Computer network virus and precautions_第1頁(yè)
Computer network virus and precautions_第2頁(yè)
Computer network virus and precautions_第3頁(yè)
Computer network virus and precautions_第4頁(yè)
Computer network virus and precautions_第5頁(yè)
已閱讀5頁(yè),還剩2頁(yè)未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡(jiǎn)介

1、Computer network virus and precautionsWith the new network technology and application of the continuous rapid development of the computer network should Use of becoming increasingly widespread, the role played by the increasingly important computer networks and human More inseparable from the lives

2、of the communitys reliance on them will keep growing. With With the continuous development of computer technology, the virus has become increasingly complex and senior, the new generation of Computer viruses make full use of certain commonly used operating systems and application software for protec

3、tion of the weak low Spots have rampant in recent years as the popularity of the Internet in the world, will be attached document containing the virus The situation in the mail has been increasing spread of the virus through the Internet, making the spread of the virus speed Sharp also increased, by

4、 an ever-increasing scope of the infection. Therefore, the protection of the security of computer networks will be Will become increasingly important. A computer virus The definition of computer virus computer virus (Computer Virus) in the peoples republic of China The computer information system se

5、curity protection regulations which has been clearly defined, the virus refers to the preparation or Computer program inserted in the damage or destruction of computer data functions, affecting computer use Self-replication and can a group of computer instructions, or code. Second, network virus Wit

6、h the development of network and the Internet, a wider spread, the greater New harm The virus emerged This is the Internet virus. The virus is an emerging concept in the traditional The virus was not classified network virus this concept, because the development of networks, the traditional virus Th

7、e network also has a number of characteristics. Todays Internet virus is a broad notion of a As as long as it is carried out using the Internet to spread destruction can be known as network viruses, such as: Love the back door, Panda burning incense. Third, network virus and the distinction between

8、computer virus The original common computer virus is nothing more than the devastating formatted hard drive, delete system With the users documents, databases, etc. destruction. The mode of transmission is through nothing but also by virus infection Mutual copy of the software, carrying the virus, s

9、uch as the use of pirated optical discs, such as infection disk systems The pilot virus and infected executable file virus, in addition to a network virus These are the common characteristics of the virus, but also steal users with remote data, remote control of the other side Computers and other da

10、maged properties, such as Trojan and consumption of funding the operation of the network computer Source collapse of the network server worm. Fourth, the network against virus Network destructive virus, will directly affect the work of the network, ranging from lowering speed video Ring for the effi

11、ciency of the network, while in the collapse, undermining the server information to a multi-year work destroyed Dan. Because viruses and other network annually fraud led to economic losses of over 16 billion yuan, But this figure is constantly rising year by year. The next few years, the size of the

12、 market will reach Security 60 billion yuan. One antivirus software experts pointed out: Network avian flu virus even more. Such as: Xiong Cat burning incense In addition to virus infection through the web site users, the latest virus also through QQ Loopholes in propagating itself through file-shar

13、ing networks, the default sharing, weak password systems, U disk and windows Forms bottom of the top mobile hard drives, and other means of communication. While LAN once a computer machine For infection, it can spread through the entire network instant, or even within a very short period of time can

14、 be infected Thousands of computers, can lead to serious networks. Symptoms of poisoning in the performance of computers There are enforceable. Exe files have become a strange pattern, the pattern shown as Panda Burning incense, and then System blue screen, restart the frequent, hard drive data dest

15、ruction, serious entire company All computer LAN will all poisoning. Panda burning incense, only more than half a month, a few varieties have high Of more than 50, and the number of its users infected constantly expanding. Makes infected, Panda burn incense disease The personal drug users has been a

16、s high as several million people infected with a few more corporate users is rising exponentially. Network More on the computer network the greater the harm caused by the virus. V. network transmission of the virus Features 1. Infection fast: single machine environment, the virus can only be passed

17、from one computer diskette To another, and in the network can be adopted by the rapid spread of network communication mechanism. According to measurement Set against a typical PC network use in normal circumstances, once a computer workstation sick Drugs, and will be online within 10 minutes in the

18、several hundreds of all infected computers. 2. Proliferation of a wide range: in the network due to the spread of the virus very quickly and spread to encompass a large area, not only the rapid transmission of all LAN computer, but also through remote workstations virus in一瞬Inter spread to thousands

