Computer Virus Phenomena in Cybercafé

Author(s):  
Abdul Rahman Garuba

The chapter examines the concepts, history, sources, spread, detection, and removal of computer viruses. The increase in the number of computers and accessibility to Internet has made it easy for hackers to invade systems all over the world. Computer viruses have reached epidemic numbers in many computer environments resulting in computer security vulnerabilities. Cybercafés systems/networks are potential objects of virus attacks due to the fact that they are connected to the Net. Cybercafé managers should have a good understanding of the risk and controls associated with various security technologies. It is the hope of the author that adequate awareness and understanding of the destructive devices by cybercafé managers and computer users generally will help secure their systems. It is recommended that cybercafé administrators develop a security policy for both employees and users.

2020 ◽  
pp. 69-76
Author(s):  
O. Klevtsov ◽  
A. Symonov ◽  
S. Trubchaninov

The paper is devoted to the issues of computer security assessment of instrumentation and control systems (I&C systems) of nuclear power plants (NPPs). The authors specified the main areas of assessing the computer security of NPP I&C systems, especially the assessment of cyber threats, vulnerabilities of I&C computer security, sufficiency of applied measures for ensuring I&C systems computer security, risks of I&C system computer security as well as periodic reassessment of I&C computer security. The paper considers the assessment of I&C computer security vulnerabilities, sufficiency of applied measures for ensuring I&C computer security (assessment of cyber threats and the risks of I&C computer security are discussed in detail in other publications from the series “Computer Security of NPP Instrumentation and Control Systems”). Approaches to assessing the computer security vulnerabilities of I&C systems and software at each stage of I&C life cycle are considered. The recommendations for assessing vulnerabilities regarding technical and software protection against unauthorized access or connection to I&C, protection of local networks, implementation of organizational measures and procedures for computer security are provided. The paper describes the scope and procedures for the initial assessment and periodic reassessment of NPP I&C computer security. Recommendations for the formation of an appropriate evaluation team are provided. Methods of assessing I&C computer security are considered, namely: analysis of documents (computer security policy, program, plan, reports, etc.), survey of staff (administrative, operational, service and computer security experts), direct review of I&C systems, their components and local networks. The evaluation stages (collection of information, detailed analysis, reporting) and the scope of work at each stage are described. General information about the possibility and necessity of assessing the computer security risks of I&C systems in the case of using risk-informed approaches is provided. The need to document the results of the assessment is noted separately and specific proposals about the procedure for developing relevant reports are made.


2017 ◽  
Vol 2 (5) ◽  
Author(s):  
Bory Daniel Chilán Intriago ◽  
Enrique Javier Macías Arias

Uno de los cambios más sorprendentes del mundo de hoy es la rapidez de las comunicaciones. Modernos sistemas permiten que el flujo de conocimientos sea independiente del lugar físico donde se encuentren. En ese sentido, ya no sorprende la transferencia de información en tiempo real o instantáneo  y debido a que el conocimiento es poder; para adquirirlo, las empresas  se han  unido  en  grandes  redes  internacionales  para transferir datos,  sonidos  e imágenes, y realizar el comercio en forma electrónica, con objeto de ser más eficientes. No obstante, al unirse en forma pública se han vuelto vulnerables, pues cada sistema de computadoras involucrado en la red es un blanco potencial y apetecible para obtener información. El objetivo de esta investigación fue dar a conocer los resultados obtenidos sobre los métodos para defensa contra virus informático. En este trabajo se concluyó que el avance de la tecnología tanto en software como en hardware, ha hecho que los antivirus hayan evolucionado hacia mejores programas que no solo buscan detectar virus informáticos si no bloquearlos y desinfectarlos. Para el desarrollo de esta experiencia  se realizaron encuestas a 69 Ingenieros en Sistemas y Administradores de centros de cómputo de la ciudad de Portoviejo, Ecuador. Se concluyó que La mayoría de usuarios adquieren los programas de antivirus  mediante  descargas  de  la  web,  o  compra  de  programas  piratas,  los  cuales  no protegen totalmente al computador y en vez de volverse una ayuda se convierte en amenazas.  Palabras   claves:   antivirus,   desinfectarlos,   vulnerables,   virus   informáticos,   software, hardware, centros de cómputo  Study of methodologies for defense against computer viruses that can damage computer equipment.   Abstract One of the most striking changes in the world today is the speed of communication. Modern systems allow the flow of knowledge is independent of the physical location where they are. In that sense, no longer surprises transfer or instant real- time and because knowledge is power ; to acquire , companies have joined in large international networks to transfer data, sound and images, and make trade electronically in order to be more efficient. However, joining publicly have become vulnerable, as each computer system involved in the network is a potential target and appealing for information. The objective of this research was to present the results on methods of defense against computer viruses. This paper concluded that the advancement  of technology both  in  software and  hardware,  has  made  the best  antivirus programs have evolved to not only seek to detect viruses if no block and disinfection. For the development of this experience surveys to 69Ingenieros Systems and datacenter managers of Portoviejo, Ecuador ciudadde. It was concluded that most users purchase antivirus programs via web downloads, or buying pirated programs, which do not fully protect the computer and instead of becoming an aid becomes threats. Keywords: antivirus, disinfect, vulnerable, computer virus, software, hardware, computer centers


