Research paper topics, free example research papers

Free research papers and essays on topics related to: virus protection

  • 9 results found, view research papers on page:
  • 1
  • Computer Crime - 1,366 words
    ... ses spread from program to program and computer to computer, much as biological viruses spread within individual...members of a society. (Chess, 1997) Diskettes were the primary carriers of viruses in the 1980s. (Computer, 1997) Today, they are e-mail attachments, file transfers and infected software downloads or uploads. Networks can even spread viruses to large numbers of connected PCs rapidly. (Yang, 1998) No one working on a [personal computer] is risk free; more viruses are being spread today than ever before, but more help is being developed as well. Special software is now in stores that will help to prevent any major disasters that viruses can cause. (Miastkowski, 1998) Antivirus ...
    Related: computer crime, computer security, computer viruses, crime, personal computer
  • Computer Crime - 1,361 words
    ... m program to program and computer to computer, "much as biological viruses spread within individual...members of a society." (Chess, 1997) Diskettes were the "primary carriers of viruses in the 1980s." ("Computer," 1997) Today, they are e-mail attachments, file transfers and infected software downloads or uploads. Networks can even spread viruses to large numbers of connected PCs rapidly. (Yang, 1998) No one working on a [personal computer] is risk free; more viruses are being spread today than ever before, but more help is being developed as well. Special software is now in stores that will help to prevent any major disasters that viruses can cause. (Miastkowski, 1998) Antivirus softwar ...
    Related: computer crime, computer security, computer viruses, crime, personal computer
  • Computer Viruses - 463 words
    Computer Viruses A computer virus is an illegal and potentially damaging computer program designed to infect other software by attaching itself to any software it contacts. In many cases, virus programs are designed to damage computer systems maliciously by destroying or corrupting data. If the infected software is transferred to or accessed by another computer system, the virus spreads to the other system. Viruses have become a serious problem in recent years, and currently, thousands of known virus programs exist (Reed 85-102). Three types of viruses are boot sector virus, file virus, and Trojan horse virus. A boot sector virus infects the boot program used to start the system. When the in ...
    Related: computer program, computer security, computer system, computer systems, computer virus, computer viruses, viruses
  • Hippa Effects Of Health Insurance - 1,225 words
    Hippa - Effects Of Health Insurance Effects of the Health Insurance Portability & Accountability Act (HIPAA) Introduction Just when Americans thought it was safe to turn on their computers after this years anticipated Y2K catastrophe, now comes the federal governments new Health Insurance Portability & Accountability Act (HIPAA) -- privacy regulations that will create new, insurmountable challenges for todays healthcare industry. The Y2K bug is estimated to have cost the health care industry upwards of $10 billion. By comparison, implementing the HIPAA privacy and security regulations is estimated to cost the health care industry $40 billion over the next two years. Beginning January 2001, U ...
    Related: health, health care, health care industry, health information, health insurance, health plan, insurance
  • Hippa Effects Of Health Insurance - 1,253 words
    ... ity in the event of a security incident. The damage control procedures should also include: a disaster recovery plan, emergency mode operations, equipment control, an organization security plan, procedures for verifying authorization prior to physical access, maintenance records, need-to-know procedures for personnel access, and sign-in procedures for outside (contract) vendors. Security Management Process Health care operators are required to establish risk reduction security policies to insure accountability, prevention, containment, and correction of security breaches including risk analysis, risk management, and sanction policies. Additional measures to protect sensitive data include ...
    Related: department of health and human services, health, health care, health care industry, health information, health insurance, insurance
  • Internet Security - 1,869 words
    Internet Security Introduction/Summary The Internet has become a greater medium of communication, data exchange, and entertainment over the past 5 years. With this widespread growth of Internet access, there come growing pains. These growing pains come in the form of people who are up to no good and want to ruin everybody elses experience on the net. High-speed connections also make it a very easy way for hackers to attack your pc in your daily life. In this report, I will discuss the types of Internet connections that are commonly used by consumers. I will also talk about the kinds of hackers that are out there. Each hacker has his or her own reason for doing it and by knowing that, prevent ...
    Related: internet access, internet browser, internet connection, internet security, internet service, social security
  • Lan Proposal - 1,076 words
    Lan Proposal Barrett & Barrett Advertising NJ is the newly established satellite office of Barrett & Barrett Advertising CA. Due to their increasing number of East Coast clientele, they have opened a satellite office to accommodate that business. B & B Advertising currently employs 56 people, 5 of which will transfer to the NJ office upon final renovations. Although a small outfit by number, gross sales for fiscal year 1998 exceeded $18,000,000.00. B & B CAs current computer usage is significantly high. Their need for efficient graphic capability requires them to maintain state of the art software and hardware. However B & B has stressed that user friendliness is a higher priority. B & B NJ ...
    Related: proposal, the chosen, area network, total cost, advertising
  • The Bulgarian And Soviet Virus Factories - 4,622 words
    The Bulgarian and Soviet Virus Factories The Bulgarian and Soviet Virus Factories ======================================== Vesselin Bontchev, Director Laboratory of Computer Virology Bulgarian Academy of Sciences, Sofia, Bulgaria 0) Abstract =========== It is now well known that Bulgaria is leader in computer virus production and the USSR is following closely. This paper tries to answer the main questions: Who makes viruses there, What viruses are made, and Why this is done. It also underlines the impact of this process on the West, as well as on the national software industry. 1) How the story began ====================== Just three years ago there were no computer viruses in Bulgaria. Afte ...
    Related: bulgarian, computer virus, soviet, soviet union, virus, virus protection
  • The Bulgarian And Soviet Virus Factories - 4,639 words
    ... them with a debugger (YANKEE DOODLE) both are viruses, made in our country. - Hiding the true file length usually causes problems, because CHKDSK is able to detect the difference between the disk space marked as used in the FAT and the reported file length. Only two Bulgarian viruses in the world are able to handle this problem --- DIAMOND and V2100. - The first really "stealth" file infector --- the 512 virus was Bulgarian. It is true however, that the idea has been discovered independently almost at the same time in other parts of the world (the 4096 virus from Israel). - The only known stealth parasitic virus, which "stealthy" features go down to the BIOS level (i.e., it cannot be det ...
    Related: bulgarian, computer virus, soviet, soviet union, virus, virus protection
  • 9 results found, view research papers on page:
  • 1