scholarly journals Estudio de metodologías para defensa contra virus informático que pueden dañar el equipo de cómputo

2017 ◽  
Vol 2 (5) ◽  
Author(s):  
Bory Daniel Chilán Intriago ◽  
Enrique Javier Macías Arias

Uno de los cambios más sorprendentes del mundo de hoy es la rapidez de las comunicaciones. Modernos sistemas permiten que el flujo de conocimientos sea independiente del lugar físico donde se encuentren. En ese sentido, ya no sorprende la transferencia de información en tiempo real o instantáneo  y debido a que el conocimiento es poder; para adquirirlo, las empresas  se han  unido  en  grandes  redes  internacionales  para transferir datos,  sonidos  e imágenes, y realizar el comercio en forma electrónica, con objeto de ser más eficientes. No obstante, al unirse en forma pública se han vuelto vulnerables, pues cada sistema de computadoras involucrado en la red es un blanco potencial y apetecible para obtener información. El objetivo de esta investigación fue dar a conocer los resultados obtenidos sobre los métodos para defensa contra virus informático. En este trabajo se concluyó que el avance de la tecnología tanto en software como en hardware, ha hecho que los antivirus hayan evolucionado hacia mejores programas que no solo buscan detectar virus informáticos si no bloquearlos y desinfectarlos. Para el desarrollo de esta experiencia  se realizaron encuestas a 69 Ingenieros en Sistemas y Administradores de centros de cómputo de la ciudad de Portoviejo, Ecuador. Se concluyó que La mayoría de usuarios adquieren los programas de antivirus  mediante  descargas  de  la  web,  o  compra  de  programas  piratas,  los  cuales  no protegen totalmente al computador y en vez de volverse una ayuda se convierte en amenazas.  Palabras   claves:   antivirus,   desinfectarlos,   vulnerables,   virus   informáticos,   software, hardware, centros de cómputo  Study of methodologies for defense against computer viruses that can damage computer equipment.   Abstract One of the most striking changes in the world today is the speed of communication. Modern systems allow the flow of knowledge is independent of the physical location where they are. In that sense, no longer surprises transfer or instant real- time and because knowledge is power ; to acquire , companies have joined in large international networks to transfer data, sound and images, and make trade electronically in order to be more efficient. However, joining publicly have become vulnerable, as each computer system involved in the network is a potential target and appealing for information. The objective of this research was to present the results on methods of defense against computer viruses. This paper concluded that the advancement  of technology both  in  software and  hardware,  has  made  the best  antivirus programs have evolved to not only seek to detect viruses if no block and disinfection. For the development of this experience surveys to 69Ingenieros Systems and datacenter managers of Portoviejo, Ecuador ciudadde. It was concluded that most users purchase antivirus programs via web downloads, or buying pirated programs, which do not fully protect the computer and instead of becoming an aid becomes threats. Keywords: antivirus, disinfect, vulnerable, computer virus, software, hardware, computer centers

Author(s):  
Abdul Rahman Garuba

The chapter examines the concepts, history, sources, spread, detection, and removal of computer viruses. The increase in the number of computers and accessibility to Internet has made it easy for hackers to invade systems all over the world. Computer viruses have reached epidemic numbers in many computer environments resulting in computer security vulnerabilities. Cybercafés systems/networks are potential objects of virus attacks due to the fact that they are connected to the Net. Cybercafé managers should have a good understanding of the risk and controls associated with various security technologies. It is the hope of the author that adequate awareness and understanding of the destructive devices by cybercafé managers and computer users generally will help secure their systems. It is recommended that cybercafé administrators develop a security policy for both employees and users.


