Professional Documents
Culture Documents
FIS Chapter 5
FIS Chapter 5
Lecture Five
What is computer security?
• to save the computer system from damage such kinds of computers are
placed in an air conditioned environment.
Cont..
• Dust and moisture can also corrupt the computer’s hardware.
Hence, the computer hardware has to be placed in a dust and
moisture free environment.
• Bootstrap-sector viruses reside on the first portion of the hard disk or floppy
disk, known as the boot sector.
• These viruses replace either the programs that store information about the disk's
contents or the programs that start the computer.
• Typically, these viruses spread by means of the physical exchange of floppy disks.
• Multi-partite viruses combine the abilities of the parasitic and the bootstrap-
sector viruses, and so are able to infect either files or boot sectors.
• These types of viruses can spread if a computer user boots from an infected
diskette or accesses infected files.
Worm
• Worm is a malicious program similar to a virus but is a self-
contained program that transports itself from one computer
to another through networks.
• Instead, they might lie dormant for months before they are
activated and do something devious to the computer.
Logic bomb
• Logic bomb is a piece of malicious program that delivers its
instruction and cause damage when it is triggered by a specific
condition, such as when a particular date or time is reached or
when a combination of characters is typed on a keyboard.