电脑桌面
添加小米粒文库到电脑桌面
安装后可以在桌面快捷访问

浅析计算机病毒及防范的措施分析研究 计算机专业VIP免费

浅析计算机病毒及防范的措施分析研究  计算机专业_第1页
1/9
浅析计算机病毒及防范的措施分析研究  计算机专业_第2页
2/9
浅析计算机病毒及防范的措施分析研究  计算机专业_第3页
3/9
AnalysisofcomputervirusandpreventionmeasuresAtpresent,computervirusescanpenetrateintotheinformationsocietyinvariousfields,tothecomputersystemhasbroughtgreatdamageandpotentialthreats.Inordertoensurethesafetyandsmoothflowofinformation,andthereforethestudyofcomputerviruspreventionmeasuresareimminent.Inthispaper,thecharacteristicsofthecomputerfromstartingtoexploreapreliminarydealwithcomputervirusesandmeasures.Withthecomputereveryaspectofsociallifeinthewideuseofcomputertechnologytoguardagainstvirusattacksandhasbeenexpanding.Itisreportedthatcountriesintheworldfromcomputervirusattacksandhundredsofmillionsofseriouslydisturbedthenormallifeofhumansociety,tothecomputernetworksystemandbroughtgreatdamageandthepotentialthreat.Atthesametime,thevirustechnologyinthefieldofwarhavebroadapplicationintheGulfWar,therecentKosovowar,bothsideshavetousecomputervirusestoattackenemyandundermineeachother'scomputernetworksandweaponscontrolsystems,toacertainThepurposeofpoliticalandmilitarypurposes.Itisforeseeablethatwiththecomputer,usetheInternetconstantlypopular,in-depth,toguardagainstcomputerviruseswillbemoreandmorecountriesattachgreatimportanceto.Computervirusesareagroupofinfectionbycopyingitselftoothersoftwareprograms.Whentheprogramruns,theembedvirusinfectionandalsorunningotherprograms.Somenon-virusandmaliciouscodeattacks,buttheviruscarryingtheviruscode,onceagoodpre-stimulatingenvironmentcanbeinfectedanddestruction.Sincethe80'sMorrispreparedthefirst"worm"virusprogramsofar,theworldhasappearedinavarietyofdifferenttypesofvirus.Computerviruseshavethefollowingcharacteristics:First,thecovertattacksonstrong.HIVinfectioncanbequietlycomputersystemswithoutbeingdetected,tobefound,oftenhaveseriousconsequences.Second,thereproductionability.Oncetheinfectedcomputer,youcanquickly"disease."Thecurrentthree-dimensionalviruswillcausealotofvariants.Third,thewidemodeoftransmission.Viafloppydisk,wiredandwirelessnetworks,hardwaredevicessuchasmulti-channelautomaticcomputerintrusion,andcontinuetospread.Thefourthisalongincubationperiod.Virusescanbehiddeninthelongcomputersystemsandnotattackuntiltheymeetcertainconditions,stimulatethedamage.Thefifthisgreatdestructivepower.Oncethecomputervirusattack,rangingfrominterferencewiththenormaloperationofthesystem,whileheavydamagetothediskdata,deletefiles,resultingintheparalysisoftheentirecomputersystem.Sixaretargeted.Theperformanceofcomputervirusescanaccuratelybedesignedtomeetthedifferentcircumstancesandtimingoftherequest.Foralongtime,thetargetcomputerwasdesignedmainlytothepursuitofinformationprocessingandimprovethefunctionoflowerproductioncosts,andtheemphasisonsecurityissuesisnotenough.Computersystemsofthevariouscomponents,interface,converteachotheratvariouslevels,therearemanyloopholesandweaknesses.Eventhelackofhardware-basedsecurityasawhole,softwareisalsoeasierfortheexistenceofhiddendangersandpotentialthreats.Onthecomputersystemoftestingisstillalackofautomatedtestingtoolsandsystemsoftwaremeansacompleteinspection,thevulnerabilityofcomputersystemsforcomputerviruseshavespreadandprovidedanopportunity;theworldontheWorldWideWeb(www)sothatthe"globalvillage"Fortheimplementationofacomputervirustocreatethespace;Thenewcomputertechnologyintheelectronicsystemincontinuoususeforcomputervirusestoachievetheobjectiveconditionsprovided.Foreignexpertsbelievethenumberofdistributedprocessing,re-programmi...

1、当您付费下载文档后,您只拥有了使用权限,并不意味着购买了版权,文档只能用于自身使用,不得用于其他商业用途(如 [转卖]进行直接盈利或[编辑后售卖]进行间接盈利)。
2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。
3、如文档内容存在违规,或者侵犯商业秘密、侵犯著作权等,请点击“违规举报”。

碎片内容

浅析计算机病毒及防范的措施分析研究 计算机专业

确认删除?
VIP
微信客服
  • 扫码咨询
会员Q群
  • 会员专属群点击这里加入QQ群
客服邮箱
回到顶部