It 302 Virus

In: Computers and Technology

Submitted By jc1968
Words 827
Pages 4
There are many ways to have internet access these days. Coffee shops, libraries, airports and even public buses have free wireless access. With all these free accesses to the World Wide Web, there is also many potential ways for hackers to potentially get your personal information and use it for their gain. There are many ways to combat this situation by using several security measures with Linux programming, which the majority of the software is free. Some of those security technologies are SELinux, TCP Wrappers, IPtables and Chroot Jail to name a few.

In basic Linux security, Discretionary Access Control is based practically by users and groups. The process is ran by a user and then has access to anything other users has access to, making it not so secure. The U.S. National Security Agency (NSA) developed the SELinux (Security Enhanced Linux) to combat the lack of strong security. The SELinux implements Mandatory Access Control (MAC) in the Linux kernel which enforces policies that limits the user or a program of what they can do. It is designed to prevent process from reading and/or tampering of data and programs. MAC is an important tool for containing security threats made by user errors, hackers or software errors. It’s pretty hard to bypass the security measure since the kernel is checking the MAC rules right after checking the DAC rules on a constant basis. There are three states you can place SELinux to run in; Enforcing, Permissive and Disabled.

Enforcing is the default setting where no program or user can do anything not permitted by the security policy. Permissive is a diagnostic state where it sends warning but does not enforce the policy but you can use to build a new security policy. Disabled is where it does not enforce any security policies at all.

Another Linux based security program you can…...

Similar Documents


...Business problem to be sold is how to prevent viruses from infection the networked computers, education the staff on what a virus is and why it is important to know what harm it can do to you network. How to prevent getting a virus, and why you should use encryption software when sending important data to others in your business. This will provide instie for the company and help them keep cost down as they will not have to keep hiring or paying for an IT technician to fix and repair their systems, and also why the use of encryption usage will keep their confidential information from getting in to the wrong hands or the hands of a competitor. Company Background Wing Warehouse is a sport bar and grill, famous for their wings and such. It is not just a bar it is a family fun and dining area also. The company is growing quickly in the last month 2 new locations in the Ohio area have opened. At the 17 locations just in Ohio 7 of those are run by one single manager, in saying so he must you a main office and network and share files and such for easy access with the other stores. The total numbers of employees that use the computer networked systems are around 3,000. In saying this even managers do not have all the computer knowledge they need to run a business successfully and without having any computer issues. Recently they were affected by a huge computer virus that shut down 7 of the stores for two days. Being that this is a very popular place for family and fun it took a......

Words: 2674 - Pages: 11

Influenza Virus

...Each year the influenza virus will infect anywhere between 5-20% of our Nations population and upwards of 200,000 will become hospitalized for further treatments from complications. Most cases can occur between the months of October through May among those January and February is the peak months of the flu season. People most at risk of complications are the elderly above 65 years or older, children younger than 2 years old, and anyone who have chronic health conditions. The influenza viruses are a respiratory illness that is a contagious infection that could be mild to severe in most cases but can lead to death if untreated. When you are infected you can be contagious from the day before symptoms appear up to seven days later. Most time the viruses spread from face to face contact with someone who is infected but the virus can also be passed on if touching a contaminated surface and then touching one’s mouth, eyes, or nose. The virus could last between one to two weeks before symptoms subside. The best way to minimize your chances of contracting an influenza virus is to get the flu vaccine each year. The flu vaccine was first isolated in 1930’s and during the 1940’s a vaccine was produced. Today, flu vaccines are available by shot or nasal spray. Currently scientist at NIAID are clinically testing the idea of an universal influenza vaccine that will combat any and all strains of flu viruses but more testing in needed. Hopefully with this medical advancement there......

