2023年全國碩士研究生考試考研英語一試題真題(含答案詳解+作文范文)_第1頁
已閱讀1頁,還剩12頁未讀, 繼續(xù)免費閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)

文檔簡介

1、<p><b>  畢業(yè)設(shè)計(論文)</b></p><p><b>  外文翻譯</b></p><p>  題 目 淺談計算機病毒及防護 </p><p>  專 業(yè) 信息管理與信息系統(tǒng) </p><p>  班 級 XXXXXX

2、XX </p><p>  學 生 X X X </p><p>  指導教師 X X X </p><p><b>  高科學院</b></p><p><b>  2013 年</b></p&

3、gt;<p><b>  英文原文:</b></p><p>  Computer network virus and precautions</p><p>  With the new network technology and application of the continuous rapid development of the compu

4、ter network should Use of becoming increasingly widespread, the role played by the increasingly important computer networks and human .More inseparable from the lives of the community's reliance on them will keep gro

5、wing. With the continuous development of computer technology, the virus has become increasingly complex and senior, the new generation of Computer viruses make full use of certain commonly</p><p>  First, A

6、computer virus </p><p>  The definition of computer virus computer virus (Computer Virus) in the "people's republic of China .The computer information system security protection regulations "wh

7、ich has been clearly defined, the virus" refers to the preparation or Computer program inserted in the damage or destruction of computer data functions, affecting computer use Self-replication and can a group of com

8、puter instructions, or code. " </p><p>  Second, network virus </p><p>  With the development of network and the Internet, a wider spread, the greater New harm The virus emerged This is the

9、 Internet virus. The virus is an emerging concept in the traditional .The virus was not classified network virus this concept, because the development of networks, the traditional virus The network also has a number of c

10、haracteristics. Today's Internet virus is a broad notion of a As as long as it is carried out using the Internet to spread destruction can be known as network virus</p><p>  Third, network virus and the

11、distinction between computer virus </p><p>  The original common computer virus is nothing more than the devastating formatted hard drive, delete system .With the users documents, databases, etc. destruction

12、. The mode of transmission is through nothing but also by virus infection .Mutual copy of the software, carrying the virus, such as the use of pirated optical discs, such as infection disk systems.The pilot virus and inf

13、ected executable file virus, in addition to a network virus . These are the common characteristics of the virus, but a</p><p>  Fourth, the network against virus </p><p>  Network destructive vi

14、rus, will directly affect the work of the network, ranging from lowering speed video. Ring for the efficiency of the network, while in the collapse, undermining the server information to a multi-year work destroyed. Dan.

15、 Because viruses and other network annually fraud led to economic losses of over 16 billion yuan, But this figure is constantly rising year by year. The next few years, the size of the market will reach Security . 60 bil

16、lion yuan. One antivirus software expe</p><p>  Fifth, network transmission of the virus Features </p><p>  1. Infection fast: single machine environment, the virus can only be passed from one c

17、omputer diskette .To another, and in the network can be adopted by the rapid spread of network communication mechanism. According to measurement .Set against a typical PC network use in normal circumstances, once a compu

18、ter workstation sick Drugs, and will be online within 10 minutes in the several hundreds of all infected computers. </p><p>  2. Proliferation of a wide range: in the network due to the spread of the virus v

19、ery quickly and spread to encompass a large area, not only the rapid transmission of all LAN computer, but also through remote workstations virus in Inter spread to thousands of miles away. </p><p>  3. Diss

20、emination in the form of complex and varied: computer viruses in general through the network " Station server workstation "channels of communication, but in the form of complex and diverse communication. </p

21、><p>  4. Difficult to completely wipe: the standalone computer virus carriers sometimes can be deleted documents .Or low-level formatted drives, and other measures to eliminate the virus completely, and the ne

22、twork once a computer work .Clean stations failed to disinfect the entire network can be re-infected by the virus, or even just completed removal The work of a workstation is likely to be on-line by another workstation v

