Open Access Open Access  Restricted Access Subscription or Fee Access

A Study on Computer Threats and Virus Prevention

A. P. Thangamuthu, G. Vadivel, A. Priyadharshini


Security is a basic component of every computer. Security of computer technology, known as Information Security, compatible with computer and networks is security. This is a threat to any user who uses the computer network. Computer viruses will not be affected if the computer is not connected to the outside world. In this case, it is the Internet. This virus can be used as a medium to spread the virus completely. Many types of viruses spread on the Internet. Some of them are aimed at making money, and there is only one functionality and system performance. Some techniques are used to prevent viral transmission. The user's data will be publicly transmitted and protected from viral attacks. Techniques involving the prevention and prevention of viruses against computer networks will detect viral properties and functions


Security, Technology, Information, Computer, Networks, Virus, System.

Full Text:



S. Natarajan and S. Rajarajesware, "Computer Virus: A Major Network Security Threat," International Journal of Innovative Research & Development, vol.3, no. 7, pp. 229-302, 2014.

S. Chakraborty, "A Comparison study of ComputerVirus and Detection Techniques," International Journal of Scientific Research in Computer Science,Engineering and Information Technology, vol. 2, no.1, pp. 236-240, 2017.

M. Khari and C. Bajaj, "Detecting Computer Viruses," International Journal of Advanced Research in Computer Engineering & Technology, vol. 3, no. 7, pp. 2357-2364, 2014

S. Ramadhani, Y. M. Saragih, R. Rahim and A. P. U. Siahaan, "Post-Genesis Digital Forensics Investigation," International Journal of Scientific Research in Science and Technology, vol. 3, no. 6, pp. 164-166, 2017.

Auerbach Publishers (a division of Warren Gorham & Lamont). Data Security Management.Boston, MA. 1995.

British Standards Institute. A Code of Practice for Information Security Management, 1993.

Caelli, William, Dennis Longley, and Michael Shain Information Security Handbook. New York, NY: Stockton Press, 1991.

Hariyanto and A. P. U. Siahaan, "Intrusion Detection System in Network Forensic Analysis and Investigation," IOSR Journal of Computer Engineering, vol. 18, no. 6, pp. 115-121, 2016.

M. Rahgozar. “Computer networks”. Book of the Month Science and Technology, pp. 98-99, 2010.

F. Hohaji, "providing a framework of security for services in next generation networks," the Third National Conference on Information and Communication Technology, Tehran, 2008.

A. Vizandan, A. Mir Ghadri, J. Sheykh Zadegan, "passive defense in infrastructure communications networks with an emphasis on the security assessment of flow encryption algorithms," Journal of passive defense, pp. 47-52, summer and fall of 2011.

M. Azar Poor, A. Dahar, M. Jahani Mir, “the assessment of computer network security by Honey Pot technique in IDS & IPS systems”," journal of information technology era, pp. 78-84, 2012.

L. Peterson and B. Davie, Computer Networks: A Systems Approach, USA: Elsevier, Inc., 2012.

A. Tanenbaum and. D. Wetherall, Computer Networks, New Jersey: Pearson Prentice Hall, 2011.

Tutorials Point (I) Pvt. Ltd., Data Communication and Computer Network, INDIA:, 2014.

K. Mansfield and J. Antonakos, Computer Networking for LANS to WANS: Hardware, Software and Security, USA: Course Technology, Cengage Learning, 2010.

Computer Virus: Their Problems & Major attacks in Real Life, International Journal of P2P Network Trends and Technology (IJPTT), Vol. 3, Issue 4, May 2013


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.