We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

See Pricing

What's Your Topic?

Hire a Professional Writer Now

The input space is limited by 250 symbols

What's Your Deadline?

Choose 3 Hours or More.
Back
2/4 steps

How Many Pages?

Back
3/4 steps

Sign Up and See Pricing

"You must agree to out terms of services and privacy policy"
Back
Get Offer

Literature Review On Methods Of Virus Protection Computer Science

Hire a Professional Writer Now

The input space is limited by 250 symbols

Deadline:2 days left
"You must agree to out terms of services and privacy policy"
Write my paper

This papers provides abstract overview of computing machine virus protection. Computer viruses are most critical country in computing machine scientific discipline. All computing machine users in the universe are enduring from this menace. Viruses reproduce themselves and spread through computing machine to computing machine every bit good as web to web. There are some antivirus package and some best patterns to forestall from computing machine viruses.

Equally good as this literature reappraisal contains the present state of affairs of computing machine viruses, protection from computing machine viruses and how new antivirus package performs on computing machine viruses.

Don't use plagiarized sources. Get Your Custom Essay on
Literature Review On Methods Of Virus Protection Computer Science
Just from $13,9/Page
Get custom paper

end { abstract }

section { Introduction }

“ The lone secure computing machine is one that ‘s unplugged, locked in a safe and buried 20 pess under the land in a secret locationA?A?A? ”

Dennis Huges, FBI

egin { sloppypar }

end { sloppypar }

The above statement shows the current security state of affairs of computing machines and the function computing machine viruses play in computing machine universe.

egin { sloppypar }

end { sloppypar }

Computer virus is a plan that can put to death itself with the aid of another septic feasible plan without cognition of computing machine user and infect to computing machine.

Viruses normally copy itself in current host and another new host besides. So by and large viruses are infecting to feasible files. Some sorts of viruses merely reproduce itself within the current host and from the current host to another host and spread in the host. Those are harmless than viruses that damage to the computing machine plan, activities and informations in the computing machine.

egin { sloppypar }

end { sloppypar }

But there are some other malicious package other than the viruses. Those are called malware. These malicious package can distribute without aid of feasible plan.

egin { sloppypar }

end { sloppypar }

Computer viruses are besides computing machine plans. So anyone who has a personal computing machine can make a virus plan with few lines of codifications. This means birth topographic points of viruses are widely available. Besides a virus is activated in host computing machine ; the infection can distribute through web ( LAN or Internet ) to other computing machines.

egin { sloppypar }

end { sloppypar }

Virus attaches itself to other plan and spreads with them. Most of the clip virus attaches to feasible plan, when the septic feasible plan is running so virus is besides put to deathing behind that procedure. Besides computing machine viruses can infiltrate to runing system. So wholly runing systems like MS Windows, PC Dos, Unix and Macintosh OS have chance to infect with viruses.

egin { sloppypar }

end { sloppypar }

Some viruses do some devastation every bit shortly as they enter a system. But some of others are programmed to lie hibernating until activate by some signal. The signal may be mouse click, specific day of the month, clip or specific common sequence of key strokes. As an illustration the celebrated Michelangelo virus, it is set to trip his birthday March 6.

egin { sloppypar }

end { sloppypar }

Protecting the computing machines from the malicious package is the most ambitious thing. But there are many ways to protect the computing machines from computing machine viruses. Although there are tonss of methods to protect the computing machines from viruses, the computing machine users besides have a duty to protect the computing machines from computing machine viruses. From the following subdivision of reappraisal is considered about different types of Malware. cite { 1 }

ewpage

section { Different types of Malware }

There are different types of Malware spread in computing machine universe. But it can chiefly identified as follow.

egin { enumerate }

item Viruss

item Worms

item Trojan Horses

item Logic Bomb

end { enumerate }

egin { figure } [ H ]

par

includegraphics [ bb =0 0 100 325 ] { virus.png }

caption { Malware Growth by Year } cite { 10 }

par

end { figure }

ewpage

subsection { Viruss }

Virus is block of feasible codification that is attached itself to another feasible plan by attaching external codification, overwriting or replacement of the feasible plan codification. When the computing machine user put to death the septic plan the automatically activate virus besides by put to deathing the fell block of codification. This is the manner how virus is infected to computing machine without cognizing of user. But viruses get aid from computing machine user to propagate in his machine.

