Tuesday, June 26, 2007

Conclusion

We should install an anti-virus software to protect our machine and make sure that an up-to-date virus signature file has been applied.

Guidelines and Tips

Do's

1. Do backup your programs and data regularly. Recover from backup is the most secure way to restore the files after a virus attack.
2. Do install an anti-virus software to protect your machine and make sure that an up-to-date virus signature file has been applied.
3. Do schedule a daily scan to check for viruses. The schedule scan could be done in non-peak hours, such as during the lunch-break or after office hour.
4. Do check floppy disks and files downloaded from Internet (especially those from unknown origin) with anti-virus software before use.
5. Do stop all activities on the computer infected by computer virus. Continuing the use of the infected computer will help the virus spread further.
6. Do refer to the leaflet "Information Security is Everybody's Business" published by the government.

Don'ts

1. Don't use illegal software under all circumstances.
2. Don't execute any email attachment unless you are sure what it will do. Be aware of viruses that come as e-mail attachments from unknown origin. Some viruses / worms will disguise itself as season's greetings / celebrations.

Examples of Antivirus

1. AVG Anti-Virus System
2. BitDefender AntiVirus from SOFTWIN
3. eTrust Antivirus from Computer Associates
4. F-Secure Anti-Virus from F-Secure
5. F-Secure Anti-Virus for Handheld Devices from F-Secure
6. Kaspersky Anti-Virus
7. Kaspersky Security for PDAs
8. McAfee VirusScan

How can virus affect us?

Computer viruses affect the health of your computer, just like their biological counterparts make you sick. Typical payloads of computer virus include annoyances (e.g. affecting your mouse / keyboard), removing files from your hard disk and formatting your hard disk. It is only with the discovery of CIH virus that corruption to the BIOS has been added to the list of payloads.
Computer viruses may seem remote from you. This may have been true in the old days, when few of us had a PC at home and viruses were spread slowly with the exchange of floppy disks. However, times have changed; viruses can now reach us through a number of routes. They may arrive in shared files in the server, in emails from your colleagues, or in files downloaded from the Internet and BBS. Worst still, some vendors have delivered machines or CD-ROMS with viruses pre-installed. So, your files and data are at stake.

How to detect virus?

New viruses are being developed every day. New techniques may render existing preventive measures insufficient. The only truth in virus and anti-virus field is that there is no absolute security. However, we can minimize the damage by identifying virus infections before they carry out their payload. The following lists some ways to detect virus infections:
· Watch out for any changes in machine behavior. Any of the following signs could be symptoms of virus activity:
Programs take longer time than usual to execute
Sudden reduction in system memory available or disk space
· A memory-resident anti-virus software can be employed to continuously monitor the computer for viruses.
· Scan your hard disk with an anti-virus software. You should make sure that an up-to-date virus signature has been applied.
· Employ server-based anti-virus software to protect your network. You should also consider employing application-based anti-virus software (e.g. those running on Lotus Notes) to further protect your machine.
3.1 How to clean virus?
Virus has been found? Don't panic! The following are some pieces of advice about removing computer virus:
All activities on the infected machine should be stopped (and it should be detached from the network) as the payload may be triggered at any time. Continuing the use of the infected machine help the suspected virus spread further.
Recover from backup is the most secure and effective way to recover the files.
In some cases, you may recover the boot sector, partition table and even the BIOS data using the emergency recovery disk.
In case you do not have the latest backup of your files, you may try to remove the virus using anti-virus software.
1.Types Of Virus
a.Salami Attack
b.Worm
c.Trojan Horse

What is Worm?
•Computer Worms are viruses that reside in the active memory of a computer and duplicate themselves. They may send copies of themselves to other computers, such as through email or Internet Relay Chat (IRC).

What is Salami Attack?

•A salami attack is a series of minor data-security attacks that together results in a larger attack. For example, a fraud activity in a bank where an employee steals a small amount of funds from several accounts, can be considered a salami attack.
•Crimes involving salami attacks typically are difficult to detect and trace.

What is Trojan Horse?

•A Trojan horse program is a malicious program that pretends to be a begin application; a Trojan horse program purposefully does something the user does not expect. Trojans are not viruses since they do not replicate, but Trojan horse programs can be just as destructive.
•Many people use the term to refer only to non-replicating malicious programs, thus making a distinction between Trojans and viruses.

What is a Virus?



Since the first PC virus was found in 1986, the total number of virus has been rocketing to an enormous figure. As many may have known, computer virus is a piece of malicious program which is able to affect the normal operation of a computer system.