Computer viruses are a nightmare for the computer world. It is a threat to any user who uses a computer network. The computer will not be infected by a virus if the computer is not connected to the outside world. In this case, this is the internet. The Internet can be used as a medium for the spread of the virus to the fullest. There are many types of viruses that are spread through the internet. Some of them are aimed at making money, and there are only as a disrupt activity and computer performance. Some techniques are done to prevent the spread of the virus. Here will be explained how to tackle the virus optimally. The benefit is that the computer used will be free from virus attacks and safe to exchange data publicly. Techniques used include the prevention and prevention of viruses against computer networks are to know the characteristics and workings of the virus.
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
External threats to information system: Malicious software and computer crimesSouman Guha
Many organizations have become so dependent on computer-based and internet based intensive information systems that disruptions of either may cause outcomes ranging from inconvenience to catastrophe. Our reliance on information systems has redefined corporate risk. Management now recognizes that threats to continuing operations include technological issues seldom previously considered. Protecting the corporation's information system and data warrants management's attention. Management's concern with information systems security has changed over recent years. These threats may arise from internal and external sources. Viruses and computer crimes from external sources are two major concerns of management because management has to invest time and resources to face these issues and secure own information system from external sources. These attacks may result in slow network performance, non-availability of a particular website, inability to access any website and most importantly different types of financial fraudulent and forgery are being occurred in modern era. Securing information system, thus, becomes top notch priority of modern organization.
Cyber Security is an important aspect in the field of information technology. Either it is often neglected or given a lesser priority .One of the biggest challenges that we face today is to secure information. The first thing that comes to our mind whenever we think about cyber security is ‘cyber crimes’, which are increasing at a very fast pace. Governments of countries, agencies and companies are taking crucial measures in order to prevent cybercrimes. Despite taking measures cyber security is still a very big concern. This paper mainly lays emphasis on the definition of worms, difference between worms and viruses, behavioural patterns of worms, major categories of worms, aspects of designing of worms, life cycle of worms, history and timeline of worms and a case study of Stuxnet.
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
External threats to information system: Malicious software and computer crimesSouman Guha
Many organizations have become so dependent on computer-based and internet based intensive information systems that disruptions of either may cause outcomes ranging from inconvenience to catastrophe. Our reliance on information systems has redefined corporate risk. Management now recognizes that threats to continuing operations include technological issues seldom previously considered. Protecting the corporation's information system and data warrants management's attention. Management's concern with information systems security has changed over recent years. These threats may arise from internal and external sources. Viruses and computer crimes from external sources are two major concerns of management because management has to invest time and resources to face these issues and secure own information system from external sources. These attacks may result in slow network performance, non-availability of a particular website, inability to access any website and most importantly different types of financial fraudulent and forgery are being occurred in modern era. Securing information system, thus, becomes top notch priority of modern organization.
Cyber Security is an important aspect in the field of information technology. Either it is often neglected or given a lesser priority .One of the biggest challenges that we face today is to secure information. The first thing that comes to our mind whenever we think about cyber security is ‘cyber crimes’, which are increasing at a very fast pace. Governments of countries, agencies and companies are taking crucial measures in order to prevent cybercrimes. Despite taking measures cyber security is still a very big concern. This paper mainly lays emphasis on the definition of worms, difference between worms and viruses, behavioural patterns of worms, major categories of worms, aspects of designing of worms, life cycle of worms, history and timeline of worms and a case study of Stuxnet.
This presentation is intended to increase awareness of Extension Agents to the threats of scams and malware on the Internet. In addition it covers some ways to stay protected from such threats.
Most users do not see front-line activity and 'normal business usage' to be a contributing factor to network security; but it's not all about the back-end. Business behavior is a direct impact to business information system risks.
Slides from our latest webinar "Top 5 Security Threats Facing Businesses Today." Whether or not they are truly the top 5 most dangerous threats may be debatable but the threat they pose to a businesses network are not. Enjoy!
Computer security is the process of preventing and detecting unauthorized use of our computer. Prevention measures help us to stop unauthorized users from accessing any part of your computer system. Detection helps us to determine whether or not someone attempted to break into the system, if they were successful, and what they may have done.
This presentation is intended to increase awareness of Extension Agents to the threats of scams and malware on the Internet. In addition it covers some ways to stay protected from such threats.