egin { sloppypar }

end { sloppypar }

There are several types of viruses ; they are categorized into assorted classs harmonizing to the manner how they infect to system and what portion of system is. Figure1 shows how Malware growing with twelvemonth. It clearly show addition of Malware in twelvemonth by twelvemonth. cite { 1,5 }

egin { enumerate }

item Boot sector viruses

item Macro viruses

item File infecting viruses

item Polymorphic viruses

item Stealth viruses

item Multi-partite viruses

item Resident viruses

item Companion viruses

item FAT viruses

end { enumerate }

subsubsection { Boot sector viruses }

Boot sector viruses are infected to the boot sector of computing machine otherwise chief boot record of computing machine. Boot sector viruses are really hard to observe because the maestro boot sector is the first thing loaded when computing machine started. So if this virus consequence to computing machine, the virus acquire to the full control of the machine.

egin { sloppypar }

end { sloppypar }

When boot sector virus infect to computing machine, they foremost move or replace the original boot codification with septic boot codification. Then the original boot codification move to another sector of on disc and labeled that portion as bad sector. So it will non utilize in future. The of import thing is 75 per cent of viruses onslaughts are reported from boot sector viruses. The chief and lone manner computing machine can infected with this virus is boot computing machine utilizing septic disc. So some modern anti-virus package is designed to look into septic disc, when boot utilizing disc and before boot strap is loaded.cite { 1,2 }

subsubsection { Macro viruses }

In calculating macro virus is virus that is crated utilizing macro linguistic communication. Macro linguistic communication built into package such as word processor. So macro viruses propagate with applications which are used macros. In most of the clip macro viruses infected with MS Office Word,

MS Office Excel. However many of Windowss applications have to possible septic macro viruses excessively.

egin { sloppypar }

end { sloppypar }

Because some applications allow macro plan to be embedded in paperss. So when the papers is opening the macro run automatically. Besides macro viruses spread quickly because of peoples portion informations, paperss and besides use cyberspace to acquire informations and email papers. Therefore Microsoft suggests opening file without macros or user can verify there is no harm macro with the papers. But these methods are besides non worked at all macro viruses.cite { 2,3 }

subsubsection { File infecting viruses }

File infecting viruses are infected to flies, and sometime they are allocated memory of computing machine. Files infecting viruses are infected with feasible files, but most of the clip it infect to feasible files with extensions.COM, .EXE and.OVL.

egin { sloppypar }

end { sloppypar }

See with boot sector viruses these are easy to observe. If the file infecting virus infects to some papers, normally it increases the size of the file. Therefore Anti-virus package can observe those viruses utilizing that feature.cite { 1 }

subsubsection { Polymorphous viruses }

Polymorphous viruses are alteration at that place appearance in each clip when it infect to computing machine. So it is really hard to observe theses type of viruses.

egin { sloppypar }

end { sloppypar }

Polymorphous viruses besides block of programming codification, so they are coding at that place code utilizing different algorithms every clip they attack to system. Some polymorphous viruses can presume over two billion different pretenses. Therefore anti-virus package should do with good algorithmic scanning techniques alternatively of simple twine based scanning techniques.cite { 1,4 }

subsubsection { Stealth viruses }

Stealth virus is a virus that hides its path after infecting to system. These types of viruses besides try to conceal from operating system and Anti-virus package. Therefore stealing viruses ever stay in memory so they can stop all efforts to utilize the operating system.