23、irus infection. Therefore, Only workstations in addition to killing viruses, </p><p>  Sixth, the type of network virus </p><p>  As the network increasingly developed, the type of network virus

24、 has been increasing, generally summed up as the following categories: </p><p><b>  1. Worm </b></p><p>  It is the use of the transmission mechanism of replication and dissemination

25、 network, the mode of transmission is through the network .And e-mail, the prefix is Worm. For example, in recent years the great harm "Nimda" virus is Demodex A worm virus. The virus used Microsoft's Wind

26、ows operating system, computer flu .With this virus, will continue to automatically dial-up Internet access and use information in the document or the address Sharing network spreads, and ultimately undermine the most &l

27、t;/p><p>  2. Macro Virus </p><p>  Hong virus is a Storage in the document or template in the Acer computer virus. The prefix Macro, once open such documents, which Acer will be implemented, then

28、the virus would Acer .Been enabled transferred to the computer, and in the presence of the Normal template. From then on, all since the document will be kept moving "infection" that the Hong virus, and if other

29、 users opened the flu documents with the virus, the Hong virus will be transferred to his computer. </p><p>  3. Destructive procedures virus </p><p>  The prefix destructive virus program is: H

30、arm. The characteristics of this virus is a good in itself look at the user clicks on icons to temptation, when the user clicks on the virus, the virus will direct users computer generated destruction. If C formatted dis

31、k(Harm.formatC.f), the killer orders (Harm. Command.Killer). </p><p>  4. System virus </p><p>  The prefix system for the virus: Win32, PE, Win95, W32, W95, and so on. These viruses the charact

32、eristics of the general public can be infected with the windows operating system *. exe and *. dll file, And through these documents for dissemination. If the CIH virus. </p><p>  5. Backdoor virus </p>

33、;<p>  Backdoor virus prefix is Backdoor. The total of such virus through network - Sowing, opened the back door to the system to the user and potential safety problems. </p><p>  6. Bundling machine

34、virus </p><p>  Bundled-virus prefix is: Binder. The characteristics of this virus is the virus writers will use Specific procedures will be bundled with a number of applications such as QQ, IE bundled up on

35、 the surface .It is normal to see the paper, when users run these bundled virus, will run these applications on the surface .Procedures, and then tied to the operation of hidden virus, which caused harm to the user. Such

36、 as: baled Tied QQ (Binder.QQPass.QQ Bin), the system killer (Binder.killsys). </p><p>  7. Script virus </p><p>  The virus is usually JavaScript scripting code prepared by the malicious code,

37、prefix is usually .Spript, with the general nature of advertising, will modify your IE Home, modify registry, and other information, Computer user inconvenience caused. </p><p>  8. Planting procedures virus

38、 virus </p><p>  This virus is of the public will run from the in vivo release of one or several new under the virus to the system directory, by the release of a new virus damage. If the glaciers are sowing

39、(Dropper.BingHe2.2C), MSN striker (Dropper.Worm.Smibag). </p><p>  9. Joke virus </p><p>  The prefix is the virus joke: Joke. Also called prank virus. The characteristics of this virus is itsel

40、f a nice user clicks on icons to temptation, When the user clicks of this virus, the virus will be made to disrupt the operation scare users, in fact the virus did not destroy any computer user. Such as: ghost (Joke.Girl

41、ghost) virus. </p><p>  10. Trojan hacking virus </p><p>  Trojan its prefix is: Trojan, hackers virus prefix General for Hack. Public special sex is through the network or system loopholes into

42、 the user's system and hidden, and then leaked to the outside world user information, hackers virus there is a visual interface to the user's computer remotely control. Trojans, hackers often paired virus emergin

43、g, Trojan horse virus responsible for the invasive power users brain, and hackers virus will be passed to the Trojan horse virus control. . General Troja</p><p>  Seventh, Anti-virus software and other prev

44、entive measures</p><p>  Many users install anti-virus software that can detect and eliminate known viruses after the computer downloads or runs the executable. There are two common methods that an anti-viru

