Computer Viruses: Security Risks and Solution

Gunpreet Kaur*, Ekleen Kaur**, Harsh Jindal***, Neha Gautam****
*-*** Department of Computer Science and Engineering, CGC College of Engineering, Landran, Mohali, Punjab, India.
**** St. Ezra, International Senior Secondary School, Kharar, Mohali, Punjab, India.
Periodicity:April - June'2023
DOI : https://doi.org/10.26634/jse.17.4.19840

Abstract

Computer viruses are malicious computer programs that can affect the working of a computer system, thus affecting important data and files. This study provides an overview of the history of computer viruses, their evolution, and the ways in which they spread and infect systems. It discusses the various security vulnerabilities that viruses exploit, such as software bugs and human errors, and the damage they can cause, such as data loss, system crashes, and identity theft. The study also analyzes various preventive measures that can be taken to minimize the risk of virus infection, such as software updates, firewalls, and anti-virus software. It also discusses the importance of user education and awareness for preventing virus attacks.

Keywords

Computer Viruses, Security, Risk, Software, Malware.

How to Cite this Article?

Kaur, G., Kaur, E., Jindal, H., and Gautam, N. (2023). Computer Viruses: Security Risks and Solution. i-manager’s Journal on Software Engineering, 17(4), 29-40. https://doi.org/10.26634/jse.17.4.19840

References

[1]. Akbari, S. A. A. J., & Hussian, M. A. (2022). An effective malware detection algorithm for WSN. ESP Journal of Engineering and Technology Advancements, 2(1), 1-4.
[2]. Al Daoud, E., Jebril, I. H., & Zaqaibeh, B. (2008). Computer virus strategies and detection methods. International Journal of Open Problems in Computer Science and Mathematics, 1(2), 12-20.
[4]. Baftiu, N., & Krabaj, S. (2019). Creating prototype virus-destroying files and texts on any computer. Prizren Social Science Journal, 3(1), 62-66.
[12]. Gounder, M. P., & Farik, M. (2017). New ways to fight malware. International Journal of Scientific Technology Research, 6(6), 313-318.
[13]. Gupta, Y., Ajithkumar, B., Kale, H. S., Nayak, S., Sabhapathy, S., Sureshkumar, S., ... & Roy, S. (2017). The upgraded GMRT: Opening new windows on the radio Universe. Current Science, 113(4), 707-714.
[16]. Johari, M. F. H. (2015). Virus in the Computer and Smartphone System (Doctoral dissertation, Faculty of Art and Design).
[18]. Mitra, U., Ortega, A., Heidemann, J., & Papadopoulos, C. (2006). Detecting and identifying malware: A new signal processing goal. IEEE Signal Processing Magazine, 23(5), 107-111.
[24]. Sharma, M., Jindal, H., Kumar, S., & Kumar, R. (2021). Overview of data security, classification and control measure: A study. i-manager's Journal on Information Technology, 11(1), 17-34.
[29]. Tuli, B., Bhardwaj, B., Kumar, S., & Gautam, N. (2022d). An extensive overview on human-computer interaction (HCI) application. i-manager's Journal on Software Engineering, 17(1), 24-37.
[36]. Yusuf, M. S., Onotehinwa, T. O., & Okon, E. O. (2017). Productivity of business enterprises: Effect of computer virus infection on files. International Journal of Computer Science and Mobile Computing, 6(2), 179-193.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.