skip to content
Software and the Virus Threat: Providing Authenticity in Distribution. Preview this item
ClosePreview this item
Checking...

Software and the Virus Threat: Providing Authenticity in Distribution.

Author: George M LaVenture; NAVAL POSTGRADUATE SCHOOL MONTEREY CA.
Publisher: Ft. Belvoir : Defense Technical Information Center, MAR 1991.
Dissertation: Thesis (Master').
Edition/Format:   Thesis/dissertation : Thesis/dissertation : eBook : English
Summary:
Computer viruses have threatened the integrity and reliability of computer systems since 1983. Literally hundreds of viruses exist for the IBM compatible computer alone. These viruses can cause corruption or loss of program and data files, incidental damage to hardware, and degradation or loss of system performance. This paper examines the nature of the virus threat by discussing virus types, methods and rates of  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Thesis/dissertation, Internet resource
Document Type: Internet Resource
All Authors / Contributors: George M LaVenture; NAVAL POSTGRADUATE SCHOOL MONTEREY CA.
OCLC Number: 227777123
Description: 82 pages ; 23 x 29 cm

Abstract:

Computer viruses have threatened the integrity and reliability of computer systems since 1983. Literally hundreds of viruses exist for the IBM compatible computer alone. These viruses can cause corruption or loss of program and data files, incidental damage to hardware, and degradation or loss of system performance. This paper examines the nature of the virus threat by discussing virus types, methods and rates of propagation, relative frequencies of occurrence, and genealogy. Possible methods for virus detection and identification, followed by disinfection, are outlined. Minimum capabilities and testing criteria for these products are also detailed. Methods for controlling and limiting infection and damage are discussed. These are considered minimum acceptable safeguards to be implemented by an organization. Lastly, software authentication means are examined, which, when used in conjunction with the minimum safeguards, would eliminate the possibility of viral infection.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/227777123> # Software and the Virus Threat: Providing Authenticity in Distribution.
    a pto:Web_document, schema:CreativeWork, schema:Book, bgn:Thesis ;
   bgn:inSupportOf "Thesis (Master')." ;
   library:oclcnum "227777123" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/vau> ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/137450929#Place/ft_belvoir> ; # Ft. Belvoir
   schema:about <http://experiment.worldcat.org/entity/work/data/137450929#Topic/computer_viruses> ; # Computer viruses
   schema:about <http://experiment.worldcat.org/entity/work/data/137450929#Topic/disinfection> ; # Disinfection
   schema:about <http://experiment.worldcat.org/entity/work/data/137450929#Topic/rates> ; # Rates
   schema:about <http://experiment.worldcat.org/entity/work/data/137450929#Topic/data_bases> ; # Data bases
   schema:about <http://experiment.worldcat.org/entity/work/data/137450929#Topic/computer_systems_management_and_standards> ; # Computer systems management and standards
   schema:about <http://experiment.worldcat.org/entity/work/data/137450929#Topic/computer_programs> ; # Computer programs
   schema:about <http://experiment.worldcat.org/entity/work/data/137450929#Topic/reliability> ; # Reliability
   schema:about <http://experiment.worldcat.org/entity/work/data/137450929#Topic/theses> ; # Theses
   schema:about <http://experiment.worldcat.org/entity/work/data/137450929#Topic/frequency> ; # Frequency
   schema:about <http://experiment.worldcat.org/entity/work/data/137450929#Topic/computers> ; # Computers
   schema:about <http://experiment.worldcat.org/entity/work/data/137450929#Topic/detection> ; # Detection
   schema:about <http://experiment.worldcat.org/entity/work/data/137450929#Topic/propagation> ; # Propagation
   schema:about <http://experiment.worldcat.org/entity/work/data/137450929#Topic/losses> ; # Losses
   schema:about <http://experiment.worldcat.org/entity/work/data/137450929#Topic/degradation> ; # Degradation
   schema:about <http://experiment.worldcat.org/entity/work/data/137450929#Topic/threats> ; # Threats
   schema:about <http://experiment.worldcat.org/entity/work/data/137450929#Topic/files_records> ; # Files(records)
   schema:about <http://experiment.worldcat.org/entity/work/data/137450929#Topic/limitations> ; # Limitations
   schema:about <http://experiment.worldcat.org/entity/work/data/137450929#Topic/damage> ; # Damage
   schema:about <http://experiment.worldcat.org/entity/work/data/137450929#Thing/prevention> ; # PREVENTION
   schema:contributor <http://experiment.worldcat.org/entity/work/data/137450929#Organization/naval_postgraduate_school_monterey_ca> ; # NAVAL POSTGRADUATE SCHOOL MONTEREY CA.
   schema:contributor <http://experiment.worldcat.org/entity/work/data/137450929#Person/laventure_george_m> ; # George M. LaVenture
   schema:datePublished "1991" ;
   schema:datePublished "MAR 1991" ;
   schema:description "Computer viruses have threatened the integrity and reliability of computer systems since 1983. Literally hundreds of viruses exist for the IBM compatible computer alone. These viruses can cause corruption or loss of program and data files, incidental damage to hardware, and degradation or loss of system performance. This paper examines the nature of the virus threat by discussing virus types, methods and rates of propagation, relative frequencies of occurrence, and genealogy. Possible methods for virus detection and identification, followed by disinfection, are outlined. Minimum capabilities and testing criteria for these products are also detailed. Methods for controlling and limiting infection and damage are discussed. These are considered minimum acceptable safeguards to be implemented by an organization. Lastly, software authentication means are examined, which, when used in conjunction with the minimum safeguards, would eliminate the possibility of viral infection."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/137450929> ;
   schema:inLanguage "en" ;
   schema:name "Software and the Virus Threat: Providing Authenticity in Distribution."@en ;
   schema:productID "227777123" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/227777123#PublicationEvent/ft_belvoir_defense_technical_information_center_mar_1991> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/137450929#Agent/defense_technical_information_center> ; # Defense Technical Information Center
   schema:url <http://handle.dtic.mil/100.2/ADA246083> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/227777123> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/137450929#Agent/defense_technical_information_center> # Defense Technical Information Center
    a bgn:Agent ;
   schema:name "Defense Technical Information Center" ;
    .

<http://experiment.worldcat.org/entity/work/data/137450929#Organization/naval_postgraduate_school_monterey_ca> # NAVAL POSTGRADUATE SCHOOL MONTEREY CA.
    a schema:Organization ;
   schema:name "NAVAL POSTGRADUATE SCHOOL MONTEREY CA." ;
    .

<http://experiment.worldcat.org/entity/work/data/137450929#Person/laventure_george_m> # George M. LaVenture
    a schema:Person ;
   schema:familyName "LaVenture" ;
   schema:givenName "George M." ;
   schema:name "George M. LaVenture" ;
    .

<http://experiment.worldcat.org/entity/work/data/137450929#Topic/computer_systems_management_and_standards> # Computer systems management and standards
    a schema:Intangible ;
   schema:name "Computer systems management and standards"@en ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.