Therefore these viruses waste memory available for user and conceal it organize both user and Anti-virus package. It hides alterations it creates to files, directory construction and operating system besides.

egin { sloppypar }

end { sloppypar }

When detected theses type of viruses utilizing Anti-viruses package, so first it should disenable the virus before right the memory location in memory because stealing viruses besides stay in memory.cite { 1,6 }

subsubsection { Multi-partite viruses }

Multi-partite viruses infect both boot sector and feasible plan. Therefore this type of virus really difficulty detected.cite { 1 }

subsubsection { Resident viruses }

Permanent viruses reside in the RAM.cite { 7 }

subsubsection { Companion viruses }

These are working like resident viruses or direct action viruses.

subsubsection { FAT viruses }

These infect to the file allotment tabular array.

subsection { Worms }

Worms is a self-replicating computing machine malware type. It spread transcript of itself to other host utilizing computing machine web. Worms different than viruses how the reproduce and spread. It was known viruses want host plan or boot sector to trip it need register transportation ( infected file ) to another computing machine to distribute to it. But worms did non desire any host files to put to death and they can put to death independently and distribute utilizing web. Therefore they usually find references to propagate and they pick references in three ways,

egin { enumerate }

item Randomly generate references

item Find addresses in system tabular arraies

item Find addresses in a plan

end { enumerate }

egin { sloppypar }

end { sloppypar }

The menace of worms is tantamount to that of viruses. Computer worms can damage and destruct some of import files and it can crash critical plans to halt working sometime. The really outstanding illustrations of worms are the MS-Blaster and Sasser worms.cite { 1,2,8 }

subsection { Trojan Equus caballuss }

Dardan Equus caballuss are distractive plans that hide in some valuable and utile package in cyberspace. Some clip worms and viruses hide within Trojan Equus caballuss. The different between virus an Trojan hours is Trojan did non distribute itself.

egin { sloppypar }

end { sloppypar }

Normally Trojan hours spread into two parts those are client side and server side. When the client Trojan executes in computing machine the waiter the aggressor otherwise server can acquire high degree control of the client computing machine.

egin { sloppypar }

end { sloppypar }

The Trojan hours spread in several ways, most of the clip with septic e-mail fond regard. Besides virus developers use some chat plan like Yahoo courier, Skype to distribute these Dardans.

egin { sloppypar }

end { sloppypar }

Normally there are several types of Trojan Equus caballuss like distant entree Trojan, watchword directing Trojan, cardinal lumbermans, destructive Trojan, FTP Trojan and proxy Trojan.cite { 1,9 }

subsection { Logic bomb }

The logic bomb virus is a piece of codification that are inputted into a package system. When a certain and specific status is met, such as snaping on an cyberspace browser or opening a peculiar file, the logic bomb virus is set off. Many coders set the malicious virus off during yearss such as April Fools Day or Friday the 13th. When the virus is activated, so assorted activities will take topographic point. For illustration, files are for good deleted.cite { 1,10 }

ewpage

section { How viruses spread }

Virus is one sort of malicious package which does some sort of injury to the activities of the computing machine. They ever need a host plan or any feasible plan to be executed its codification. As viruses can non put to death its codification by itself, the virus has to acquire the aid of another file. Because of this ground, the viruses can consequence merely to several sorts of files such as hypertext markup language files with JavaScript, word paperss and dispersed sheets. As the files with the extension ‘.gif ‘ , ‘.jpg ‘ , ‘.wav ‘ , ‘.mp3 ‘ files considered as pure informations files, a virus can non make a injury to these files.

egin { sloppypar }

end { sloppypar }

What the viruses do to distribute is copying its codification to another feasible file. Then when that feasible file is executed by another individual the codification of the virus is besides put to deathing and it so starts to seek for files it can shack in the same computing machine or in the other computing machine which has been connected to the computing machine. Then the freshly attacked plans are besides seeking to seek for files which it can assail. If the infected file sends to another computing machine by a removable media, the computing machine virus infects to that computing machine excessively.

egin { sloppypar }

end { sloppypar }

There are figure of ways which a virus can come in into a computing machine. Most of the clip viruses are distributing through the cyberspace. As creative activity of viruses is quickly increasing and cyberspace is everyplace available, spread of the computing machine viruses has increase more and more. Computer viruses are coming to the computing machine with e-mails in e-mail fond regards. When the user opens the electronic mail, the computing machine virus enters into the computing machine and grows in the computing machine. Another manner of come ining a virus into a user ‘s computing machine is by downloading something from some web sites. Through floppy discs or another removable media, it is possible for a virus to come in into a computer.cite { 1 }

section { What the computing machine viruses and other malicious package can and can non make }

egin { enumerate }

item Use disc infinite by the computing machine viruses in vain.