45、s software application uses to detect viruses. The first, and by far the most common method of virus detection is using a list of virus signature definitions. This works by examining the content of the computer's mem

46、ory (its RAM, and boot sectors) and the files stored on fixed or removable drives (hard drives, floppy</p><p>  Some anti-virus programs are able to scan opened files in addition to sent and received e-mails

47、 'on the fly' in a similar manner. This practice is known as "on-access scanning." Anti-virus software does not change the underlying capability of host software to transmit viruses. Users must update t

48、heir software regularly to patch security holes. Anti-virus software also needs to be regularly updated in order to prevent the latest threats.</p><p>  One may also minimize the damage done by viruses by ma

49、king regular backups of data (and the operating systems) on different media, that are either kept unconnected to the system (most of the time), read-only or not accessible for other reasons, such as using different file

50、systems. This way, if data is lost through a virus, one can start again using the backup (which should preferably be recent).</p><p>  If a backup session on optical media like CD and DVD is closed, it becom

51、es read-only and can no longer be affected by a virus (so long as a virus or infected file was not copied onto the CD/DVD). Likewise, an operating system on a bootable CD can be used to start the computer if the installe

52、d operating systems become unusable. Backups on removable media must be carefully inspected before restoration. The Gammima virus, for example, propagates via removable flash drives. </p><p><b>  中文翻譯

53、:</b></p><p>  計算機網(wǎng)絡(luò)病毒與防范</p><p>  隨著各種新的網(wǎng)絡(luò)技術(shù)的不斷應(yīng)用和迅速發(fā)展, 計算機網(wǎng)絡(luò)的應(yīng)用范圍變得越來越廣泛,所起的作用越來越重要, 計算機網(wǎng)絡(luò)與人類的生活更加密不可分, 社會對其的依賴程度也會隨之不斷增長。而隨著計算機技術(shù)的不斷發(fā)展, 病毒也變得越來越復(fù)雜和高級, 新一代的計算機病毒充分利用某些常用操作系統(tǒng)與應(yīng)用軟件的低防護性的弱點

54、不斷肆虐, 最近幾年隨著因特網(wǎng)在全球的普及, 將含病毒文件附加在郵件中的情況不斷增多, 通過網(wǎng)絡(luò)傳播病毒,使得病毒的擴散速度也急驟提高, 受感染的范圍越來越廣。因此, 計算機網(wǎng)絡(luò)的安全保護將會變得越來越重要。</p><p><b>  一、計算機病毒</b></p><p>  計算機病毒的定義計算機病毒(Computer Virus)在《中華人民共和國計算機信息系

55、統(tǒng)安全保護條例》中被明確定義, 病毒“指編制或者在計算機程序中插入的破壞計算機功能或者破壞數(shù)據(jù), 影響計算機使用并且能夠自我復(fù)制的一組計算機指令或者程序代碼”。</p><p><b>  二、網(wǎng)絡(luò)病毒</b></p><p>  隨著網(wǎng)絡(luò)和Internet 的發(fā)展,一個傳播范圍更廣,危害更大的新型病毒應(yīng)運而生.這就是網(wǎng)絡(luò)病毒。網(wǎng)絡(luò)病毒是一個新興的概念, 在傳統(tǒng)的病毒

56、分類里沒有網(wǎng)絡(luò)病毒這個概念, 由于網(wǎng)絡(luò)的發(fā)展, 傳統(tǒng)的病毒也就具有了一些網(wǎng)絡(luò)的特性。如今的網(wǎng)絡(luò)病毒是一個廣義的概念, 一般只要是利用網(wǎng)絡(luò)來進行傳播、破壞的都可以被稱為網(wǎng)絡(luò)病毒, 如:“愛情后門”、“熊貓燒香”等。</p><p>  三、網(wǎng)絡(luò)病毒與計算機病毒的區(qū)別</p><p>  原先常見的計算機病毒的破壞性無非就是格式化硬盤, 刪除系統(tǒng)與用戶文件、破壞數(shù)據(jù)庫等等。而傳播途徑也無非是通