Most users do not see front-line activity and 'normal business usage' to be a contributing factor to network security; but it's not all about the back-end. Business behavior is a direct impact to business information system risks.
Slides from our latest webinar "Top 5 Security Threats Facing Businesses Today." Whether or not they are truly the top 5 most dangerous threats may be debatable but the threat they pose to a businesses network are not. Enjoy!
Computer security is the process of preventing and detecting unauthorized use of our computer. Prevention measures help us to stop unauthorized users from accessing any part of your computer system. Detection helps us to determine whether or not someone attempted to break into the system, if they were successful, and what they may have done.
Computer security threats & prevention,Its a proper introduction about computer security and threats and prevention with reference. Have info about threats and their prevention.
Type of Security Threats and its Preventionijsrd.com
Security is a branch of computer technology known as information security as applied to computers and networks. The objective of online security includes protection of information and property from theft, corruption, or threats attack, while allowing the information and property to remain accessible and productive to its intended users. The term online system security means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively. The basic aim of this article is to Prevention against unauthorized security Attack and Threats.
WORM VIRUS ACCESS CONTROL HOW DO WORM VIRUS/COMPUTER WORMS WORK AND SPREAD HOW TO TELL IF YOU’RE COMPUTER HAS A WORM TRPOJAN TYPES OF TROJAN ACCESS CONTROL DISTRIBUTED DENIAL OF SERVICE SQL INJECTIONS & DATA ATTACK AUTHENTICATION BASIC AUTHENTICATION
In modern world, our entire life moves around Computers. Most of our tasks are dependent on
the Computers, like Communication, Ticket Reservations, Researches, Printing, and Education
etc. When we communicate with each other by using Computers through E Mails, a number of
Computers are used for this purpose and the collection of these computers forms a network,
which is called a Computer Network. As more and more peoples are going to be connected
through the general network (INTERNET), the problem of security arises. Now a day, a number
of security issues occur in networks which include Sniffing, Spoofing, Security Attacks,
Malwares, Unauthorized Access, etc. This will create havoc for the users, who wants to
communicate with each other through these networks. So, to make the communication between
two users via the Computer Networks, we have to follow some security measures, which include
using the Firewalls, Anti Malicious Software, Intrusion Detection Systems, Cryptography
Techniques, etc. This paper is basically focused on how the communication between two users
has been performed by using Computer Networks and how to make such a communication
The security and speed of data transmission is very important in data communications, the steps that can be done is to use the appropriate cryptographic and compression algorithms in this case is the Data Encryption Standard and Lempel-Ziv-Welch algorithms combined to get the data safe and also the results good compression so that the transmission process can run properly, safely and quickly.
The problem of electric power quality is a matter of changing the form of voltage, current or frequency that can cause failure of equipment, either utility equipment or consumer property. Components of household equipment there are many nonlinear loads, one of which Mixer. Even a load nonlinear current waveform and voltage is not sinusoidal. Due to the use of household appliances such as mixers, it will cause harmonics problems that can damage the electrical system equipment. This study analyzes the percentage value of harmonics in Mixer and reduces harmonics according to standard. Measurements made before the use of LC passive filter yield total current harmonic distortion value (THDi) is 61.48%, while after passive filter use LC the THDi percentage becomes 23.75%. The order of harmonic current in the 3rd order mixer (IHDi) is 0.4185 A not according to standard, after the use of LC passive filter to 0.088 A and it is in accordance with the desired standard, and with the use of passive filter LC, the power factor value becomes better than 0.75 to 0.98.
This paper examines the long-term simultaneous response between dividend policy and corporate value. The main problem studied is that the dividend policy is responded very slowly to the final goal of corporate value. Analysis of Data was using Vector Autoregression (VAR). The result of the discussion concludes the effect of different simultaneous response every period between dividend policy with corporate value, short-term, medium-term, and long-term. The strongest response to dividend changes comes from free cash flow whereas the highest response to corporate value comes from market book value.
