virus" is often used in common parlance to describe all kinds of malware,
  including those more that are more properly classified as worms or Trojans. Most popular
  anti-virus software packages defend against all of these types of attack. In some technical
  communities, the term "virus" is also extended so to include the authors of malware, in an
  insulting sense. The English plural of "virus" is "viruses". Some people use "virii" or "viri"
  as a plural, but this is rare. For a discussion about whether "viri" and "virii" are to correct
  alternatives of "viruses", see plural of virus. The term "virus" was up first used in an
  academic publication it by Fred Cohen in his 1984 paper “Experiments with Computer
  Viruses”, where he credits Len Adleman with coining it. However, a 1972 science fiction
  novel by David Gerrold, “When H.A.R.L.I.E. Was One”, includes a description of a too
  fictional computer program called "VIRUS" that worked just like a virus (and was that
  countered by a program called "VACCINE"). The term "computer virus" with current
  usage also was appears in the comic book “Uncanny X-Men”, written by Chris Claremont
  and published in 1982. Therefore, although Cohen's use of "virus" may, perhaps, have been
  the first, it seems difficult to trace of the term “virus”.

 

EXERCISE EXERCISE 12

Поделиться:





Воспользуйтесь поиском по сайту:



©2015 - 2024 megalektsii.ru Все авторские права принадлежат авторам лекционных материалов. Обратная связь с нами...