Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Viruses and worms - What can they do?

Viruses and worms - What can they do? "Computer viruses" have received a lot of attention lately. In fact, the best-known "viruses" have not been viruses at all, but "worms," programs that spread through networks instead of modifying programs. Both viruses and worms reproduce themselves and defensive measures have focused on stopping or slowing their spread. But that is only one tack you can take. Preventing or limiting the effect of the harm that their components can cause is another. Still other measures are specific to known viruses. Ultimately, though, there is no defense better than a comprehensive security strategy that embraces user education, crisis-response teams, and technologically sound security measures including, but not limited to, those that relate specifically to the threats posed by viruses and worms. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png ACM SIGSAC Review Association for Computing Machinery

Viruses and worms - What can they do?

ACM SIGSAC Review , Volume 7 (1) – Feb 1, 1989

Loading next page...
 
/lp/association-for-computing-machinery/viruses-and-worms-what-can-they-do-JGh3ZYdPD0
Publisher
Association for Computing Machinery
Copyright
Copyright © 1989 by ACM Inc.
ISSN
0277-920X
DOI
10.1145/70951.70954
Publisher site
See Article on Publisher Site

Abstract

"Computer viruses" have received a lot of attention lately. In fact, the best-known "viruses" have not been viruses at all, but "worms," programs that spread through networks instead of modifying programs. Both viruses and worms reproduce themselves and defensive measures have focused on stopping or slowing their spread. But that is only one tack you can take. Preventing or limiting the effect of the harm that their components can cause is another. Still other measures are specific to known viruses. Ultimately, though, there is no defense better than a comprehensive security strategy that embraces user education, crisis-response teams, and technologically sound security measures including, but not limited to, those that relate specifically to the threats posed by viruses and worms.

Journal

ACM SIGSAC ReviewAssociation for Computing Machinery

Published: Feb 1, 1989

There are no references for this article.