2020 ◽  
Vol 26 (1) ◽  
Author(s):  
A.D. Suleiman ◽  
M.I. Mukhtar ◽  
B.S. Galadanci ◽  
S.A. Muaz

Computer viruses are generally malicious, detrimental to data and system integrity as well as a number-one method of computer vandalism. Users of computer systems have different perception of the effect these viruses can cause to a computer system. This paper presents the results of a questionnaire survey carried out in Bayero University Kano to investigate the students’ perception of the effect of computer virus. A total of 120 respondents participated in the study. The data collected was analyzed using descriptive tools such as percentages and charts. Chi-square is then used as inferential tool. The results showed that the frequency of virus attack is statistically significant with exchange of flash drives (p=0.026), browsing in the café (p=0.006) and backing up data (p=0.000). However no significant statistically association was found between frequency of virus attack with type of operating system (p=0.51) and usage of external memory (p=0.726).This research will help in enlightening users especially students on what attract virus to the computer system and how to control the spread and effect of these viruses.Keywords: Virus, Students, SurveyVol. 26, No. 1, June, 2019


Author(s):  
Nestor J. Zaluzec

The Information SuperHighway, Email, The Internet, FTP, BBS, Modems, : all buzz words which are becoming more and more routine in our daily life. Confusing terminology? Hopefully it won't be in a few minutes, all you need is to have a handle on a few basic concepts and terms and you will be on-line with the rest of the "telecommunication experts". These terms all refer to some type or aspect of tools associated with a range of computer-based communication software and hardware. They are in fact far less complex than the instruments we use on a day to day basis as microscopist's and microanalyst's. The key is for each of us to know what each is and how to make use of the wealth of information which they can make available to us for the asking. Basically all of these items relate to mechanisms and protocols by which we as scientists can easily exchange information rapidly and efficiently to colleagues in the office down the hall, or half-way around the world using computers and various communications media. The purpose of this tutorial/paper is to outline and demonstrate the basic ideas of some of the major information systems available to all of us today. For the sake of simplicity we will break this presentation down into two distinct (but as we shall see later connected) areas: telecommunications over conventional phone lines, and telecommunications by computer networks. Live tutorial/demonstrations of both procedures will be presented in the Computer Workshop/Software Exchange during the course of the meeting.


2018 ◽  
Vol 19 (4) ◽  
pp. 946-978 ◽  
Author(s):  
SHAKILA YACOB

This article examines how a German firm in the Malay Peninsula—Behn, Meyer & Co.—capitalized on its knowledge management to overcome political risks during the period from 1840 until 1959. During the two world wars, all assets and properties of the Behn Meyer firm were systematically expropriated because of the introduction of the Alien Enemies (Winding Up) Act of 1914 and the subsequent imposition of a ten-year ban by the British colonial administration in the Malay Peninsula. However, Behn Meyer’s resilience and flexible outlook, as demonstrated by its management of political risks during these tumultuous periods, enabled it to rebuild its business interests and reestablish a foothold in postcolonial Malaysia and the region. This article argues that Behn Meyer displayed an exemplary business strategy, utilized its understanding of the geopolitics of the area, and leveraged its local and international networks to ensure its survival and longevity in the most tumultuous period in the history of the world.


Author(s):  
Stelios Zimeras

Computer viruses have been studied for a long time both by the research and by the application communities. As computer networks and the Internet became more popular from the late 1980s on, viruses quickly evolved to be able to spread through the Internet by various means such as file downloading, email, exploiting security holes in software, etc. Epidemiological models have traditionally been used to understand and predict the outcome of virus outbreaks in human or animal populations. However, the same models were recently applied to the analysis of computer virus epidemics. In this work we present various computer virus spread models combined with applications to e-health systems.


Author(s):  
Rabia Tas

Science and technology have been developing at a great pace. There are numerous breakthrough innovations and groundbreaking improvements in almost every aspect of life. Undoubtedly, another field experiencing such a fast development is communication. Communication has been following and adapting related technological developments not only in terms of software and hardware but also in terms of targeting the right audience and creating the audience interaction. While developments in science and technology feed communication, communication disseminates the outcomes of innovative studies to the defined target groups. Science communication becomes a part of this mutual relation. This study is focused on research funds, opportunities, and international networks in the field of science communication. Within this context, challenges in research activities and expected impact of research outcomes will be examined in terms of science communication. Also, the role and importance of networks in science communication will be examined in line with research funds and support provided for this field.