Words: 283 - Pages: 2


...Michigan alone. Out of the 44 states that were involved in a breakdown of statewide reported infections, there were a total of 1,992 cases and 87 deaths reported. The Centers for Disease Control and Prevention (CDC) stated that there is a fatality rate that ranges from 3 to 15% and the first case reported of human infection was in 1999. The topics will discuss history, transmission, treatment, and prevention of the virus. West Nile Virus (WNV) is a virus that is normally seen in the Middle East, Africa, and West Asia through a patient located in Uganda (Henley, 2003). WNV can infect dogs, birds, horses, squirrels, mosquitos, humans, and other mammals. It was thought to have evolved from Israel, and has spread swiftly throughout the United States. The numbers of cases reported were from 20 to 60 per year, until in 2002 when the number rose to above 4,000 (Henley, 2003). The virus exhibits in various ways such as asymptomatic, mild, and severe infections that demonstrate specific outcomes. When the individual is asymptomatic there are no signs or symptoms of the virus. Mild infection or West Nile Fever carries symptoms of nausea and emesis, rash, muscle pain, enlarged lymph nodes, headaches, anorexia, and discomfort (Google, 2012). According to the Journal of Family Practice approximately 20% of individuals that are infected show these symptoms and a gestation time of 3 to 14 days and lasts anywhere from 3 to 6 days. The next way that WNV manifests is through severe......

Words: 1005 - Pages: 5

Ebola Virus

...more popular than it someday and here I am now. This time recently, I attacked in Western Africa , remember my plan? I just continue it and guess what ? 15,400 are reported infected and 5,100 killed. I am now so powerful . Lately people do anything just to ignore me, but don’t they see that they’re the only one making way to let me in into their weak body? Now, they’re trying to kill me . but that’s a do or die game. Injecting what so ever medicines and liquids around their body with me let me do job more hard but I still have to try that’s why it results in their internal bleeding also some of my branches are transmitted through their bodily fluids like saliva, teardrops ,vomit and others. Honestly, I may just be a virus for them but I also have feelings , feelings cannot be understood by them .They do not believe to it ‘couz they’re not like me. Its just kind of abuse, abuse that neither rich or poor people do. Something that will remind them right now how hard it is to be poor. Not in material things but environmental and habitat. I might not be with them right now if they’re just like their foster-father of early days. They’re trying their best to kill me. The copies of fluid samples in laboratories, chemicals packed in medicines, formulas of what they are doing keeps them busy while me having such a hard time of enjoying what they’re doing is. Maybe I just have to continue my legacy and do watching how the body systems of the person......

Words: 422 - Pages: 2

Chikungunya Virus

...Chikunganya virus. About thousands of people have been affected by Chikungunya virus throughout the world. During the years of 2005 and 2006, the virus altered over a millions of people in the Africa, Asia and the Indian subcontinent. Now, Chikungunya virus have spread to Europe, South American and North America. Chikungunya is a viral disease that is spread by mosquitoes. There are two type of mosquitos that spread this disease that we will talk further into in this paper. There is no signs or researches that the virus can be passed on or spread by contact from human to human. The nearness of mosquito breeding sites to human habitations is a major risk factor for Chikungunya. This disease shares a similar type of clinical signs with the dengue virus, therefore in locations where dengue is common, the virus can be misdiagnosed with the dengue virus. Once a person is affected by the virus it can lead to many symptoms but the most common symptoms can include muscle pain, headache, nausea, fatigue and rash. As of today, there is no vaccine to cure Chikungunya virus. Treatment of chikungunya is concentrated in relieving the virus. In this paper, we are going to learn everything about chikungunya virus starting with where it came from, how it expanded, the structure of its genome, and all the way until how to treat the virus. Chikungunya virus is known to be abbreviated as CHIKV The topics that we are going to discuss will be, the structure of the virus, the history of the......

Words: 876 - Pages: 4

Trojan Virus

...Trojan horse viruses got their name from the siege of Troy, when the Greeks placed a large wooden horse outside the gates of Troy. The Trojans assumed it was a peace offering from the Greeks, and moved the horse inside the gates. The wooden horse was of course filled with hidden warriors, and once inside the gates, they broke out of the horse, and demolished the Trojans. Trojan horse programs work the same way. Trojan horses can destroy files and data, but commonly contain spyware, and even backdoor programs. Trojans are usually contained in software downloads from unknown or untrusted sources. Some people don't consider a trojan horse to be a virus, because it does not reproduce itself as a virus does, however it's ability to destroy files and install programs without the user knowing do indeed make it a virus. When a trojan horse is being used as spyware, it monitors your computer activities, and may even record keystrokes. This information is then sent to a third party, without you being aware of it. It may also cause pop up ads to display on your computer. The real danger is that information such as passwords and credit card and banking information can be delivered to that unknown third party, opening you up for identity theft. When the trojan horse installs a backdoor program, it sends information to the third party, making it possible for hackers to get into your system, via the backdoor, and to use the system just as if it were their own. They will often do...

