The Computer Virus: Infection, Removal, and Protection

1993 ◽  
Author(s):  
W. P. Murray
1992 ◽  
Vol 13 (10) ◽  
pp. 594-598
Author(s):  
Thomas C. Bailey ◽  
Richard M. Reichley

AbstractObjective:A computer virus outbreak was recognized, verified, defined, investigated, and controlled using an infection control approach. The pathogenesis and epidemiology of computer virus infection are reviewed.Design:Case-control study.Setting:Pharmacy of a tertiary care teaching institution.Results:On October 28, 1991, 2 personal computers in the drug information center manifested symptoms consistent with the “Jerusalem” virus infection. The same day, a departmental personal computer began playing ‘Yankee Doodle,” a sign of “Doodle” virus infection. An investigation of all departmental personal computers identified the “Stoned” virus in an additional personal computer. Controls were functioning virus-free personal computers within the department. Cases were associated with users who brought diskettes from outside the department (5/5 cases versus 5/13 controls, p = .04) and with College of Pharmacy student users (3/5 cases versus 0/13 controls, p = .012). The detection of a virus-infected diskette or personal computer was associated with the number of 5 1/4-inch diskettes in the files of personal computers, a surrogate for rate of media exchange (mean= 17.4 versus 152.5, p = .018, Wilcoxon rank sum test). After education of departmental personal computer users regarding appropriate computer hygiene and installation of virus protection software, no further spread of personal computer viruses occurred, although 2 additional Stoned-infected and 1 Jerusalem-infected diskettes were detected.Conclusions:We recommend that virus detection software be installed on personal computers where the interchange of diskettes among computers is necessary, that write-protect tabs be placed on all program master diskettes and data diskettes where data are being read and not written, that in the event of a computer virus outbreak, all available diskettes be quarantined and scanned by virus detection software, and to facilitate quarantine and scanning in an outbreak, that diskettes be stored in organized files.


The Lancet ◽  
1991 ◽  
Vol 338 (8782-8783) ◽  
pp. 1598 ◽  
Author(s):  
L.D. Ritchie ◽  
R. Milne ◽  
M.W. Taylor ◽  
R. Duncan

2014 ◽  
Vol 2014 ◽  
pp. 1-10 ◽  
Author(s):  
Haitao Song ◽  
Qiaochu Wang ◽  
Weihua Jiang

A computer virus model with infection delay and recovery delay is considered. The sufficient conditions for the global stability of the virus infection equilibrium are established. We show that the time delay can destabilize the virus infection equilibrium and give rise to Hopf bifurcations and stable periodic orbits. By the normal form and center manifold theory, the direction of the Hopf bifurcation and stability of the bifurcating periodic orbits are determined. Numerical simulations are provided to support our theoretical conclusions.


1998 ◽  
Vol 41 (7) ◽  
pp. 444-458 ◽  
Author(s):  
H. Thimbleby

Author(s):  
S. N. Goryachev ◽  
◽  
N. S. Kobyakov ◽  
S. N. Kostarev ◽  
◽  
...  

The mechanism of computer virus infection of workstations is considered, the transmission of a virus from an infected workstation to an uninfected one. The impact of a computer virus on a local area network is analyzed. An instrumental model for the study of the system "computer virus-carrier-automated workstation-local-computer network" is presented.


Sign in / Sign up

Export Citation Format

Share Document