item Delete or modify the content of the septic files.

item Interrupt to some operations of the septic computing machine.

item Display some messages or images.

item Decrease the public presentation of the computing machine.

item Block the computing machine webs.

item Do non make any injury to the hardware constituents that are connected to the computing machine.

end { enumerate }

section { Protection from computing machine viruses }

Once a computing machine infects with some computing machine viruses, the computing machine users can non place whether a computing machine virus has entered into the computing machine or computing machine system as some computing machine viruses are in idle manner for some period of clip. The computing machine users can cognize that a computing machine virus has entered into the computing machine merely by looking at the grounds of the devastation they have done. So the computing machine users must ever see about the safety of their computing machine before a virus make some devastation to the computing machine.

egin { sloppypar }

end { sloppypar }

As most of the computing machine users are now cognizant of the computing machine viruses, they specially pay their attending to restrict the opportunity for a computing machine virus to come in into their computing machine. By merely put ining an anti virus package the users can non give the duty of protecting the computing machine from computing machine viruses merely to the anti virus package plans. The computing machine users besides have the duty of protecting the computing machine from computing machine viruses. Although most of the computing machine users trust and utilize an anti virus package to protect their computing machines from computing machine viruses, there are best patterns which should be followed by the computing machine users.

egin { enumerate }

item When downloading package or any other thing from web sites the users should ever be careful to download them from dependable web sites.

item As viruses can come with e-mail fond regards when the computing machine user checks the e-mails, messages from unknown contacts should non be opened.

item If the user is logging into the computing machine with admin privileges, the opportunity to be infected by some computing machine viruses or malware is greater than the user log into the computing machine with user privileges. As some viruses can non come in into the computing machine when the user logged as a user, log into the computing machine with user privileges is safer.

item Restrict the other users from “ write ” privilege is another option.

item Put watchwords that can non be easy guessed by another individual.

item Backup information.

item Use merely trusted package.

end { enumerate }

egin { sloppypar }

end { sloppypar }

How much the company or individual has to pay for an anti virus package, today most of the computing machine users are used to acquire the service of an anti virus package as the informations are deserving than the sum they pay to protect their computing machine or computing machine system. So put ining an anti virus package plan has become the most popular and dependable method of protecting from computing machine viruses. cite { 14 }

ewpage

subsection { Computer virus protection with anti virus package plans }

As computing machine viruses are available everyplace in the universe, the better manner to protect the systems is put ining an anti virus package in them. Because of that ground, there are tonss of anti virus package suppliers to supply their services to the clients. Assorted anti virus package suppliers are supplying their service to the clients in assorted ways. They are ‘client pull method ‘ , ‘provider push with consent method ‘ , ‘subscription method ‘ and ‘care taking method ‘ .

egin { sloppypar }

end { sloppypar }

Client pull method – After a petition from the client or client for the service of an anti virus package, the service supplier provides their service to the client. In this method as its name said, client should take the enterprise to acquire the service.

egin { sloppypar }

end { sloppypar }

Provider push with consent method – The service suppliers sends email presentment about their merchandise and so the clients download the anti virus package and put in it on the computing machine.

egin { sloppypar }

end { sloppypar }

Subscription method – The client agree to an understanding with the service supplier. In this method when the seller updates the anti virus package, the updates will automatically downloaded into the client ‘s computing machine.

egin { sloppypar }

end { sloppypar }

Care taking method – In this method none of the single computing machine user should non make anything to protect the computing machine from viruses. The service supplier provides the service as a whole.

