Computable.nl
  • Thema’s
    • Carrière
    • Innovatie & Transformatie
    • Cloud & Infrastructuur
    • Data & AI
    • Governance & Privacy
    • Security & Awareness
    • Software & Development
    • Werkplek & Beheer
  • Sectoren
    • Channel
    • Financiële dienstverlening
    • Logistiek
    • Onderwijs
    • Overheid
    • Zorg
  • Awards
    • Overzicht
    • Nieuws
    • Winnaars
    • Partner worden
  • Vacatures
    • Vacatures bekijken
    • Vacatures plaatsen
  • Bedrijven
    • Profielen
    • Producten & Diensten
  • Kennisbank
  • Magazine
  • Nieuwsbrief

Viruses and virus control

29 mei 2003 - 22:004 minuten leestijdOpinieCloud & Infrastructuur
Martin Healey
Martin Healey

Security is both a fascinating and a frightening problem. Many years ago I listened to one of the leading authorities on security point out that it was impossible to make a computer system secure! The increased effort that is made to improve security merely changes the method of breaking it.

It is naïve to think of security as a single topic. There are very different requirements between controlling who can and who cannot access systems, data and applications in normal operations, compared to protection against theft or sabotage. Normal users would not be attempting to break the system, thieves will.
As well as viruses the Internet created another type of problem, or to be more exact exposed it. That is the conflict between high security and ease of use; it is no use frightening the customers off by making the system too difficult to use.
One conclusion of the above is that we need specialist security managers rather than relying on the network manager or similar. In any case employing some specialised consultancy is probably essential if all aspects are to be considered. In any case an assessment should be made of what is economically needed. Spending a fortune to save a few Euros from theft is not a good idea unless there is a something else to consider such as a loss of customers due to adverse publicity.
I can give overviews on security, but I enjoy listening to the real expert’s presentations which tend to follow my presentations. At a recent seminar run by KICK I was very impressed by an exposé of the specific topic of computer viruses, given by Panda Software. Panda is an intriguing company in any case because they are Spanish, a country I don’t associate with software products.
We are all only too aware of the seemingly never ending stream of new viruses that we endure. The Internet is a hackers dream come true; these are strange, disturbed people, vandals in fact. However there is a more worrying trend in which viruses are being used for fraud, more of which another week. The law is getting stricter on hackers, but they won’t go away.
A virus is a small program which copies itself to another program, which when next run will also execute the virus. The cleverer the virus, the more difficult its presence is to detect until too late. There are various types of virus, the main ones being worms, Trojans, boot and macro viruses and many types of file viruses. According to Panda the techniques used by these viruses are classed as stealth, tunnelling, self-encryption, polymorph mutation and armouring. I won’t pretend to know the detailed differences but the names are self explanatory enough for my awareness. The depressing fact that comes out of this is that viruses are now so sophisticated that they deserve classification!
The symptoms that indicate that a virus is present depend upon the type of virus. Some have immediate effect, others can lay dormant for a while, making elimination more difficult. Typical symptoms (when it is rather late in the day!) are iincrease in file size, errors in the execution of applications, damaged directories, reduction of availablememory, system hangs, disappearance of system or data files, no disc access, failure to boot and worst of all, formatting of disc.
The presence of viruses, 85% of which have been spread by e-mail, has of course led to the development of products to protect from them. Let us hope that every one is using them!< BR>
 
Martin Healey, pioneer development Intel-based computers en c/s-architecture. Director of a number of IT specialist companies and an Emeritus Professor of the University of Wales.

Meer over

Malware

Deel

    Inschrijven nieuwsbrief Computable

    Door te klikken op inschrijven geef je toestemming aan Jaarbeurs B.V. om je naam en e-mailadres te verwerken voor het verzenden van een of meer mailings namens Computable. Je kunt je toestemming te allen tijde intrekken via de af­meld­func­tie in de nieuwsbrief.
    Wil je weten hoe Jaarbeurs B.V. omgaat met jouw per­soons­ge­ge­vens? Klik dan hier voor ons privacy statement.

    Whitepapers

    Computable.nl

    Servers onder de loep – Een nieuw tijdperk

    Nieuwe eisen aan prestaties en beveiliging. De toekomst van serverbeheer.

    Computable.nl

    Grip op de soevereine cloud

    Van bewustwording naar daadwerkelijke controle. Sleutelrol voor CIO en CFO.

    Computable.nl

    Virtualisatie heruitgevonden met VM’s en Containers

    15 redenen om bestaande virtuele machines te behouden en ruimte te creëren voor vernieuwing

    Geef een reactie Reactie annuleren

    Je moet ingelogd zijn op om een reactie te plaatsen.

    Populaire berichten

    Meer artikelen

    Uitgelicht

    Partnerartikel
    Innovatie & Transformatie

    SureSync en Logius genomineerd voor Co...

    SureSync is dit jaar trots op drie nominaties bij de Computable Awards 2025. Eén van de meest opvallende nominaties is...

    Meer persberichten

    Meer lezen

    Cloud & Infrastructuur

    Clingendael waarschuwt: Nexperia-ingreep kan uitmonden in geopolitieke chipcrisis

    Innovatie & Transformatie

    It als groeimotor? Alleen met een plan

    Innovatie & Transformatie

    Aanbestedingen botsen met autonomie

    e-mail lost silent drop smishing
    Security & Awareness

    Kort: Bank-smishing x10, Microsoft silent drops lopen spuigaten uit (en meer)

    Cloud & Infrastructuur

    Minister vreest Chinese spelletjes om Nexperia vleugellam te maken

    Carrière

    Onverantwoord gedrag kostte Chinese bestuurder Nexperia de kop

    ...

    Footer

    Direct naar

    • Carrièretests
    • Kennisbank
    • Planning
    • Computable Awards
    • Magazine
    • Ontvang Computable e-Magazine
    • Cybersec e-Magazine
    • Topics
    • Phishing
    • Ransomware
    • NEN 7510

    Producten

    • Adverteren en meer…
    • Jouw Producten en Bedrijfsprofiel
    • Whitepapers & Leads
    • Vacatures & Employer Branding
    • Persberichten

    Contact

    • Colofon
    • Computable en de AVG
    • Service & contact
    • Inschrijven nieuwsbrief
    • Inlog

    Social

    • Facebook
    • X
    • LinkedIn
    • YouTube
    • Instagram
    © 2025 Jaarbeurs
    • Disclaimer
    • Gebruikersvoorwaarden
    • Privacy statement
    Computable.nl is een product van Jaarbeurs