Whatsapp is a social media application that is currently widely used from various circles due to ease of use and security is good enough, the security at the time of communicating at this time is very important as well with Whatsapp. Whatsapp from the network is very secure but on the local storage that contains the message was not safe enough because the message on local storage is not secured properly using a special algorithm even using the software Whatsapp Database Viewer whatsapp message can be known, to improve the security of messages on local storage whatsapp submitted security enhancements using the Modular Multiplication Block Cipher algorithm so that the message on whatsapp would be better in terms of security and not easy to read by unauthorized ones.
Consumers are increasingly easy to access to information resources. Consumers quickly interact with whatever they will spend. Ease of use of technology an impact on consumer an attitude are increasingly intelligent and has encouraged the rise of digital transactions. Technology makes it easy for them to transact on an e-commerce shopping channel. Future e-commerce trends will lead to User Generated Content related to user behavior in Indonesia that tends to compare between shopping channels. The purpose of this study was to examine the direct and indirect effects of Perceived Ease of Use on Behavioral Intention to transact in which Perceived Usefulness is used as an intervening variable. The present study used the descriptive exploratory method with causal-predictive analysis. Determination method of research sample used purposive sampling. The enumerator team assists in the distribution of questionnaires. The results of the study found that the direct effect of perceived ease of use on behavioral intention to transact is smaller than that indirectly mediated by perceived usefulness variables.
Performance is a process of assessment of the algorithm. Speed and security is the performance to be achieved in determining which algorithm is better to use. In determining the optimum route, there are two algorithms that can be used for comparison. The Genetic and Primary algorithms are two very popular algorithms for determining the optimum route on the graph. Prim can minimize circuit to avoid connected loop. Prim will determine the best route based on active vertex. This algorithm is especially useful when applied in a minimum spanning tree case. Genetics works with probability properties. Genetics cannot determine which route has the maximum value. However, genetics can determine the overall optimum route based on appropriate parameters. Each algorithm can be used for the case of the shortest path, minimum spanning tree or traveling salesman problem. The Prim algorithm is superior to the speed of Genetics. The strength of the Genetic algorithm lies in the number of generations and population generated as well as the selection, crossover and mutation processes as the resultant support. The disadvantage of the Genetic algorithm is spending to much time to get the desired result. Overall, the Prim algorithm has better performance than Genetic especially for a large number of vertices.
Implementation of Decision Support System for various purposes now can facilitate policy makers to get the best alternative from a variety of predefined criteria, one of the methods used in the implementation of Decision Support System is VIKOR (Vise Kriterijumska Optimizacija I Kompromisno Resenje), VIKOR method in this research got the best results with an efficient and easily understood process computationally, it is expected that the results of this study facilitate various parties to develop a model any solutions.
Edge detection is one of the most frequent processes in digital image processing for various purposes, one of which is detecting road damage based on crack paths that can be checked using a Canny algorithm. This paper proposed a mobile application to detect cracks in the road and with customized threshold function in the requests to produce useful and accurate edge detection. The experimental results show that the use of threshold function in a canny algorithm can detect better damage in the road
The security and confidentiality of information becomes an important factor in communication, the use of cryptography can be a powerful way of securing the information, IDEA (International Data Encryption Algorithm) and WAKE (Word Auto Key Encryption) are some modern symmetric cryptography algorithms with encryption and decryption function are much faster than the asymmetric cryptographic algorithm, with the combination experiment IDEA and WAKE it probable to produce highly secret ciphertext and it hopes to take a very long time for cryptanalyst to decrypt the information without knowing the key of the encryption process.
Employees are the backbone of corporate activities and the giving of bonuses, job titles and allowances to employees to motivate the work of employees is very necessary, salesman on the company very much and to find the best salesman cannot be done manually and for that required the implementation of a system in this decision support system by applying the TOPSIS method, it is expected with the implementation of TOPSIS method the expected results of top management can be fulfilled.
English is a language that must be known all-digital era at this time where almost all information is in English, ranging from kindergarten to college learn English. elementary school is now also there are learning and to help introduce English is prototype application recogni-tion of common words in English and can be updated dynamically so that updates occur information to new words and sentences in Eng-lish to be introduced to students.