Author(s):  
Mark B. Schmidt ◽  
Allen C. Johnston ◽  
Kirk P. Arnett ◽  
Jim Q. Chen ◽  
Suicheng Li

Despite the recent increased attention afforded malware by the popular press, there appears to be a dearth in user awareness and understanding of certain aspects of the security paradigm. This chapter presents a comparison of user awareness levels of rootkits, spyware, and viruses between U.S. and Chinese users. The results of a survey of 210 U.S. respondents and 278 Chinese respondents indicate that respondents’ awareness and knowledge of rootkits is well below that of spyware and viruses. Data analysis further reveals that there are significant differences in Chinese and U.S. user perceptions with regard to spyware and computer viruses. However, there is no difference in cross-cultural awareness with regard to rootkits. Due to the ubiquitous nature of the Internet, rootkits and other malware do not yield at transnational borders. An important step to mitigate the threats posed by malware such as rootkits is to raise awareness levels of users worldwide.


2021 ◽  
Vol 54 (4) ◽  
pp. 1-39
Author(s):  
Wei Hu ◽  
Armaiti Ardeshiricham ◽  
Ryan Kastner

Information flow tracking (IFT) is a fundamental computer security technique used to understand how information moves through a computing system. Hardware IFT techniques specifically target security vulnerabilities related to the design, verification, testing, manufacturing, and deployment of hardware circuits. Hardware IFT can detect unintentional design flaws, malicious circuit modifications, timing side channels, access control violations, and other insecure hardware behaviors. This article surveys the area of hardware IFT. We start with a discussion on the basics of IFT, whose foundations were introduced by Denning in the 1970s. Building upon this, we develop a taxonomy for hardware IFT. We use this to classify and differentiate hardware IFT tools and techniques. Finally, we discuss the challenges yet to be resolved. The survey shows that hardware IFT provides a powerful technique for identifying hardware security vulnerabilities, as well as verifying and enforcing hardware security properties.


2015 ◽  
Vol 17 (2) ◽  
pp. 36-72 ◽  
Author(s):  
James Stocker

Nuclear weapon free zones (NWFZs) were an important development in the history of nuclear nonproliferation efforts. From 1957 through 1968, when the Treaty of Tlatelolco was signed, the United States struggled to develop a policy toward NWFZs in response to efforts around the world to create these zones, including in Europe, Africa, Latin America, and the Middle East. Many within the U.S. government initially rejected the idea of NWFZs, viewing them as a threat to U.S. nuclear strategy. However, over time, a preponderance of officials came to see the zones as advantageous, at least in certain areas of the world, particularly Latin America. Still, U.S. policy pertaining to this issue remained conservative and reactive, reflecting the generally higher priority given to security policy than to nuclear nonproliferation.