19、 of miles away. 3. Dissemination in the form of complex and varied: computer viruses in general through the network Station server workstation channels of communication, but in the form of complex and diverse communication. 4. Difficult to completely wipe: the standalone computer virus carriers some

20、times can be deleted documents Or low-level formatted drives, and other measures to eliminate the virus completely, and the network once a computer work Clean stations failed to disinfect the entire network can be re-infected by the virus, or even just completed removal The work of a workstation is

21、likely to be on-line by another workstation virus infection. Therefore, Only workstations in addition to killing viruses, and can not solve the virus harm to the network is. 6, the type of network virus As the network increasingly developed, the type of network virus has been increasing, generally s

22、ummed up as The following categories: 1. Worm It is the use of the transmission mechanism of replication and dissemination network, the mode of transmission is through the network And e-mail, the prefix is Worm. For example, in recent years the great harm Nimda virus is Demodex A worm virus. The vir

23、us used Microsofts Windows operating system, computer flu With this virus, will continue to automatically dial-up Internet access and use information in the document or the address Sharing network spreads, and ultimately undermine the most important user data. 2. Macro Virus Hong virus is a Storage

24、in the document or template in the Acer computer virus. The prefix Macro, once open such documents, which Acer will be implemented, then the virus would Acer Been enabled transferred to the computer, and in the presence of the Normal template. From then on, all since The document will be kept moving

25、 infection that the Hong virus, and if other users opened the flu Documents with the virus, the Hong virus will be transferred to his computer. 3. Destructive procedures virus The prefix destructive virus program is: Harm. The characteristics of this virus is a good in itself Look at the user clicks

26、 on icons to temptation, when the user clicks on the virus, the virus will direct users Computer generated destruction. If C formatted disk (Harm.formatC.f), the killer orders (Harm. Command.Killer). 4. System virus The prefix system for the virus: Win32, PE, Win95, W32, W95, and so on. These viruse

27、s The characteristics of the general public can be infected with the windows operating system *. exe and *. dll file, And through these documents for dissemination. If the CIH virus. 5. Backdoor virus Backdoor virus prefix is Backdoor. The total of such virus through network - Sowing, opened the bac

28、k door to the system to the user and potential safety problems. 6. Bundling machine virus Bundled-virus prefix is: Binder. The characteristics of this virus is the virus writers will use Specific procedures will be bundled with a number of applications such as QQ, IE bundled up on the surface It is

29、normal to see the paper, when users run these bundled virus, will run these applications on the surface Procedures, and then tied to the operation of hidden virus, which caused harm to the user. Such as: baled Tied QQ (Binder.QQPass.QQBin), the system killer (Binder.killsys). 7. Script virus The vir

30、us is usually JavaScript scripting code prepared by the malicious code, prefix is usually Spript, with the general nature of advertising, will modify your IE Home, modify registry, and other information, Computer user inconvenience caused. 8. Planting procedures virus virus This virus is of the publ

31、ic will run from the in vivo release of one or several new Under the virus to the system directory, by the release of a new virus damage. If the glaciers are sowing (Dropper.BingHe2.2C), MSN striker (Dropper.Worm.Smibag). 9. Joke virus The prefix is the virus joke: Joke. Also called prank virus. The

32、 characteristics of this virus is itself a nice user clicks on icons to temptation, When the user clicks of this virus, the virus will be made to disrupt the operation scare users, in fact The virus did not destroy any computer user. Such as: ghost (Joke.Girlghost) virus. 10. Trojan hacking virus Tr

33、ojan its prefix is: Trojan, hackers virus prefix General for Hack. Public special Sex is through the network or system loopholes into the users system and hidden, and then leaked to the outside world User information, hackers virus there is a visual interface to the users computer remotely Control.

34、Trojans, hackers often paired virus emerging, Trojan horse virus responsible for the invasive power users Brain, and hackers virus will be passed to the Trojan horse virus control. . General Trojan such as QQ News tail Trojan Trojan.QQ3344, there are big Trojan.LMir.PSW.60. Virus Form A PSW or anyth

35、ing like PWD general said that the virus has stolen password function, If some hacker programs, such as network梟雄Hack.Nether.Client. 7, the mode of transmission and network anti-virus Through the above, we can see that e-mail viruses spread Click homepage, users download, Others implant, implant, an

