Computable.nl
  • Thema’s
    • Carrière
    • Innovatie & Transformatie
    • Cloud & Infrastructuur
    • Data & AI
    • Governance & Privacy
    • Security & Awareness
    • Software & Development
    • Werkplek & Beheer
  • Sectoren
    • Channel
    • Financiële dienstverlening
    • Logistiek
    • Onderwijs
    • Overheid
    • Zorg
  • Awards
    • Overzicht
    • Nieuws
    • Winnaars
    • Partner worden
  • Vacatures
    • Vacatures bekijken
    • Vacatures plaatsen
  • Bedrijven
    • Profielen
    • Producten & Diensten
  • Kennisbank
  • Magazine
  • Nieuwsbrief

Viruses and virus control

29 mei 2003 - 22:004 minuten leestijdOpinieCloud & Infrastructuur
Martin Healey
Martin Healey

Security is both a fascinating and a frightening problem. Many years ago I listened to one of the leading authorities on security point out that it was impossible to make a computer system secure! The increased effort that is made to improve security merely changes the method of breaking it.

It is naïve to think of security as a single topic. There are very different requirements between controlling who can and who cannot access systems, data and applications in normal operations, compared to protection against theft or sabotage. Normal users would not be attempting to break the system, thieves will.
As well as viruses the Internet created another type of problem, or to be more exact exposed it. That is the conflict between high security and ease of use; it is no use frightening the customers off by making the system too difficult to use.
One conclusion of the above is that we need specialist security managers rather than relying on the network manager or similar. In any case employing some specialised consultancy is probably essential if all aspects are to be considered. In any case an assessment should be made of what is economically needed. Spending a fortune to save a few Euros from theft is not a good idea unless there is a something else to consider such as a loss of customers due to adverse publicity.
I can give overviews on security, but I enjoy listening to the real expert’s presentations which tend to follow my presentations. At a recent seminar run by KICK I was very impressed by an exposé of the specific topic of computer viruses, given by Panda Software. Panda is an intriguing company in any case because they are Spanish, a country I don’t associate with software products.
We are all only too aware of the seemingly never ending stream of new viruses that we endure. The Internet is a hackers dream come true; these are strange, disturbed people, vandals in fact. However there is a more worrying trend in which viruses are being used for fraud, more of which another week. The law is getting stricter on hackers, but they won’t go away.
A virus is a small program which copies itself to another program, which when next run will also execute the virus. The cleverer the virus, the more difficult its presence is to detect until too late. There are various types of virus, the main ones being worms, Trojans, boot and macro viruses and many types of file viruses. According to Panda the techniques used by these viruses are classed as stealth, tunnelling, self-encryption, polymorph mutation and armouring. I won’t pretend to know the detailed differences but the names are self explanatory enough for my awareness. The depressing fact that comes out of this is that viruses are now so sophisticated that they deserve classification!
The symptoms that indicate that a virus is present depend upon the type of virus. Some have immediate effect, others can lay dormant for a while, making elimination more difficult. Typical symptoms (when it is rather late in the day!) are iincrease in file size, errors in the execution of applications, damaged directories, reduction of availablememory, system hangs, disappearance of system or data files, no disc access, failure to boot and worst of all, formatting of disc.
The presence of viruses, 85% of which have been spread by e-mail, has of course led to the development of products to protect from them. Let us hope that every one is using them!< BR>
 
Martin Healey, pioneer development Intel-based computers en c/s-architecture. Director of a number of IT specialist companies and an Emeritus Professor of the University of Wales.

Meer over

Malware

Deel

    Inschrijven nieuwsbrief Computable

    Door te klikken op inschrijven geef je toestemming aan Jaarbeurs B.V. om je naam en e-mailadres te verwerken voor het verzenden van een of meer mailings namens Computable. Je kunt je toestemming te allen tijde intrekken via de af­meld­func­tie in de nieuwsbrief.
    Wil je weten hoe Jaarbeurs B.V. omgaat met jouw per­soons­ge­ge­vens? Klik dan hier voor ons privacy statement.

    Whitepapers

    Computable.nl

    Slim verbonden en veilig georganiseerd

    Waarom connectiviteit en security onlosmakelijk verbonden zijn.

    Computable.nl

    Kies de juiste virtualisatie-aanpak

    Vergelijk drie krachtige open source-oplossingen: Proxmox, Kubernetes en OpenStack

    Computable.nl

    Beveiliging begint bij de Server

    Is serverhardware de blinde vlek in het securitybeleid? Waarom lifecycle-denken cruciaal is voor IT-security

    Geef een reactie Reactie annuleren

    Je moet ingelogd zijn op om een reactie te plaatsen.

    Populaire berichten

    Meer artikelen

    Uitgelicht

    Partnerartikel
    AdvertorialData & AI

    AI in softwaretesten: tussen belofte e...

    De opkomst van kunstmatige intelligentie (AI) wekte hoge verwachtingen in de wereld van softwaretesten. Zelflerende testsuites, automatisch gegenereerde testgevallen en...

    Meer persberichten

    Meer lezen

    ActueelSoftware & Development

    Value8 wil totale controle over Ctac

    soevereine cloud
    AchtergrondCloud & Infrastructuur

    Hoe soeverein moet de NDS zijn?

    AchtergrondSecurity & Awareness

    Twee dagen volle bak met prominente ot-rol

    ActueelCloud & Infrastructuur

    Navo moderniseert it-infrastructuur met Oracle en Thales

    Luchtfoto van het datacenter-complex van Microsoft in Middenmeer.
    ActueelData & AI

    Microsoft breidt datacenter in Wieringermeer fors uit

    ActueelData & AI

    Amsterdams-Russische Nebius ‘hofleverancier’ van Microsoft

    ...

    Footer

    Direct naar

    • Carrièretests
    • Kennisbank
    • Planning
    • Computable Awards
    • Magazine
    • Ontvang Computable e-Magazine
    • Cybersec e-Magazine
    • Topics
    • Phishing
    • Ransomware
    • NEN 7510

    Producten

    • Adverteren en meer…
    • Jouw Producten en Bedrijfsprofiel
    • Whitepapers & Leads
    • Vacatures & Employer Branding
    • Persberichten

    Contact

    • Colofon
    • Computable en de AVG
    • Service & contact
    • Inschrijven nieuwsbrief
    • Inlog

    Social

    • Facebook
    • X
    • LinkedIn
    • YouTube
    • Instagram
    © 2025 Jaarbeurs
    • Disclaimer
    • Gebruikersvoorwaarden
    • Privacy statement
    Computable.nl is een product van Jaarbeurs