2007 ◽  
Vol 13 (2) ◽  
pp. 507-514
Author(s):  
Ivan Vuković

In this paper we researched European Union starting with the Agreement from Maastrich from year 1992, even though the European Union has a long traditional history and its origin is founded on regulations of economical integrations in Europe beginning from the 1950’s through the Roman treaty from year 1957 and the forming of the European Union Committee in year 1965. Further we follow her expansion and introduction of the European economic and monetary policy, to last, the joining perspective of Croatia. According to the Agreement from Maastrich, European Union lies on three posts: 1) Legal-political and regulative post, 2) Economical post, where the forming of European economical and monetary policy is in the first plan, especially the introducing of Euro as the unique European currency, 3) Post of Mutual foreign security policy within European Union. In that context we need to highlight the research conducted here and in European Union, including the world, regarding development of European Union and its economical, legal, political and cultural, as well as foreign diplomatic results, which are all perspectives of European Union. All the scientists and researches which were involved in exploring the development of EU with its modern tendencies and development perspective, agree that extraordinary results are achieved regards to economical, legal, political, foreign-security and diplomatic views, even tough many repercussions exist in progress of some particular members and within the EU as a whole. The biggest controversy arises in the perspective and expanding of European Union regarding ratification of the Constitution of EU from particular country members, but especially after the referendum was refused from two European countries, France and Netherlands. According to some estimates, the Constitution of EU would have difficulty to be adopted in Switzerland and some other Scandinavian countries, but also in Great Britain and other very developed countries. However the European Community and European Union were developing and expanding towards third European countries, regardless of Constitutional non-existence, where we can assume that if and when the Constitution of EU will be ratified, the EU will further develop as one of the most modern communities. This will enable economical development, especially development of European business, unique European market and free trade of goods and services, market of financial capital and labour market in free movement of labour. Being that EU has become one of the most largest dominating markets in the world, it offers a possibility to all new members to divide labour by using modern knowledge and high technology which insure economical, social and political prosperity. This results to forming a society of European countries which will guarantee all rights and freedom of development for all nations and ethnic groups. As well as, all European countries with somewhat less sovereignty, but in international relations will be stronger and significant, not only in sense of economics, but also in politics and military diplomatic relations. Therefore, Croatia has no choice and perspective if she does not join the European Union till year 2010, but until than it needs to create its strategy of economical and scientific-technological development, including demographic development, which will insure equal progress of Croatia as an equal member of European Union.


Author(s):  
Melvyn P. Leffler

This chapter considers the end of the Cold War as well as its implications for the September 11 attacks in 2001, roughly a decade after the Cold War ended. While studying the Cold War, the chapter illustrates how memory and values as well as fear and power shaped the behavior of human agents. Throughout that struggle, the divergent lessons of World War II pulsated through policymaking circles in Moscow and Washington. Now, in the aftermath of 9/11, governments around the world drew upon the lessons they had learned from their divergent national experiences as those experiences had become embedded in their respective national memories. For policymakers in Washington, memories of the Cold War and dreams of human freedom tempted the use of excessive power with tragic consequences. Memory, culture, and values played a key role in shaping the evolution of U.S. national security policy.


2012 ◽  
pp. 782-798
Author(s):  
Liang Hu ◽  
Fan Lu

The chapter is intended to introduce Computer Vision Syndrome (CVS), a widely spreading but largely unknown epidemic among professional and ordinary computer users, especially internet users. Dr. Sheedy and Dr. Anshel are two leading researchers in the ergonomics and optometry fields, and CVS has been extensively studied in these fields. The authors have summarized their views about CVS, including five major symptoms of CVS, three key contributing factors of CVS, and basic preventive and treatment strategies. Future researches are needed to continue the advancement of current knowledge regarding computer screens, computer task, and computer environments, and to expand research in diverse computer user populations, especially younger computer users.


Author(s):  
Stelios Zimeras

Computer viruses have been studied for a long time both by the research and by the application communities. As computer networks and the Internet became more popular from the late 1980s on, viruses quickly evolved to be able to spread through the Internet by various means such as file downloading, email, exploiting security holes in software, etc. Epidemiological models have traditionally been used to understand and predict the outcome of virus outbreaks in human or animal populations. However, the same models were recently applied to the analysis of computer virus epidemics. In this work we present various computer virus spread models combined with applications to e-health systems.


Author(s):  
Aroon Manoharan ◽  
Marc Fudge

This chapter highlights the research findings of a longitudinal study of online privacy and security practices among global municipalities conducted in 2005 and 2007. As cities worldwide implement sophisticated e-government platforms to increasingly provide services online, many barriers still inhibit the adoption of such strategies by the citizen users, and one such factor is the availability of a comprehensive privacy policy. The survey examines cities throughout the world based upon their population size, the total number of individuals using the Internet, and the percentage of individuals using the Internet. Specifically, we examined if the website has a privacy or security policy, does the website utilize digital signatures and if the website has a policy addressing the use of cookies to track users. Overall, results indicate that cities are increasingly emphasizing on privacy and security policies with major improvements in 2007, along with significant changes in the top ranking cities in when compared to the 2005 study.


Sign in / Sign up

Export Citation Format

Share Document