skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 121471 Find in a Library
Title: Bug Bytes
Journal: Security Management  Volume:33  Issue:9  Dated:(September 1989)  Pages:85-87
Author(s): E F Phelps
Date Published: 1989
Page Count: 3
Type: Training (Aid/Material)
Format: Article
Language: English
Country: United States of America
Annotation: This article describes computer viruses, how they spread, and ways to prevent them.
Abstract: A computer virus is an unauthorized computer program that, as a part of its operating procedures, duplicates itself onto the memory of every computer with which it comes in contact. Some viruses, called "bombs," are programs placed into computers to remain dormant until called into action by time, date, function, use, or the number of times a certain function is performed. The most common virus, termed the "worm," enters any computer it contacts, duplicates itself, and then waits to implant again, carrying out any number of functions on each host computer. The "Trojan horse" inserts a program that looks like it is doing one task although it is actually doing something else. "Back doors" or "trap doors" are commonly placed into authorized programs to allow easy access to the program. Besides the standard computer security practices, other procedures will help avoid infection by a computer virus. Companies should never use bulletin board software or public domain programs, and programs should be reviewed by a knowledgeable company computer manager on an isolated computer before the software is downloaded onto the company system. Programs should be reviewed often to check for changes in size. A system should be established to ensure that computer time is not being used by employees for personal projects. Other measures pertain to restricted access, secure data lines, documented after-hours use of computers, and hiring practices.
Main Term(s): Criminal methods
Index Term(s): Computer related crime; Security management
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=121471

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.