z-logo
open-access-imgOpen Access
virus Detection Using Cryptography Algorithm
Author(s) -
Ali Al-Hanani,
Venus W. Samawi
Publication year - 1996
Publication title -
al-mağallaẗ al-ʿirāqiyyaẗ li-l-ḥāsibāt wa-al-maʿlūmāt/iraqi journal for computers and informatics
Language(s) - English
Resource type - Journals
eISSN - 2520-4912
pISSN - 2313-190X
DOI - 10.25195/ijci.v27i1.220
Subject(s) - computer science , encryption , computer virus , cryptography , microcomputer , computer security , operating system , telecommunications , chip
Many papers have been published about manipulating computer viruses; instructions that impact a computer system and after a period of incubation and reproducion, activate and demonstrate their presence. mest Viruses were designed to attack microcomputers, sincce microcomputers are widely used nowadays, and have simple operating systems which result in lack of quality of their security systern. Connecting computers with networks and using copies of programs from unreliable sources such as bullet in board systems will increase the :of viral contact and the spread of viruses. Data Encryption disguises data flowing through a network so that it is unintelligible to any one monitor the data, Encryption techniques can also be used to detect file modification which may caused either by unithorized users or by viruses. This paper concern in viruses atracking users on system files (.exe and com) in microcomputer sytems, where viruses Types, how they work, and anti-virus streiagies are going o scussed. Finally, a dccction stralegy depending on Encryption techniques built the operating sysiems Suggested to improve PCs Security and preventing unauthorized users from inserting into programas commands that will cause system corruption.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here