Words: 573 - Pages: 3


...Virus H1N1 (Influenza) La gripe H1N1 es una enfermedad respiratoria contagiosa que causa síntomas similares a los de la influenza en las personas. Los virus de influenza cambian constantemente sus genes (mutacion). Este virus aparece en los cerdos tanto como en los humanos. El tratamiento para este virus es vacunarse y descansar en el hogar. Su supervivencia en el ambiente es de 1 a 2 dias. Herpes VHS02 La infección por el VHS-2 está muy extendida y se transmite sobre todo por vía sexual. Dura toda vida y no tiene cura. Se calcula que cada año se infectan con este virus unos 20 millones de personas. La infección por el VHS-2 está presente en todo el mundo y constituye un importante problema mundial. El VHS-2 causa herpes genital, que se caracteriza por la aparición ocasional de úlceras genitales dolorosas que pueden tener un importante efecto negativo en el bienestar y las relaciones personales. No existe tratamiento ya que no tiene cura y vive entre nosotros toda la vida. Su supervivencia es de 5 horas a 8 semanas en el ambiente Los virus estan vivos? Los virus son microorganismos acelulares, es decir, no tienen ni son células. Las células son las unidades de vida más pequeñas ya que cumplen las tres funciones vitales: nutrición, relación y reproducción. Los virus ni se nutren , ni se relacionan, y sólo se reproducen en el interior de otras células. Son parásitos obligados. Si los virus no están en el interior de las células ni siquiera se......

Words: 269 - Pages: 2

Zika Virus

...Ensayo de: “5 Cosas que Debes Saber Sobre el Virus de Zika” Este artículo es sobre factos esenciales sobre el virus de Zika. Cubre un nuevo virus que aparezco en Brasil. Aunque no está usualmente fatal, su potencial de ser un grande problema todos es lo suficientemente grande que personas necesita estar consciente de lo. En Latinoamérica, existe en Brasil, pero también se localiza en Hawai, África, el Caribe, Asia y las islas del pacífico. Noticias del virus realmente empezaron a aparecer cuando un bebé en Hawai era infectado. El artículo actual paso en CNN en miércoles, 20 de enero de 2016. Este artículo carga mucha importancia porque el Virus causa problemas para los recién nacidos. El virus de Zika no es contagioso, pero puede ser pasado de una mujer embarazada a su bebé (como un fetus), contacto sexual y de transfusión de sangre. Los mosquitos se cargan lo y, si contrates lo, no hay una cura. Explica que, como la mayoría de viruses, el descanso y muchos líquidos ayuda. También dice que debería “desaparecer en no más de un semana” y “medicamentos antinflamatorios no esteroides deben ser evitados”. Síntomas incluye a fiebre, dolor muscular, conjuntivitis y más. Con que está en las noticias, El Virus de Zika tenga la potencial de estar una grande problema para todos. El virus puede relacionar a las clases de ciencias biomédicas en McKenzie porque allí es donde puedes encontrar los únicos clases donde puedes aprender cómo tratar viruses, cómo funcionan...