57、過遭病毒感染的軟件的互相拷貝, 攜帶病毒的盜版光盤的使用等, 如感染磁盤系統(tǒng)區(qū)的引導型病毒和感染可執(zhí)行文件的文件型病毒, 而網(wǎng)絡(luò)病毒除了具有普通病毒的這些特性外, 還具有遠端竊取用戶數(shù)據(jù)、遠端控制對方計算機等破壞特性, 比如特洛伊木馬病毒和消耗網(wǎng)絡(luò)計算機的運行資源, 拖垮網(wǎng)絡(luò)服務(wù)器的蠕蟲病毒。</p><p><b>  四、網(wǎng)絡(luò)病毒的危害</b></p><p> 

58、 網(wǎng)絡(luò)上病毒破壞性大, 將直接影響網(wǎng)絡(luò)的工作, 輕則降低速度, 影響工作效率, 重則使網(wǎng)絡(luò)崩潰, 破壞服務(wù)器信息, 使多年工作毀于一旦。每年由于病毒等網(wǎng)絡(luò)欺詐行為導致的經(jīng)濟損失高達160 億多元,而且這個數(shù)字逐年還在不斷地攀升。未來幾年, 安防市場規(guī)模將達到600 億元。一位殺毒軟件專家指出: “網(wǎng)絡(luò)病毒更甚于禽流感”。如: “熊貓燒香”除了通過網(wǎng)站帶毒感染用戶之外, 此病毒還會通過QQ 最新漏洞傳播自身, 通過網(wǎng)絡(luò)文件共享、默認共享、

59、系統(tǒng)弱口令、U 盤及窗體頂端窗體底端移動硬盤等多種途徑傳播。而局域網(wǎng)中只要有一臺機器感染, 就可以瞬間傳遍整個網(wǎng)絡(luò), 甚至在極短時間之內(nèi)就可以感染幾千臺計算機, 嚴重時可以導致網(wǎng)絡(luò)癱瘓。中毒癥狀表現(xiàn)為電腦中所有可執(zhí)行的.exe 文件都變成了一種怪異的圖案, 該圖案顯示為“熊貓燒香”, 繼而系統(tǒng)藍屏、頻繁重啟、硬盤數(shù)據(jù)被破壞等, 嚴重的整個公司局域網(wǎng)內(nèi)所有電腦會全部中毒?!靶茇垷恪眱H半個多月, 變種數(shù)已高達50 多個, 并且其感染用戶的

60、數(shù)量不斷擴大。使得感染“熊貓燒香”病毒的個人用戶已經(jīng)高達幾百萬, 企業(yè)用戶感染數(shù)更是成倍上升。網(wǎng)絡(luò)上的計算機越多, 網(wǎng)絡(luò)病</p><p>  五、網(wǎng)絡(luò)病毒傳播特點</p><p>  1.感染速度快: 在單機環(huán)境下, 病毒只能通過軟盤從一臺計算機帶到另一臺, 而在網(wǎng)絡(luò)中則可以通過網(wǎng)絡(luò)通訊機制迅速擴散。根據(jù)測定, 針對一臺典型的PC 網(wǎng)絡(luò)在正常使用情況, 只要有一臺工作站有病毒, 就可在幾

61、十分鐘內(nèi)將網(wǎng)上的數(shù)百臺計算機全部感染。</p><p>  2.擴散面廣: 由于病毒在網(wǎng)絡(luò)中擴散非常快, 擴散范圍很大, 不但能迅速傳染局域網(wǎng)內(nèi)所有計算機, 還能通過遠程工作站將病毒在一瞬間傳播到千里之外。</p><p>  3.傳播的形式復(fù)雜多樣: 計算機病毒在網(wǎng)絡(luò)上一般是通過“工作站服務(wù)器工作站”的途徑進行傳播的, 但傳播的形式復(fù)雜多樣。</p><p>  