The selection of the best employees is one of the process of evaluating how well the performance of the employees is adjusted to the standards set by the company and usually done by top management such as General Manager or Director. In general, the selection of the best employees is still perform manually with many criteria and alternatives, and this usually make it difficult top managerial making decisions as well as the selection of the best employees periodically into a long and complicated process. Therefore, it is necessary to build a decision support system that can help facilitate the decision maker in determining the best choice based on standard criteria, faster, and more objective. In this research, the computational method of decision-making system used is Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS). The criteria used in the selection of the best employees are: job responsibilities, work discipline, work quality, and behaviour. The final result of the global priority value of the best employee candidates is used as the best employee selection decision making tool by top management.
Rabin Karp algorithm is a search algorithm that searches for a substring pattern in a text using hashing. It is beneficial for matching words with many patterns. One of the practical applications of Rabin Karp's algorithm is in the detection of plagiarism. Michael O. Rabin and Richard M. Karp invented the algorithm. This algorithm performs string search by using a hash function. A hash function is the values that are compared between two documents to determine the level of similarity of the document. Rabin-Karp algorithm is not very good for single pattern text search. This algorithm is perfect for multiple pattern search. The Levenshtein algorithm can be used to replace the hash calculation on the Rabin-Karp algorithm. The hash calculation on Rabin-Karp only counts the number of hashes that have the same value in both documents. Using the Levenshtein algorithm, the calculation of the hash distance in both documents will result in better accuracy.
Cybercrime is a digital crime committed to reaping profits through the Internet as a medium. Any criminal activity that occurs in the digital world or through the internet network is referred to as internet crime. Cybercrime also refers to criminal activity on computers and computer networks. This activity can be done in a certain location or even done between countries. These crimes include credit card forgery, confidence fraud, the dissemination of personal information, pornography, and so on. In ancient times there was no strong law to combat cybercrime. Since there are electronic information laws and transactions, legal jurisdiction of computer crime has been applied. Computer networks are not only installed in one particular local area but can be applied to a worldwide network. It is what makes cybercrime can occur between countries freely. This issue requires universal jurisdiction. A country has the authority to combat crimes that threaten the international community. This jurisdiction is applied without determining where the crime was committed and the citizen who committed the cybercrime. This jurisdiction is created in the absence of an international judicial body specifically to try individual crimes. Cybercrime cannot be totally eradicated. Implementing international jurisdiction at least reduces the number of cybercrimes in the world.
Competitive market competition so the company must be smart in managing finance. In promoting the selling point, marketing is the most important step to be considered. Promotional routine activity is one of the marketing techniques to increase consumer appeal to marketed products. One of the important agendas of promotion is the selection of the most appropriate promotional media. The problem that often occurs in the process of selecting a promotional media is the subjectivity of decision making. Marketing activities have a taxation fund that must be issued. Limited funds are one of the constraints of improving market strategy. So far, the selection of promotional media is performed by the company manually using standardized determination that already applies. It has many shortcomings, among others, regarding effectiveness and efficiency of time and limited funds. Markov Chain is very helpful to the company in analyzing the development of the company over a period. This method can predict the market share in the future so that company can optimize promotion cost at the certain time. Implementation of this algorithm produces a percentage of market share so that businesses can determine and choose which way is more appropriate to improve the company's market strategy. Assessment is done by looking at consumer criteria of a particular product. These criteria can determine consumer interest in a product so that it can be analyzed consumer behavior.
The transition of copper cable technology to fiber optic is very triggering the development of technology where data can be transmitted quickly and accurately. This cable change can be seen everywhere. This cable is an expensive cable. If it is not installed optimally, it will cost enormously. This excess cost can be used to other things to support performance rather than for excess cable that should be minimized. Determining how much cable use at the time of installation is difficult if done manually. Prim's algorithm can optimize by calculating the minimum spanning tree on branches used for fiber optic cable installation. This algorithm can be used to shorten the time to a destination by making all the points interconnected according to the points listed. Use of this method helps save the cost of fiber optic construction.
An image is a medium for conveying information. The information contained therein may be a particular event, experience or moment. Not infrequently many images that have similarities. However, this level of similarity is not easily detected by the human eye. Eigenface is one technique to calculate the resemblance of an object. This technique calculates based on the intensity of the colors that exist in the two images compared. The stages used are normalization, eigenface, training, and testing. Eigenface is used to calculate pixel proximity between images. This calculation yields the feature value used for comparison. The smallest value of the feature value is an image very close to the original image. Application of this method is very helpful for analysts to predict the likeness of digital images. Also, it can be used in the field of steganography, digital forensic, face recognition and so forth.