Words: 256 - Pages: 2

The Zika Virus

...The Zika virus (ZIKV) is a mosquito-borne single-stranded RNA virus. It is in the family of Flaviviridae, genus Flavivirus. This virus causes a mild illness similar to dengue. The first case of ZIKV was identified in Uganda in 1947. Cases of this virus were rare until 2007 when a major epidemic happened in Yap Island, Micronesia. Now, epidemics have happened in Polynesia, Easter Island, the Cook Islands, Brazil, and New Caledonia (Ioos et al., 2014). During the first week of infection, the virus is in the blood and can be passed from an infected person to a mosquito. An infected mosquito can then spread the virus to other people. The most common symptoms of ZIKV are fever, rash, joint pain, or red eyes. Other common symptoms include muscle pain and headache. The time from exposure to symptoms is not yet known. The symptoms usually last for a few days to a week. Deaths are rare from this virus. There are no vaccines yet to treat or prevent this virus. A person can only treat the symptoms, which can be done by sleeping, drinking lots of water, and taking acetaminophen if needed (CDC, 2016). In order to prevent getting the Zika virus, a person should wear long-sleeved shirts, long pants, stay in places with air conditioning, and use window screens. A person should also sleep under a mosquito bed net and use insect repellents (CDC, 2016). There have not been any ZIKV cases in the United States yet, but people who are returning from traveling have had the virus. There are......

Words: 710 - Pages: 3

Virus Titration

...of the culture. Virus titrations are used to estimate the virus concentration; it is a viral quantification technique. When detecting the virus, the cytopathic effect is looked at, whether there is lysis of the cells, vacuolation, formation of syncytia and the presence of inclusion bodies. TCID50, is the measure of the infectious titre. The end point dilution assay quantifies the amount of virus that is required to kill 50% of infected hosts or to produce a cytopathic effect in 50% of inoculated tissue culture cells (Kumar P, 2013). The purpose of the virus titration within tissue culture is to isolate and identify viruses within clinical samples, to carry out research on the viral structure, replication, genetics of the virus and the effect on the host cells, and also to prepare viruses for vaccine production. Results Table 1 Data used to determine the 50% endpoint using the Reed-Muench method Log of virus dilution | Infected test units | Cumulative infected (A) | Cumulative non-infected (B) | Ratio A/(A+B) | Percentage infected (%) | -1 | 5/5 | 37 | 0 | 38/38 | 100 | -2 | 5/5 | 32 | 0 | 33/33 | 100 | -3 | 5/5 | 27 | 0 | 28/28 | 100 | -4 | 5/5 | 22 | 0 | 23/23 | 100 | -5 | 5/5 | 17 | 0 | 18/18 | 100 | -6 | 4/5 | 12 | 1 | 12/13 | 92 | -7 | 3/5 | 8 | 3 | 8/11 | 72 | -8 | 2/5 | 5 | 6 | 5/11 | 45 | -9 | 2/5 | 3 | 9 | 3/12 | 25 | -10 | 2/5 | 1 | 13 | 1/14 | 7 | Figure 1 The percentage of infected cells by the virus. As the log of virus dilation......

Words: 982 - Pages: 4

Melissa Virus

...“Melissa virus infects Word 97 documents and the NORMAL.DOT file of Word 97 and Word 2000. The virus code is contained in one macro named "Melissa"” (Melissa Virus). This virus comes with a harmful capability especially in Word 97. It has the power to spread its virus rapidly by using an email. When it is opened for the first time the virus checks if the user’s computer have the program MS Outlook installed. Then if it finds the program, the virus will then sends email to the email addresses found in the address book. “The email that is sent by the virus will contain the following subject header: ‘Subject: Important Message From ,’ where is the full name of the user sending the message. While the content of the body contains ‘Here is that document you asked for ... don't show anyone else ;-)’ with an attachment ‘list.doc’ which contains references to a lot of pornographic sites” (CERT® Advisory). Because of the email system the virus spreads quickly. “It created this entry in the Windows registry: HKEY_CURRENT_USERSoftwareMicrosoftOffice"Melissa?"=" Kwyjibo" and in some cases when the day of the month equals the minute value, a payload of text is written at the current cursor position that says: "Twenty-two points, plus triple-word score, plus fifty points for using all my letters. Game's over. I'm outta here." The mentioned quote is taken from Bart Simpsons’ character in The Simpsons which disables some security safeguards of the computer” (Melissa virus). Melissa......