Author(s):  
Al P. Mizell

The Internet has become an essential element of all society today. Those who can access the World Wide Web have become active participants in the Information Age. Unfortunately, many individuals throughout the world do not have ready access to the needed technology. Furthermore, they do not have the required knowledge and skills to use the technology and cannot participate actively. As a result, this has created a world of information haves and have-nots. In this chapter, after examining the concept of the digital divide, data is presented that shows that those with low incomes and those who are older have little access to technology and the use of computers. Low-income seniors are especially limited in their opportunities to own a computer, and they seldom have the skills needed to use one for e-mail, search the Internet, and so forth, even if they visit a public library where they could use a computer without any cost. Various approaches being used to help seniors learn how to use computers are described, andthen the chapter focuses on two projects that have proved to be successful in this effort. SeniorNet is a national organization that helps establish learning centers around the country. The approach used at one such center, located at Nova Southeastern University in South Florida, requires seniors to pay for their courses. A second project is known as SeniorComp and is supported by private foundation funds. Ten low-income senior citizens are selected for each group of seniors in this project. They are given a complete Dell computer system, and their tuition is paid to take four of the SeniorNet courses. At the end of the fourth course, ownership of the computer system is turned over to the individual participant. To date, the completion rate has been 100%. The approaches used can serve as models for others to modify and use in their own communities. By adopting a similar approach, the impact of the digital divide can be significantly reduced for those low-income seniors that participate in the project. In this way, this portion of the marginal community can be empowered.


2011 ◽  
pp. 1167-1174
Author(s):  
Barbara Iannarelli

Did you ever read an article on some current issues in some distant part of the world and wish you had paid closer attention in your high school history class? Did you ever purchase a sophisticated computer system and six months later find yourself in need of one of those more illusive features and wish you had taken the free training class the salesman offered? When was the last time you waited “on hold for the next available operator” to get some technical assistance for new hardware or software only to lose the connection after waiting 45 minutes? Have you ever had a graduate tell you that while on the job they wish they had kept the handout from your 422 class?


2014 ◽  
Vol 114 (1) ◽  
pp. 86-106
Author(s):  
Pei-Chen Sung ◽  
Cheng-Yuan Ku ◽  
Chien-Yuan Su

Purpose – Understanding the computer-virus propagation is quite essential for the construction and development of anti-virus policy. While researches about the anti-virus policy have been extensively investigated, the viewpoint from sociological perspective is relatively ignored. Therefore, this paper aims to explore the dynamics of computer-virus propagation and evaluate the effectiveness of anti-virus policies through the sociological perspective. Design/methodology/approach – This research constructs a virus-propagation model based on the susceptible-exposed-infective-recovered epidemic concept to simulate and explore the dynamic behavior of multipartite computer viruses through the tool of system dynamics. The effectiveness of various anti-virus policies is then evaluated via this model. Findings – The frequency of media contact has a significant effect on the virus infection rate. The effectiveness of user self-prevention relies on the usefulness of the virus signatures. The reporting/alarm process can enhance the capability of anti-virus software company and the detected intensity of new threat. The quarantine policy can effectively reduce the spread of computer virus. Practical implications – Individuals should strengthen the self-awareness of information security to reduce the negative impact. Managers should construct and implement the information security norm to regulate the behavior of staff. Anti-virus software companies should strengthen the capability of their automatic reporting/alarm mechanism to early detect the exceptional conditions and control new threats in time. Originality/value – Information security management research is still in the growth phase, but it is critically important to establish the groundwork for understanding of computer viruses and the effectiveness of anti-virus policy from assorted perspectives. The major contribution of research is to explore the propagation of multipartite computer viruses and study how to prevent their destruction from the sociological and technical perspectives.


1995 ◽  
Vol 10 (1) ◽  
pp. 73-76 ◽  
Author(s):  
Franz Baader ◽  
Martin Buchheit ◽  
Manfred A. Jeusfeld ◽  
Werner Nutt

Structured objects are items with defined properties that are to be represented in a computer system. Research in Knowledge Representation (KR) and in Database Design (DB) has produced languages for describing structured objects. Although different in the particular means for defining properties, both areas share the goal of representing a part of the world in a structured way. Moreover, the rise of object-centred formalisms in the last decade has significantly influenced the convergence of languages.


Sign in / Sign up

Export Citation Format

Share Document