62、4.難于徹底清除: 單機上的計算機病毒有時可通過刪除帶毒文件或低級格式化硬盤等措施將病毒徹底清除, 而網(wǎng)絡(luò)中只要有一臺工作站未能消毒干凈就可使整個網(wǎng)絡(luò)重新被病毒感染, 甚至剛剛完成清除工作的一臺工作站就有可能被網(wǎng)上另一臺帶毒工作站所感染。因此,僅對工作站進行病毒殺除, 并不能解決病毒對網(wǎng)絡(luò)的危害。</p><p><b>  六、網(wǎng)絡(luò)病毒的類型</b></p><p>

63、;  由于網(wǎng)絡(luò)越來越發(fā)達, 網(wǎng)絡(luò)病毒的種類也越來越多, 大體歸納為以下幾類:</p><p><b>  1.蠕蟲病毒</b></p><p>  它的傳染機理是利用網(wǎng)絡(luò)進行復(fù)制和傳播, 傳染途徑是通過網(wǎng)絡(luò)和電子郵件,前綴是Worm。比如近年危害很大的“尼姆達”病毒就是蠕蟲病毒的一種。這一病毒利用了微軟視窗操作系統(tǒng)的漏洞, 計算機感染這一病毒后, 會不斷自動撥號上網(wǎng),

64、 并利用文件中的地址信息或者網(wǎng)絡(luò)共享進行傳播, 最終破壞用戶的大部分重要數(shù)據(jù)。</p><p><b>  2.宏病毒</b></p><p>  宏病毒是一種寄存在文檔或模板的宏中的計算機病毒。前綴是Macro, 一旦打開這樣的文檔, 其中的宏就會被執(zhí)行, 于是宏病毒就會被激活, 轉(zhuǎn)移到計算機上, 并駐留在Normal 模板上。從此以后, 所有自動保存的文檔都會“感

65、染”上這種宏病毒, 而且如果其他用戶打開了感染病毒的文檔, 宏病毒又會轉(zhuǎn)移到他的計算機上。</p><p><b>  3.破壞性程序病毒</b></p><p>  破壞性程序病毒的前綴是: Harm。這類病毒的特性是本身具有好看的圖標來誘惑用戶點擊, 當用戶點擊病毒時, 病毒便會直接對用戶計算機產(chǎn)生破壞。如格式化C 盤(Harm.formatC. f) 、殺手命令

66、(Harm.Command.Killer) 等。</p><p><b>  4.系統(tǒng)病毒</b></p><p>  系統(tǒng)病毒的前綴為:Win32、PE、Win95、W32、W95 等。這些病毒的一般公有的特性是可以感染windows 操作系統(tǒng)的*.exe 和*.dll 文件,并通過這些文件進行傳播。如CIH 病毒。</p><p><

67、b>  5.后門病毒</b></p><p>  后門病毒的前綴是Backdoor。該類病毒的共有特性是通過網(wǎng)絡(luò)傳播, 給系統(tǒng)開后門, 給用戶帶來安全隱患。</p><p><b>  6.捆綁機病毒</b></p><p>  捆綁機病毒的前綴是: Binder。這類病毒的特性是病毒作者會使用特定的捆綁程序?qū)⒉《九c一些應(yīng)用程

68、序如QQ、IE 捆綁起來, 表面上看是正常文件, 當用戶運行這些捆綁病毒時, 會表面上運行這些應(yīng)用程序, 然后隱藏運行捆綁在一起的病毒, 從而給用戶造成危害。如: 捆綁QQ(Binder.QQPass.QQBin) 、系統(tǒng)殺手(Binder.killsys) 等。</p><p><b>  7.腳本病毒</b></p><p>  腳本病毒通常是JavaScript

69、 代碼編寫的惡意代碼, 前綴是通常為Spript, 一般帶有廣告性質(zhì), 會修改您的IE 首頁、修改注冊表等信息,造成用戶使用計算機不方便。</p><p>  8.病毒種植程序病毒</p><p>  這類病毒的公有特性是運行時會從體內(nèi)釋放出一個或幾個新的病毒到系統(tǒng)目錄下, 由釋放出來的新病毒產(chǎn)生破壞。如冰河播種者(Dropper.BingHe2.2C) 、MSN 射(Dropper.Wo

