Threats of Computer System and its Prevention

Authors

  • Virdyra Tasril  Faculty of Computer Science, Universitas Pembanguan Panca Budi, Medan, Indonesia
  • Meiliyani Br. Ginting  Department of Informatics Management, Politeknik Poliprofesi Medan, Medan, Indonesia
  • Mardiana  Department of Informatics, Sekolah Tinggi Teknik Harapan, Medan, Indonesia
  • Andysah Putera Utama Siahaan  Ph.D. Student of School of Computer and Communication Engineering, Universiti Malaysia Perlis, Kangar, Malaysia

Keywords:

Virus, Threat, Worm, Trojan, Adware, Malware

Abstract

Computer viruses are a nightmare for the computer world. It is a threat to any user who uses a computer network. The computer will not be infected by a virus if the computer is not connected to the outside world. In this case, this is the internet. The Internet can be used as a medium for the spread of the virus to the fullest. There are many types of viruses that are spread through the internet. Some of them are aimed at making money, and there are only as a disrupt activity and computer performance. Some techniques are done to prevent the spread of the virus. Here will be explained how to tackle the virus optimally. The benefit is that the computer used will be free from virus attacks and safe to exchange data publicly. Techniques used include the prevention and prevention of viruses against computer networks are to know the characteristics and workings of the virus.

References

  1. S. Natarajan and S. Rajarajesware, "Computer Virus: A Major Network Security Threat," International Journal of Innovative Research & Development, vol. 3, no. 7, pp. 229-302, 2014.
  2. S. Chakraborty, "A Comparison study of Computer Virus and Detection Techniques," International Journal of Scientific Research in Computer Science, Engineering and Information Technology, vol. 2, no. 1, pp. 236-240, 2017.
  3. M. Khari and C. Bajaj, "Detecting Computer Viruses," International Journal of Advanced Research in Computer Engineering & Technology, vol. 3, no. 7, pp. 2357-2364, 2014.
  4. L. X. Yang, X. Yang, L. Wen and J. Liu, "A Novel Computer Virus Propagation Model and its Dynamics," International Journal of Computer Mathematics, vol. 89, no. 17, pp. 2307-2314, 2012.
  5. P. R. Shah, Y. Shah and S. Madan, "Mobile Viruses," in International Conference on Recent Trends in Information Technology and Computer Science, 2011.
  6. P. Qin, "Analysis of a Model for Computer Virus Transmission," Hindawi Publishing Corporation Mathematical Problems in Engineering, pp. 1-10, 2015.
  7. S. Ramadhani, Y. M. Saragih, R. Rahim and A. P. U. Siahaan, "Post-Genesis Digital Forensics Investigation," International Journal of Scientific Research in Science and Technology, vol. 3, no. 6, pp. 164-166, 2017.
  8. Hariyanto and A. P. U. Siahaan, "Intrusion Detection System in Network Forensic Analysis and Investigation," IOSR Journal of Computer Engineering, vol. 18, no. 6, pp. 115-121, 2016.

Downloads

Published

2017-08-31

Issue

Section

Research Articles

How to Cite

[1]
Virdyra Tasril, Meiliyani Br. Ginting, Mardiana, Andysah Putera Utama Siahaan, " Threats of Computer System and its Prevention, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 3, Issue 6, pp.448-451, July-August-2017.