36、d other loopholes through five computer transmission, so long as holding these five A thoroughfare, we will be able to live better anti-virus network. 計(jì)算機(jī)網(wǎng)絡(luò)病毒與防范隨著各種新的網(wǎng)絡(luò)技術(shù)的不斷應(yīng)用和迅速發(fā)展, 計(jì)算機(jī)網(wǎng)絡(luò)的應(yīng)用范圍變得越來(lái)越廣泛, 所起的作用越來(lái)越重要, 計(jì)算機(jī)網(wǎng)絡(luò)與人類的生活更加密不可分, 社會(huì)對(duì)其的依賴程度也會(huì)隨之不斷增長(zhǎng)。而隨著計(jì)算機(jī)技術(shù)的不斷發(fā)展, 病毒也變得越來(lái)越復(fù)雜和高級(jí), 新一代的計(jì)算機(jī)病毒充分利用某些常用操作

37、系統(tǒng)與應(yīng)用軟件的低防護(hù)性的弱點(diǎn)不斷肆虐, 最近幾年隨著因特網(wǎng)在全球的普及, 將含病毒文件附加在郵件中的情況不斷增多, 通過(guò)網(wǎng)絡(luò)傳播病毒, 使得病毒的擴(kuò)散速度也急驟提高, 受感染的范圍越來(lái)越廣。因此, 計(jì)算機(jī)網(wǎng)絡(luò)的安全保護(hù)將會(huì)變得越來(lái)越重要。一、計(jì)算機(jī)病毒計(jì)算機(jī)病毒的定義計(jì)算機(jī)病毒(Computer Virus)在中華人民共和國(guó)計(jì)算機(jī)信息系統(tǒng)安全保護(hù)條例中被明確定義, 病毒“指編制或者在計(jì)算機(jī)程序中插入的破壞計(jì)算機(jī)功能或者破壞數(shù)據(jù), 影響計(jì)算機(jī)使用并且能夠自我復(fù)制的一組計(jì)算機(jī)指令或者程序代碼”。二、網(wǎng)絡(luò)病毒隨著網(wǎng)絡(luò)和Internet 的發(fā)展,一個(gè)傳播范圍更廣,危害更大的新型病毒應(yīng)運(yùn)而生.這就是網(wǎng)

38、絡(luò)病毒。網(wǎng)絡(luò)病毒是一個(gè)新興的概念, 在傳統(tǒng)的病毒分類里沒有網(wǎng)絡(luò)病毒這個(gè)概念, 由于網(wǎng)絡(luò)的發(fā)展, 傳統(tǒng)的病毒也就具有了一些網(wǎng)絡(luò)的特性。如今的網(wǎng)絡(luò)病毒是一個(gè)廣義的概念, 一般只要是利用網(wǎng)絡(luò)來(lái)進(jìn)行傳播、破壞的都可以被稱為網(wǎng)絡(luò)病毒, 如:“愛情后門”、“熊貓燒香”等。三、網(wǎng)絡(luò)病毒與計(jì)算機(jī)病毒的區(qū)別原先常見的計(jì)算機(jī)病毒的破壞性無(wú)非就是格式化硬盤, 刪除系統(tǒng)與用戶文件、破壞數(shù)據(jù)庫(kù)等等。而傳播途徑也無(wú)非是通過(guò)遭病毒感染的軟件的互相拷貝, 攜帶病毒的盜版光盤的使用等, 如感染磁盤系統(tǒng)區(qū)的引導(dǎo)型病毒和感染可執(zhí)行文件的文件型病毒, 而網(wǎng)絡(luò)病毒除了具有普通病毒的這些特性外, 還具有遠(yuǎn)端竊取用戶數(shù)據(jù)、遠(yuǎn)端控制對(duì)方計(jì)算

39、機(jī)等破壞特性, 比如特洛伊木馬病毒和消耗網(wǎng)絡(luò)計(jì)算機(jī)的運(yùn)行資源, 拖垮網(wǎng)絡(luò)服務(wù)器的蠕蟲病毒。四、網(wǎng)絡(luò)病毒的危害網(wǎng)絡(luò)上病毒破壞性大, 將直接影響網(wǎng)絡(luò)的工作, 輕則降低速度, 影響工作效率, 重則使網(wǎng)絡(luò)崩潰, 破壞服務(wù)器信息, 使多年工作毀于一旦。每年由于病毒等網(wǎng)絡(luò)欺詐行為導(dǎo)致的經(jīng)濟(jì)損失高達(dá)160 億多元,而且這個(gè)數(shù)字逐年還在不斷地攀升。未來(lái)幾年, 安防市場(chǎng)規(guī)模將達(dá)到600 億元。一位殺毒軟件專家指出: “網(wǎng)絡(luò)病毒更甚于禽流感”。如: “熊貓燒香”除了通過(guò)網(wǎng)站帶毒感染用戶之外, 此病毒還會(huì)通過(guò)QQ 最新漏洞傳播自身, 通過(guò)網(wǎng)絡(luò)文件共享、默認(rèn)共享、系統(tǒng)弱口令、U 盤及窗體頂端窗體底端移動(dòng)硬盤等多種途徑