egin { sloppypar }

end { sloppypar }

The mechanisms used by assorted sorts of anti virus plans to observe a computing machine virus is non able to catch all the viruses or non able to non to catch the non virus things. Traditional anti virus package used two methods to observe a computing machine virus.cite { 15,16 }

subsubsection { Stringing fiting technique }

Some anti virus suppliers stored the codifications of the computing machine viruses in a virus lexicon and when executing a scan, the anti virus package searches the scanning file for a piece of codification from the virus lexicon. If a duplicate character is met, so the anti virus package detects that file as a leery file and alerts the user stating there is a leery file in the computing machine.

egin { sloppypar }

end { sloppypar }

But if a virus Godhead creates and let go of a new computing machine virus, as the codification of that virus is non available in the virus lexicon, the anti virus plan is non able to observe that virus. So the anti virus package which use this technique can non vouch that all the computing machine viruses can be detected by itself.cite { 17 }

subsubsection { Detecting a virus by supervising the behaviour of the plan }

The anti virus plans which use this technique is supervising the behaviour of the scanned plan and if there is an unusual behaviour, the anti virus plan detect it as an septic plan and describe it to the user.

egin { sloppypar }

end { sloppypar }

But if the anti virus package observe a non septic plan as an septic plan and after describing it to the user if the user deletes it from the computing machine, a job arise.

egin { sloppypar }

end { sloppypar }

Although the anti virus package can be trusted, there are some bogus anti virus package which do non supply a protection against computing machine viruses. They have created merely with the aim of gaining money from the computing machine users by irrupting them. Because of this ground, the computing machine users besides have the ability to download and put in merely the trusted anti virus software.cite { 17 }

subsection { Antivirus package evaluation }

The latest antivirus package rates in the world.cite { 11 }

egin { enumerate }

item BitDefender Antivirus 2010 – This provides a great security, simple serviceability, effectual usage of resources, and a valuable pricetag and provides up to day of the month engineerings to battle viruses and other malware.Active virus control is the latest engineering they are looking for to give a great security by ever detecting the behaviour of a file. cite { 19 }

item Kaspersky Anti-Virus 2010 – All around protection from figure of menaces like viruses, Trojans, bots, worms, and spyware. This is more easy to utilize as it has created with user friendly pilotages. cite { 20 }

item Webroot AntiVirus with SpySweeper 2010 – A comprehensive desktop anti virus bundle which is used a multi-layered approach.Webroot AntiVirus with Spy Sweeper besides features proactive engineering to happen malware before it does any injury to the computing machine. cite { 21 }

item Norton AntiVirus 2010 – Great protection degree against malware but a job arises when uninstalling the package as its partial ninstallation. This uses traditional signature based sensing mechanism to observe malware. cite { 22 }

item ESET Nod32 Antivirus 4 – Kind of desktop anti virus package. But this does n’t supply a complete security and misses some protection. This is non in the competition with other anti virus package. cite { 23 }

item AVG Anti-Virus 9 – Includes antivirus and antispyware protection. provides complette protection from harmful downloads and web citations. cite { 24 }

item F-Secure Anti-Virus 2010 – Great desktop anti virus. Has one of the most effectual scan process and trial consequences are shown to turn out that. When put ining this anti virus package, it has been automatically configured to take the other anti virus package installed to the computing machine. cite { 25 }

item G DATA AntiVirus 2011 – Uses two distinguishable antivirus scanning engines, behavioral/heuristic protection, and even self-learning fingerprinting.This provides protection against malware distributing via electronic mails and IM. The types of malware which are detected by this anti virus package are, phishing cozenages, dialers, adware, malicious books, Trojans, rootkits and worms. cite { 26 }

item Avira AntiVir Premium

item Trend Micro AntiVirus + AntiSpyware

end { enumerate }

section { Cryptography and viruses }

Cryptography is technique usage to safe some informations from other unauthorised people. Most of the clip this is used when transportations data from computing machine to another 1. But the job is virus coders besides use this technique to their viruses.

egin { sloppypar }

end { sloppypar }

In cryptanalysis there are different sort of cryptanalysis methods available but most of the clip the coder who create viruses use symmetric individual key cryptanalysis. Actually what go on in cryptanalysis is informations encrypt utilizing cardinal and send that encrypted informations to recipient so recipient decrypt and acquire original informations utilizing the key. This method is so safe because the encrypted informations can non anyone understand.

