13.07.2015 Views

ENCYCLOPEDIA OF Espionage, Intelligence, and Security Volume ...

ENCYCLOPEDIA OF Espionage, Intelligence, and Security Volume ...

ENCYCLOPEDIA OF Espionage, Intelligence, and Security Volume ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Computer VirusAuthorization <strong>and</strong> intrusion. Software programs allow ahierarchy of approvals to be established for access to data.In a company, for example, senior managers can be authorizedto view <strong>and</strong> even manipulate data that morejunior personnel do not have access to. Other programsact as guardians of the data, <strong>and</strong> detect any unauthorizedor unusual actions on the computer (i.e., hacking).Computers connected to the Internet are oftenequipped with software known as a firewall. The firewallfunctions to monitor incoming transmissions <strong>and</strong> to restrictthose that are deemed suspicious. It is a controlledgateway that limits who <strong>and</strong> what can pass through. Anumber of vendors offer firewall programs. Like anti-virussoftware, these programs can <strong>and</strong> should be frequentlyupdated, since those who seek to maliciously gain remoteaccess to computers are constantly developing methodsto thwart the firewall barrier.❚ FURTHER READING:BOOKS:Bentley, Tom, <strong>and</strong> Jon Hastings. Safe Computing: How toProtect Your Computer, Your Body, Your Data, YourMoney <strong>and</strong> Your Privacy in the Information Age. Concord,CA: Untechnical Press, 2000.Bishop, Matt. Computer <strong>Security</strong>: Art <strong>and</strong> Science. Boston:Addison Wesley Professional, 2002.Cheswick, William R., Steven M. Bellovin, <strong>and</strong> Aviel D.Rubin. Firewalls <strong>and</strong> Internet <strong>Security</strong>: Repelling theWiley Attacker, Second Edition. Boston: Addison WesleyProfessional, 2003.Stoll, Clifford. Cuckoo’s Egg: Tracking a Spy through theMaze of Computer <strong>Espionage</strong>. New York: Simon <strong>and</strong>Schuster, 2000.Whittaker, James A., <strong>and</strong> Herbert Thompson.How to BreakSoftware <strong>Security</strong>: Art <strong>and</strong> Science. Boston: AddisonWesley Professional, 2002.SEE ALSOComputer Hardware <strong>Security</strong>Computer VirusCyber <strong>Security</strong>❚ LARRY GILMANComputer VirusA computer virus is a program or segment of executablecomputer code that is designed to reproduce itself incomputer memory <strong>and</strong>, sometimes, to damage data.Viruses are generally short programs; they may eitherst<strong>and</strong>-alone or be embedded in larger bodies of code. TheEncyclopedia of <strong>Espionage</strong>, <strong>Intelligence</strong>, <strong>and</strong> <strong>Security</strong>A computer screen e-mail inbox showing subject names reading‘‘ILOVEYOU,’’ that contains a powerful computer virus that struck globalcommunications systems <strong>and</strong> crippled government <strong>and</strong> corporate computernetworks around the world in May, 2000. AP/WIDE WORLD PHOTOS.term “virus” is applied to such code by analogy to biologicalviruses, microorganisms that force larger cells to manufacturenew virus particles by inserting copies of their owngenetic code into the larger cell’s DNA. Because DNA canbe viewed as a data-storage mechanism, the parallel betweenbiological <strong>and</strong> computer viruses is remarkably exact.Many viruses exploit computer networks to spreadfrom computer to computer to computer, sending themselveseither as e-mail messages over the Internet ordirectly over high-speed data links. Programs that spreadcopies of themselves over network connections of anykind are termed “worms,” to distinguish them from programsthat actively copy themselves only within the memoryresources of a single computer. Some experts havesought to restrict the term “virus” to self-replicating codestructures that embed themselves in larger programs <strong>and</strong>are executed only when a user runs the host program, <strong>and</strong>to restrict the term “worm” to st<strong>and</strong>-alone code thatexploits network connections to spread (as opposed to,say, floppy disks or CD ROMs, which might spread avirus). However, virus terminology has shifted over thelast decade, as computers that do not communicate overnetworks have become rare. So many worm/virus hybridshave appeared that any distinction between them is rapidlydisappearing. In practice, any software that replicatesitself may be termed a “virus,” <strong>and</strong> most viruses are263

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!