U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Bug Bytes

NCJ Number
121471
Journal
Security Management Volume: 33 Issue: 9 Dated: (September 1989) Pages: 85-87
Author(s)
E F Phelps
Date Published
1989
Length
3 pages
Annotation
This article describes computer viruses, how they spread, and ways to prevent them.
Abstract
A computer virus is an unauthorized computer program that, as a part of its operating procedures, duplicates itself onto the memory of every computer with which it comes in contact. Some viruses, called "bombs," are programs placed into computers to remain dormant until called into action by time, date, function, use, or the number of times a certain function is performed. The most common virus, termed the "worm," enters any computer it contacts, duplicates itself, and then waits to implant again, carrying out any number of functions on each host computer. The "Trojan horse" inserts a program that looks like it is doing one task although it is actually doing something else. "Back doors" or "trap doors" are commonly placed into authorized programs to allow easy access to the program. Besides the standard computer security practices, other procedures will help avoid infection by a computer virus. Companies should never use bulletin board software or public domain programs, and programs should be reviewed by a knowledgeable company computer manager on an isolated computer before the software is downloaded onto the company system. Programs should be reviewed often to check for changes in size. A system should be established to ensure that computer time is not being used by employees for personal projects. Other measures pertain to restricted access, secure data lines, documented after-hours use of computers, and hiring practices.

Downloads

No download available

Availability