Compression is an activity performed to reduce its size into smaller than earlier. Compression is created since lack of adequate storage capacity. Data compression is also needed to speed up data transmission activity between computer networks. Compression has the different rule between speed and density. Compressed compression will take longer than compression that relies on speed. Elias Delta is one of the lossless compression techniques that can compress the characters. This compression is created based on the frequency of the character of a character on a document to be compressed. It works based on bit deductions on seven or eight bits. The most common characters will have the least number of bits, while the fewest characters will have the longest number of bits. The formation of character sets serves to eliminate double characters in the calculation of the number of each character as well as for the compression table storage. It has a good level of comparison between before and after compression. The speed of compression and decompression process possessed by this method is outstanding and fast.
Technological developments in computer networks increasingly demand security on systems built. Security also requires flexibility, efficiency, and effectiveness. The exchange of information through the internet connection is a common thing to do now. However, this way can be able to trigger data theft or cyber crime which resulted in losses for both parties. Data theft rate is getting higher by using a wireless network. The wireless system does not have any signal restrictions that can be intercepted Filtering is used to restrict incoming access through the internet. It aims to avoid intruders or people who want to steal data. This is fatal if not anticipated. IP and MAC filtering is a way to protect wireless networks from being used and misused by just anyone. This technique is very useful for securing data on the computer if it joins the public network. By registering IP and MAC on a router, this will keep the information unused and stolen. This system is only a few computers that can be connected to a wireless hotspot by IP and MAC Address listed.
Catfish is one type of freshwater fish. This fish has a good taste. In the cultivation of these fish, many obstacles need to be faced. Because living in dirty water, this type of fish is susceptible to disease. Many symptoms arise during the fish cultivation process; From skin disease to physical. Catfish farmers do not know how to diagnose diseases that exist in their livestock. This diagnosis serves to separate places between good and sick catfish. The goal is that the sale value of the fish is high. Catfish that have diseases will be sold cheaper to be used as other animal feed while healthy fish will be sold to the market or exported to other countries. Diagnosis can be done by expert system method. The algorithm of certainty factor is one of the good algorithms to determine the percentage of possible fish disease. This algorithm is very helpful for farmers to improve catfish farming.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...NelTorrente
In this research, it concludes that while the readiness of teachers in Caloocan City to implement the MATATAG Curriculum is generally positive, targeted efforts in professional development, resource distribution, support networks, and comprehensive preparation can address the existing gaps and ensure successful curriculum implementation.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
2. International Journal of Scientific Research in Science and Technology (www.ijsrst.com) 449
Adleman in November 1983 in a seminar that discusses
how to make viruses and protect themselves from
viruses. However, people often assume that the virus
that first appeared in the Brain virus Was born in 1986.
Naturally, people assume that way because this virus is
the most shocking and most widespread because it
spreads through the DOS diskette which at that time is
popular. At that time, it began to propagate extensively.
It is about a year before the first virus appears to infect
files. Usually this virus attacks the *.exe files. This virus
is called Suriv. The speed of the spread is rapid. It
attacked the mainframe from IBM about a year [3].
In 1988, a virus appeared that attacked Macintosh. The
name of this virus is Macmag and Scores. At the same
time, an internet-attacking virus was created by Robert
Morris. In 1995, there was a virus that attacked large
corporations including Griffith Air Force Base, Korean
Atomic Research Institute, NASA, IBM and much more
by the Internet Liberation Front on Thanksgiving Day.
Therefore, in 1995 dubbed as the year the hackers and
crackers [4][5][6][7].
2.2 Trojan
Trojans in a computer system is a program that is not
expected and inserted without the knowledge of the
owner of the equipment. This program has a remote
control. Usually Trojan is a client-server program. It is
designed so that trojans can be controlled and given
orders by the maker remotely. It can also be a time bomb
where a code will be executed at a certain time. As a
result, computers infected by a trojan are completely
under the control of that person. Trojan is a program
used to carry out an important function of a crime. These
codes are usually hidden and unknown to the user. The
program performs unidentified functions and steals all
necessary data and will be sent to the program's creators
[4].