70、rm. Smibag)等。</p><p><b>  9.玩笑病毒</b></p><p>  玩笑病毒的前綴是: Joke。也稱惡作劇病毒。這類病毒的特性是本身具有好看的圖標來誘惑用戶點擊,當用戶點擊這類病毒時, 病毒會做出各種破壞操作來嚇唬用戶, 其實病毒并沒有對用戶電腦進行任何破壞。如: 女鬼( Joke.Girlghost) 病毒。</p>&

71、lt;p><b>  10.木馬黑客病毒</b></p><p>  木馬病毒其前綴是: Trojan, 黑客病毒前綴名一般為Hack。公有特性是通過網(wǎng)絡(luò)或者系統(tǒng)漏洞進入用戶的系統(tǒng)并隱藏, 然后向外界泄露用戶信息, 黑客病毒則有一個可視的界面, 能對用戶的電腦進行遠程控制。木馬、黑客病毒往往是成對出現(xiàn)的, 木馬病毒負責侵入用戶的電腦, 而黑客病毒則會通過該木馬病毒來進行控制。。一般的木

72、馬如QQ消息尾巴木馬Trojan. QQ3344, 還有大Trojan.LMir.PSW.60。病毒名中有PSW或者什么PWD 之類的一般表示這個病毒有盜取密碼的功能,一些黑客程序如網(wǎng)絡(luò)梟雄Hack.Nether.Client 等。</p><p>  七、 防病毒軟件和其他預(yù)防措施</p><p>  許多用戶安裝 防病毒軟件 可以檢測和消除計算機后已知病毒 下載 或運行可執(zhí)行文件。有兩

73、種常見的方法,一個 防病毒軟件 應(yīng)用程序用來檢測病毒。第一個,也是迄今發(fā)現(xiàn)的病毒最常見的方法是使用的清單 病毒特征 定義。通過檢查計算機的內(nèi)存內(nèi)容,這工程(其 內(nèi)存和 啟動扇區(qū))和固定或可移動驅(qū)動器(硬盤驅(qū)動器,軟盤驅(qū)動器)中存儲的文件,并比較這些文件對一 數(shù)據(jù)庫 已知病毒的“簽名”。該檢測方法的缺點是,用戶只能從病毒侵襲,學前教育日最后的病毒定義更新。第二種方法是使用 啟發(fā)式 算法找到共同的行為為基礎(chǔ)的病毒。這種方法有能力檢測病毒,反

74、病毒安全公司尚未創(chuàng)建一個簽名。</p><p>  一些反病毒程序能夠掃描類似的方式,除了發(fā)送和接收電子郵件在飛行'打開的文件。這種做法稱為“按訪問掃描?!狈床《拒浖荒芨淖冎鳈C軟件的基本傳播病毒的能力。使用者必須更新他們的軟件定期向 補丁 安全漏洞。防病毒軟件也需要定期更新,以防止最新的威脅。</p><p>  人們也盡量減少使病毒進行經(jīng)常性的破壞 備份 數(shù)據(jù)(和操作系統(tǒng))以不

75、同媒體,是不是三緘其口無關(guān)的系統(tǒng)(大部分時間),只讀或其他原因沒有獲得,例如使用不同的 文件系統(tǒng)。這樣,如果數(shù)據(jù)是通過病毒的損失,可以重新開始使用備份(這是最近最好)。</p><p>  如果備份會議 光學媒體 喜歡 光盤 和 影碟 關(guān)閉,就變成只讀,可以不再受病毒影響的(只要病毒或受感染的文件沒有復(fù)制到的CD / DVD)。同樣,在操作系統(tǒng) 開機 光盤可用于啟動計算機,如果安裝的操作系統(tǒng)無法使用。移動媒體上備

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 眾賞文庫僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
  • 6. 下載文件中如有侵權(quán)或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論