Northland Security Systems
Computer Viruses
Types of Viruses Nuisance viruses Data-destructive viruses Espionage viruses Hardware-destructive viruses Nuisance viruses Data-destructive viruses Espionage viruses Hardware-destructive viruses
Methods of Operation viruses Macro viruses Boot sector viruses Trojan horse viruses Stealth viruses Polymorphic viruses Logic (time) bombs viruses Macro viruses Boot sector viruses Trojan horse viruses Stealth viruses Polymorphic viruses Logic (time) bombs
Virus Symptoms Files become corrupt Program does not operate properly Programs or files vanish Strange messages appear on monitor Less memory space available A volume name has changed message appears repeatedly Files become corrupt Program does not operate properly Programs or files vanish Strange messages appear on monitor Less memory space available A volume name has changed message appears repeatedly
Security Strategies Data backup Disaster recovery plan Data encryption User IDs and passwords Biometric authentication Network sniffers Mini webcams Firewalls Data backup Disaster recovery plan Data encryption User IDs and passwords Biometric authentication Network sniffers Mini webcams Firewalls