Words: 554 - Pages: 3


...Protection Methods 1. [pic]Anti-Virus Programs 2. [pic]Detection of an Unknown Virus 3. [pic]Prophylaxis of Computer Infection 4. [pic]Recovery of Affected Objects 5. [pic]Virus Algorithm Analysis 6. Protection Methods Anti-Virus Programs 1. [pic]Types of Anti-Viruses 2. [pic]Which Anti-Virus Program is Better? 3. [pic]Tips on Usage of Anti-Virus Programs "Working with bad data implies good code" Andrew Krukov, AVP Team Types of Anti-Viruses Anti-virus programs are the most effective means of fighting viruses. But I would like to point out at once that there are no anti-viruses guaranteeing 100 percent protection from viruses. Any declarations about their existence may be considered to be either an advertising trick or a sign of incompetence. Such systems do not exist, because, for each anti-virus algorithm, it is always possible to suggest a virus counter algorithm, making this particular virus invisible for this particular anti-virus (fortunately, the opposite is also true: for any anti-virus algorithm, it is always possible to create an anti-virus). Moreover, the impossibility of the existence of the absolute anti-virus has been mathematically proved based on the theory of finite slot machines - the author of this proof is Fred Cohen. It is also necessary to pay attention to some terms used in anti-virus program discussion: False Positive - when an uninfected object (file, sector or system memory) triggers the anti-virus program. The......

Words: 4870 - Pages: 20

Computer Virus

...Summary The project introduces the readers to the basic concept of virus and provides an insight of the history of virus. The report also analyses the spread of viruses and defines certain measures that computer users may take into account to avoid viruses. Overall ,it was learnt from the report that it is important to keep us updated about computer viruses to be able to successfully safeguard us from computer virus attacks Introduction to Computer Virus: Viruses are mischievous programs, the purpose of which is to disrupt the sensible use of computers. It is a type of a mal-ware and do little more than display a message( Usually insulting!!!) on the screen , but some are designed to act after a certain period of time and do such things as make the letters start to drop off the screen or even erase the entire contents of your hard disk. As their name suggests, viruses are able to spread by infecting other disks and they do this by copying themselves onto other disks which are being used by the computer. Viruses are little programs or scripts that can create files, move files, erase files, consume your computer's memory, and cause your computer not to function correctly or to crash completely. Some viruses can duplicate themselves, attach themselves to programs, and travel across networks. They can self-modify or change over time as they copy themselves.  Viruses only spread across multiple computers if an uninfected computer is connected...

Words: 2136 - Pages: 9

Botulism Virus

...eating at a huge risk of contracting the Botulism virus. For this reason combined with all of Sarah’s symptoms it is obvious that she has contracted Botulism or Food Poisoning. A person often develops the Botulism virus by ingesting the toxin but in rare cases it can be inhaled. The toxin that causes Botulism is actually considered to be one of the most lethal substances known to man. If left untreated, it only takes 1 nanogram of the stuff to kill a human being. Because of this fact, the use of the Botulism virus as a biological weapon against the United States is always a deadly possibility. Also the fact that it only takes a small amount of contaminated food to poison a whole population makes a Botulism outbreak a constant threat to mankind. Due to the safety of the modern day canning process, the amount of Botulism cases has dropped to about 1,000 worldwide every year. The United States accounts for a little over 100 of those cases. Out of the 1,000 total Botulism cases about 25% are caused by ingesting unprocessed food grown from the earth’s soil, as did Sarah. There are many tell tale symptoms that can indicate a person has contracted the Botulism virus. After Sarah’s illness first broke out her body began to respond in a number of negative ways. Sarah experienced blurred vision, slurred speech, and difficulty swallowing which are all consistent with the symptoms of a person infected with the Botulism virus. Not only that, the police officer she flagged......

Words: 1434 - Pages: 6


...A computer virus is a computer program that can replicate itself[1] and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability. Malware includes computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious or unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves. An example of a virus which is not a malware, but is putatively benevolent, is Fred Cohen's compression virus.[2] However, antivirus professionals do not accept the concept of benevolent viruses, as any desired function can be implemented without involving a virus (automatic compression, for instance, is available under the Windows operating system at the choice of the user). Any virus will by definition make unauthorised...

Words: 271 - Pages: 2