40、傳播。而局域網(wǎng)中只要有一臺(tái)機(jī)器感染, 就可以瞬間傳遍整個(gè)網(wǎng)絡(luò), 甚至在極短時(shí)間之內(nèi)就可以感染幾千臺(tái)計(jì)算機(jī), 嚴(yán)重時(shí)可以導(dǎo)致網(wǎng)絡(luò)癱瘓。中毒癥狀表現(xiàn)為電腦中所有可執(zhí)行的.exe 文件都變成了一種怪異的圖案, 該圖案顯示為“熊貓燒香”, 繼而系統(tǒng)藍(lán)屏、頻繁重啟、硬盤數(shù)據(jù)被破壞等, 嚴(yán)重的整個(gè)公司局域網(wǎng)內(nèi)所有電腦會(huì)全部中毒?!靶茇垷恪眱H半個(gè)多月, 變種數(shù)已高達(dá)50 多個(gè), 并且其感染用戶的數(shù)量不斷擴(kuò)大。使得感染“熊貓燒香”病毒的個(gè)人用戶已經(jīng)高達(dá)幾百萬(wàn), 企業(yè)用戶感染數(shù)更是成倍上升。網(wǎng)絡(luò)上的計(jì)算機(jī)越多, 網(wǎng)絡(luò)病毒造成的危害越大。五、網(wǎng)絡(luò)病毒傳播特點(diǎn)1.感染速度快: 在單機(jī)環(huán)境下, 病毒只能通過(guò)軟盤從一

41、臺(tái)計(jì)算機(jī)帶到另一臺(tái), 而在網(wǎng)絡(luò)中則可以通過(guò)網(wǎng)絡(luò)通訊機(jī)制迅速擴(kuò)散。根據(jù)測(cè)定, 針對(duì)一臺(tái)典型的PC 網(wǎng)絡(luò)在正常使用情況, 只要有一臺(tái)工作站有病毒, 就可在幾十分鐘內(nèi)將網(wǎng)上的數(shù)百臺(tái)計(jì)算機(jī)全部感染。2.擴(kuò)散面廣: 由于病毒在網(wǎng)絡(luò)中擴(kuò)散非??? 擴(kuò)散范圍很大, 不但能迅速傳染局域網(wǎng)內(nèi)所有計(jì)算機(jī), 還能通過(guò)遠(yuǎn)程工作站將病毒在一瞬間傳播到千里之外。3.傳播的形式復(fù)雜多樣: 計(jì)算機(jī)病毒在網(wǎng)絡(luò)上一般是通過(guò)“工作站服務(wù)器工作站”的途徑進(jìn)行傳播的, 但傳播的形式復(fù)雜多樣。4.難于徹底清除: 單機(jī)上的計(jì)算機(jī)病毒有時(shí)可通過(guò)刪除帶毒文件或低級(jí)格式化硬盤等措施將病毒徹底清除, 而網(wǎng)絡(luò)中只要有一臺(tái)工作站未能消毒干凈就可使整個(gè)網(wǎng)絡(luò)重新被病毒感染, 甚至剛剛完成清除工作的一臺(tái)工作站就有可能被網(wǎng)上另一臺(tái)帶毒工作站所感染。因此,僅對(duì)工作站進(jìn)行病毒殺除, 并不能解決病毒對(duì)網(wǎng)絡(luò)的危害。六、網(wǎng)絡(luò)病毒的類型由于網(wǎng)絡(luò)越來(lái)越發(fā)達(dá), 網(wǎng)絡(luò)病毒的種類也越來(lái)越多, 大體歸納為以下幾類:1.蠕蟲病毒它的傳染機(jī)理是利用網(wǎng)絡(luò)進(jìn)行復(fù)制和傳播, 傳染途徑是通過(guò)網(wǎng)絡(luò)和電子郵件

溫馨提示

  • 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

評(píng)論

0/150

提交評(píng)論