2.3 Spam
Spam is messages sent to somebody containing
unrelated information during internet activity. The
purpose of spam is to advertise certain products or
services. These ads are usually inserted by viruses,
trojans, or worms. Spam is disseminated via email by
displaying links to specific sites or files. At this time
spam is also disseminated through chat, social media,
and programs that are installed on the gadget. The main
purpose of spam is for promotion. However, there is also
spam containing propaganda and virus content. Spam is
very harmful to organizations that use email facilities
primarily for military and state activities. Spam can
cause stacks on useless messages. It will be fatal. The
operating system will not be able to withstand the
amount of spam sent to the system. Spam also often
contains malware so that the system will send spam to
other computers while connected to the internet [5].
2.4 Worm
A worm is a computer program that can perform self-
duplication on a system. An embedded worm infects the
computer's registry and creates a script to multiply itself
by utilizing a computer network without the need for
authentication from the brain-ware. In contrast to
computer viruses, worms exploit vulnerabilities that are
accidentally exposed. Some worms also spend the
available bandwidth because of a continuous process. A
worm is a variant of computer viruses. It can be
overcome by closing the path of possibility to enter into
the system. This gap is open so that the worm easily
enters and infects the computer system. Worms can
infect data on the computer in a subtle and hidden way.
It is much better than the system done by the virus in
general. Typically, the worm will disseminate itself if
the computer network is connected to the outside world.
Some worms may include virus codes that can damage
files, steal documents, e-mail, or perform other
destructive things [6].
2.5 Spyware
Spyware is a program that can record secretly any
computer network activity. It can steal PIN, password,
bank account and others. The recorded data will be sent
to the virus maker. If there is valuable data, it will be
sold to other parties who can drop the opponent.
Spyware deployment can not be detected. It comes from
programs that are downloaded from the internet that is
usually already modified and inserted by spyware
programs. It can also be infected from sites containing
adult content or gambling. Spyware can degrade and
damage the performance of the operating system and
application programs installed on the computer. It is a
3. International Journal of Scientific Research in Science and Technology (www.ijsrst.com) 450
program that is difficult to be discarded even though the
computer is already doing the recovery process [6].
2.6 Adware
Adware is a product or service offering that is part of a
site or app. Scripts written on a web page allow adware
to run on its own and will appear when activating certain
sites. Adware is very easy to dispose of, but there is also
adware that has a strong defense. Some Adware is
embedded in applications downloaded from the internet.
At the time of installing the program, there are several
options feature that inadvertently serves to activate
adware function. As a result, they can be attached to the
computer and greatly disrupt the performance of the
operating system. The disadvantage of adware is that the
computer will pop out a pop-up window containing
certain advertisements which, when clicked, will lead to
untrusted sites [7].
III. Result and Discussion
3.1 How A Virus Works
A computer virus is a code that can destruct files or
system. It has many types and different ways of working.
Communication technology is one way to spread the
virus. With the connection of a system to the public
system will increase the percentage of possibilities
infected with computer viruses. The hackers easily
attack and make the computers as their main target.
They will insert a killer program on any system that has
been successfully taken over. Viruses can spread via
VPN to networks owned by the government or other
legal entities. Internet of things is one medium for
viruses to multiply. Use of a variety of supporting
applications will allow the virus to grow. It will make it
easier for hackers to exploit vulnerabilities. The
following types of viruses and the workings of each
virus:
1. File Virus
This virus has a working method of infecting
applications or documents that exist in your
computer. When the infected application is run, then
this virus will spread by infecting all files or
documents accessed by the application.
2. Boot Sector Virus
This virus has a working way of infecting a region
in the hard drive that was first accessed when the
computer is boot up. If the boot sector virus is
active, the user will not be able to boot his computer
normally. It slows down the speed.
3. Macro Virus
It is usually embedded in some application. It cannot
be a stand-alone virus. It infects Microsoft Office
applications, such as Word and Excel. Documents
infected by Macro Virus will modify or add existing
commands to propagate itself when the command is
executed.
4. E-mail Virus
This virus works by e-mail. It especially has an
attachment. It has special features such as extension
.exe, .pif, or .bat. If the virus is active, then it will
send a destructive code to many e-mail address
randomly.
5. Polymorphic Virus
It can change the code when infected to another
computer. It is done to hide them from being
detected. It is more difficult to remove since they are
hidden and no properties.