egin { sloppypar }

end { sloppypar }

Normally anti-virus plan detect virus utilizing the codification of the virus. If there any virus with encrypted codification so anti virus package can non place those viruses.

egin { sloppypar }

end { sloppypar }

Virus Godheads utilizing cryptanalysis, they encrypt the codification of the virus. So some viruses change their facets minute to minute and system to system but the key is same but is encrypted with virus codification. So the virus is safe from anti-virus package, till the codification is encrypted.

egin { sloppypar }

end { sloppypar }

But some cryptanalysis viruses keep their key in separate topographic points alternatively of support with the same file. So good anti virus package can observe the topographic points which keys are stored. Then it can decode the virus codification and cancel it.

egin { sloppypar }

end { sloppypar }

Therefore computing machine system is protected some operating system developers maintain the system fies as encrypted. So even though, there are some advantages and the installations in utilizing cryptanalysis systems to be it prctically applicapable in virus preventation more advanced characteristics of cryptanalysis should be applied.cite { 13 }

ewpage

section { Decision }

As computing machine use and cyberspace use is increasing in the modern universe, the computing machine virus creative activity and the computing machine virus infection has become a common thing. Computer viruses can destruct a whole computing machine system or computing machine web within few seconds. But for any sort of company, the information they have should hold confidentiality, unity and handiness. But sometimes those three things will be lost by the computing machine viruses. So most of the computing machines users are now try to avoid from the computing machine viruses.

egin { sloppypar }

end { sloppypar }

But computing machine virus infection has become so common thing because of the unknowingness and the careless of the computing machine users about computing machine viruses. If the computing machine is attacked by a computing machine virus, the computing machine users do non make the right thing to avoid distributing the virus to the other computing machines. That is why the computing machine viruses are distributing all over the universe rapidly. If a new computing machine virus is found from a user ‘s computing machine, the anti virus package suppliers are unable to supply a solution to the job before it spread everyplace. The computing machine user has great duty to non to allow a computing machine virus enter into the computing machine. To extenuate the devastation, this can go on to the computing machine from computing machine viruses,

egin { enumerate }

item Aware the computing machine users about computing machine viruses.

item Backup the information.

item Put watchwords which can non easy conjecture by the foreigners.

item Not to give write permission to the other individuals.

item Do non open leery electronic mails from unknown contacts.

item Download and utilize merely the recommended package.

item Install an anti virus package.

item Always maintain the anti virus database up to day of the month.

item Use merely the recommended anti virus package.

end { enumerate }

egin { sloppypar }

end { sloppypar }

As computing machine users are now seeking for the best anti virus package which can give the best protection to their computing machines from computing machine malware, the anti virus market has grown and saturated with assorted sorts of anti virus package. But the job is that though there are more anti virus package with the mark of supplying a better protection ; virus Godheads are more powerful than anti virus plan Godheads. They encrypt the codification of the computing machine virus so that any of the anti viruses can non observe that computing machine virus.

egin { sloppypar }

end { sloppypar }

Sing all the fact we can come to a decision that any of the computing machine in the universe can non be at that place with no virus onslaught and any of the computing machine virus protection methods can non eliminate the computing machine viruses from the computing machine forever.

ewpage

egin { thebibliography } { widest entry }

ibitem { 1 } McAfee, emph { An Introduction to Computer Viruses and other Destructive Programs } , Available at: hypertext transfer protocol: //www.mcafee.com/common/media/vil/pdf/av\_white.pdf

ibitem { 2 } Markus Hanhisalo, emph { computing machine Viruses } , Available at: hypertext transfer protocol: //www.tml.tkk.fi/Opinnot/Tik-110.501/1997/viruses.html # 1.Introduction % 20to % 20Computer % 20Viruses

ibitem { 3 } Top Bits,2010, { hypertext transfer protocol: //www.topbits.com/types-of-computer-viruses.html }

ibitem { 4 } Spamlaws,2009, emph { Understanding the Polymorphic Virus } , Available at: hypertext transfer protocol: //www.spamlaws.com/polymorphic-virus.html

