Access the full text.
Sign up today, get DeepDyve free for 14 days.
(1987)
Taxonomy of Computer Virus Defense Mechanisms
H. Highland (1988)
How to combat a computer virusComput. Secur., 7
(1988)
27) Office of the Secretary of Defense, "I)ARPA Establishes Computer Emergency Response Team
(1987)
Contemporary Data Security: A l,eadership Vacuum
James Anderson (1972)
Computer Security Technology Planning Study
(1978)
System/38 Object-Oriented Architecture," IBM System~38 Technical Developments, International Business Machines Corporation
(1976)
Crime by Computer, Charles Scribner's
J. Gunn (1984)
Use of virus functions to provide a virtual APL interpreter under user control
(1988)
An Isolation Mechanism for the Evaluation of Software for Malicious Code
(1989)
Computer Crimes, Viruses and Other Crimoids," speech presented to the Commonwealth Club
(2an we, or Should we, Trust Data We Get From Others? Computers and Security, forthcoming
V. Fåk (1988)
Computer viruses: Are we vulnerable to a virus attack? A report from SwedenComputers & Security, 7
(1987)
Computer Viruses: Theory and I;xperiments
(1988)
Antiviral Measures--Which Ones Pay?
References SK
(1988)
I 8) International Business Machines CorporationAS-400 Programming: Security Concepts and Planning Form Number SC21-8083
D. Seeley (1988)
A Tour of the Worm
Dr. Panda Utilities, Panda Systems
D. Clark, D. Wilson (1987)
A Comparison of Commercial and Military Computer Security Policies1987 IEEE Symposium on Security and Privacy
Worldwide Data Corporation
James Marting (1973)
Security, Accuracy, and Privacy in Computer Systems
A. Kohn (1989)
[Computer viruses].Harefuah, 116 11
(1988)
Proccedings of the Virus (sic) Post-Mortem Meeting
3) Chess, David, Private communication
Swarthrnore Software Systems, Swarthmorc, Pennsylvania 2. Check-4-Bomb, Swarthmore Software Systems
Steve White, D. Chess, C. Kuo (1990)
Coping with computer viruses and related problems
Frank Davis, R. Gantenbein (1987)
Recovering from a computer virus attackJ. Syst. Softw., 7
(1987)
Security in Multi-Company Networks
H. Highland (1988)
An overview of 18 virus protection productsComput. Secur., 7
M. Pozzo, T. Gray (1987)
An approach to containing computer virusesComput. Secur., 6
California A less orthodx source is "A Software Bestiary" by Corinne Cullen Hawkins on Pages 107-112 of the Fall 1988 issue of
(1989)
The Virus Cure
Mark Eichin, Jon Rochlis (1989)
With microscope and tweezers: an analysis of the Internet virus of November 1988Proceedings. 1989 IEEE Symposium on Security and Privacy
Disk Watcher, RG Software Systems
Esther Highland (1988)
Computer systems under siegeComputers & Security, 7
W. Murray (1988)
Computer viruses: The application of epidemiology to computer virusesComputers & Security, 7
J. Shoch, J. Hupp (1982)
The “worm” programs—early experience with a distributed computationCommun. ACM, 25
H. Highland (1988)
The brain virus: Fact and fantasyComput. Secur., 7
(1988)
Revised List of Virus Filters
Disk Defender, Director Technologies
E. Spafford (1989)
The internet worm program: an analysisComput. Commun. Rev., 19
"Computer viruses" have received a lot of attention lately. In fact, the best-known "viruses" have not been viruses at all, but "worms," programs that spread through networks instead of modifying programs. Both viruses and worms reproduce themselves and defensive measures have focused on stopping or slowing their spread. But that is only one tack you can take. Preventing or limiting the effect of the harm that their components can cause is another. Still other measures are specific to known viruses. Ultimately, though, there is no defense better than a comprehensive security strategy that embraces user education, crisis-response teams, and technologically sound security measures including, but not limited to, those that relate specifically to the threats posed by viruses and worms.
ACM SIGSAC Review – Association for Computing Machinery
Published: Feb 1, 1989
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.