Virus attacks can be prevented or mitigated using
antivirus software. This type of software can also detect
and remove computer viruses. The software vendor must
provide and renew the computer virus database to kill
the infected computer.
3.2 Prevention
System security can be divided into two ways,
prevention, and treatment. They are differentiated based
on the time of infection. Prevention efforts are
performed before infection. It is an action so that the
system does not have a gap that can be exploited by the
virus to thrive. Treatment can be done after a system has
been infected. It aims to fix a weak and open security
hole. Prevention is done by finding the weak point of the
security hole that has been exploited and eliminates the
cause of infection. Viruses often modify startup files,
add or modify commands to the registry and also write
code to run a command on a computer system. It works
4. International Journal of Scientific Research in Science and Technology (www.ijsrst.com) 451
to override the system at boot time. With these reasons,
then to remove the virus takes a long period and high
accuracy. This process is a process full of dangers,
including removing the suspected registry. This security
measure may lose some of the valuable information.
3.3 Recovery
Anti-virus works to detect viruses, not to detect Trojans,
Malware, Adware, and Spam. However, when these
types of viruses begin to develop and cause many
problems, anti-virus makers add additional data to the
coding.
The simple steps taken to remove the virus from the
system are:
Identify the virus file on the hard drive.
Find out how the virus activates itself and take
necessary action to prevent it from running virus
after reboot.
Reboot the computer and remove the virus.
Observe the difference in computer performance
before and after healing.
The above steps are one option to remove a virus from a
computer. However, the best step is to re-install all
computer programs with new ones. The virus will
automatically disappear when the computer has a new
system.
IV. Conclusion
The development of computer system technology is a
computer virus media to disseminate killer codes. It
starts from spreading through floppy disks and boot
sectors early in the development of computers, then goes
through the internet. Moreover, when the system is
already using wireless technology, various other types of
viruses will continue to grow up. Viruses are a threat to
computer users in cyberspace. Understanding of viruses
such as trojans, worms, malware, adware and others
need to be known and anticipated by computer network
users. It has a great potential danger when the computer
is connected globally. Understanding includes how work,
types, sources, and goals are the first steps to anticipate.
Computer network users often do not know that a virus
has infected their computers. It is expected to give
lessons to the user to be able to detect and eliminate
viruses that are already in the system. It aims to prevent
re-infection of systems that are already free from such
threats. With that knowledge, computer users will be
more careful and conscientious of the system connected
publicly.
V. REFERENCES
[1]. S. Natarajan and S. Rajarajesware, "Computer Virus:
A Major Network Security Threat," International
Journal of Innovative Research & Development, vol.
3, no. 7, pp. 229-302, 2014.
[2]. S. Chakraborty, "A Comparison study of Computer
Virus and Detection Techniques," International
Journal of Scientific Research in Computer Science,
Engineering and Information Technology, vol. 2, no.
1, pp. 236-240, 2017.
[3]. M. Khari and C. Bajaj, "Detecting Computer
Viruses," International Journal of Advanced
Research in Computer Engineering & Technology,
vol. 3, no. 7, pp. 2357-2364, 2014.
[4]. L. X. Yang, X. Yang, L. Wen and J. Liu, "A Novel
Computer Virus Propagation Model and its
Dynamics," International Journal of Computer
Mathematics, vol. 89, no. 17, pp. 2307-2314, 2012.
[5]. P. R. Shah, Y. Shah and S. Madan, "Mobile Viruses,"
in International Conference on Recent Trends in
Information Technology and Computer Science,
2011.
[6]. P. Qin, "Analysis of a Model for Computer Virus
Transmission," Hindawi Publishing Corporation
Mathematical Problems in Engineering, pp. 1-10,
2015.
[7]. S. Ramadhani, Y. M. Saragih, R. Rahim and A. P. U.
Siahaan, "Post-Genesis Digital Forensics
Investigation," International Journal of Scientific
Research in Science and Technology, vol. 3, no. 6,
pp. 164-166, 2017.
[8]. Hariyanto and A. P. U. Siahaan, "Intrusion Detection
System in Network Forensic Analysis and
Investigation," IOSR Journal of Computer
Engineering, vol. 18, no. 6, pp. 115-121, 2016.