DocumentCode
3065845
Title
Current best practice against computer viruses
Author
Cohen, Fred
Author_Institution
ASP, Pittsburgh, PA, USA
fYear
1991
fDate
1-3 Oct 1991
Firstpage
261
Lastpage
270
Abstract
Summarizes research on viruses and defenses. The author examines the state-of-the-art in virus defense today and describes how normal computing activities can proceed without undue risk of substantial viral harm. He then describes a set of redundant integrity protection mechanisms used in defending against computer viruses in untrusted computing environments. They include applications of coding theory, cryptography, operating system modifications, redundancy for detection and repair, fault avoidance, synergistic effects, and defense-in-depth
Keywords
computer viruses; cryptography; data integrity; operating systems (computers); redundancy; best practice; coding theory; computer virus defence; computing activities; cryptography; fault avoidance; operating system modifications; redundant integrity protection mechanisms; risk; synergistic effects; untrusted computing environments; viral harm; virus detection; virus repair; Application software; Best practices; Codes; Computer viruses; Cryptography; Fault detection; Operating systems; Protection; Redundancy; Viruses (medical);
fLanguage
English
Publisher
ieee
Conference_Titel
Security Technology, 1991. Proceedings. 25th Annual 1991 IEEE International Carnahan Conference on
Conference_Location
Taipei
Print_ISBN
0-7803-0120-X
Type
conf
DOI
10.1109/CCST.1991.202223
Filename
202223
Link To Document