ibitem { 5 } Ward Takamiya, Jocelyn Kasamoto, emph { An Introduction to Computer Viruses }

ibitem { 6 } Spamlaws,2009, emph { Descrying the Stealth Virus } , Available at: hypertext transfer protocol: //www.spamlaws.com/stealth-virus.html

ibitem { 7 } Spamlaws,2009, emph { Understanding the Resident Virus } , Available at: hypertext transfer protocol: //www.spamlaws.com/resident-virus.html

ibitem { 8 } Top Bits,2010 { hypertext transfer protocol: //www.topbits.com/computer-worm.html }

ibitem { 9 } Top Bits,2010 { hypertext transfer protocol: //www.topbits.com/trojan-virus.html }

ibitem { 10 } Top Bits,2010, { hypertext transfer protocol: //www.topbits.com/logic-bomb.html }

ibitem { 11 } emph { AntiVirus Software Review } , http: //anti-virus-software-review.toptenreviews.com/

ibitem { 12 } emph { Computer knowledge virus tutorial } , Available at: www.cknow.com

ibitem { 13 } Charles P. Pfleeger, Shari Lawrence Pfleeger emph { Security in Computing ( 4th Edition ) }

ibitem { 14 } Stanley A. Kurzban, emph { Defending against viruses and worms } , Available at: hypertext transfer protocol: //portal.acm.org/citation.cfm? id=68697

ibitem { 15 } emph { How does anti-virus package work? } , Available at: hypertext transfer protocol: //www.antivirusworld.com/articles/antivirus.php

ibitem { 16 } emph { How Antivirus Software Detect Computer Viruses } , Available at: hypertext transfer protocol: //security-antivirus-software.suite101.com/article.cfm/how-antivirus-software-detect-computer-viruses

ibitem { 17 } emph { How AntiVirus Works } , Available at: hypertext transfer protocol: //www.antivirusware.com/articles/how-anti-virus-works.htm

ibitem { 18 } hypertext transfer protocol: //www.darkgovernment.com/news/tag/hacking

ibitem { 19 } emph { BitDefender Antivirus 2010 } hypertext transfer protocol: //anti-virus-software-review.toptenreviews.com/bitdefender-review.html

ibitem { 20 } emph { Kaspersky Anti-Virus 2010 } hypertext transfer protocol: //anti-virus-software-review.toptenreviews.com/kaspersky-review.html

ibitem { 21 } emph { Webroot AntiVirus with SpySweeper Review } hypertext transfer protocol: //anti-virus-software-review.toptenreviews.com/webroot-antivirus-review.html

ibitem { 22 } emph { Norton AntiVirus 2010 } hypertext transfer protocol: //anti-virus-software-review.toptenreviews.com/norton-review.html

ibitem { 23 } emph { ESET Nod32 Antivirus 4 } hypertext transfer protocol: //anti-virus-software-review.toptenreviews.com/eset-nod32-review.html

ibitem { 24 } emph { AVG Anti-Virus 9 } hypertext transfer protocol: //anti-virus-software-review.toptenreviews.com/avg-review.html

ibitem { 25 } emph { F-Secure Anti-Virus 2010 } hypertext transfer protocol: //anti-virus-software-review.toptenreviews.com/f-secure-review.html

ibitem { 26 } emph { GDATA AntiVirus 2011 } hypertext transfer protocol: //anti-virus-software-review.toptenreviews.com/antiviruskit-review.html

end { thebibliography }

end { papers }

Cite this Literature Review On Methods Of Virus Protection Computer Science

Literature Review On Methods Of Virus Protection Computer Science. (2017, Jul 16). Retrieved from https://graduateway.com/literature-review-on-methods-of-virus-protection-computer-science-essay-essay/

Show less
  • Use multiple resourses when assembling your essay
  • Get help form professional writers when not sure you can do it yourself
  • Use Plagiarism Checker to double check your essay
  • Do not copy and paste free to download essays
Get plagiarism free essay

Search for essay samples now

Haven't found the Essay You Want?

Get my paper now

For Only $13.90/page