Title :
Data security-bad code
Author :
Bowles, John B. ; Peláez, Colón E.
Author_Institution :
South Carolina Univ., Columbia, SC, USA
Abstract :
A tutorial on viruses, worms, bacteria, and other computer diseases is presented. It describes how experts classify the various forms of malicious code at work today, the ways in which they hide and work their mischief, and a few of the infamous incidents-such as the attack on the Internet network, in the fall of 1988, of a worm program that devoured massive amounts of CPU time-that have gained international notoriety. Some of the basic forms of prevention and cure are discussed.<>
Keywords :
computer viruses; Internet network; bacteria; bad code; computer disease prevention; computer diseases; data security; malicious code; viruses; worms; Computer security; Computer viruses; Computer worms; Invasive software; Logic; Microorganisms; Program processors; Taxonomy; Viruses (medical); Weapons;
Journal_Title :
Spectrum, IEEE