DocumentCode :
866034
Title :
Data security-bad code
Author :
Bowles, John B. ; Peláez, Colón E.
Author_Institution :
South Carolina Univ., Columbia, SC, USA
Volume :
29
Issue :
8
fYear :
1992
Firstpage :
36
Lastpage :
40
Abstract :
A tutorial on viruses, worms, bacteria, and other computer diseases is presented. It describes how experts classify the various forms of malicious code at work today, the ways in which they hide and work their mischief, and a few of the infamous incidents-such as the attack on the Internet network, in the fall of 1988, of a worm program that devoured massive amounts of CPU time-that have gained international notoriety. Some of the basic forms of prevention and cure are discussed.<>
Keywords :
computer viruses; Internet network; bacteria; bad code; computer disease prevention; computer diseases; data security; malicious code; viruses; worms; Computer security; Computer viruses; Computer worms; Invasive software; Logic; Microorganisms; Program processors; Taxonomy; Viruses (medical); Weapons;
fLanguage :
English
Journal_Title :
Spectrum, IEEE
Publisher :
ieee
ISSN :
0018-9235
Type :
jour
DOI :
10.1109/6.144534
Filename :
144534
Link To Document :
بازگشت