PROBLEMS OF VINICNENIYA AND THE OBOBLIVOSTS I WILL EXPERIENCE THE COMPUTERS OF THE VOLUNTARY PROTECTIVE VIRUSES

  • G. Vіlsky
  • А. Radov
Keywords: attack, virus, malware, information, cybercrime, computer, site, server, Trojan

Abstract

The results of a study of the dangers of Trojan penetration viruses appearing in the form of a technical change in computer file systems, copying information on demand, or downloading malicious codes from the Internet with their unpacking and launching from a hard information disk of a computer are examined. The compatibility of manifestations of the Trojan virus and the desire of cybercriminals to control computers in systems and networks at a distance is grounded. An evaluative approach is proposed to establish the vulnerability of a computer system and network, based on theoretical modeling.

References

The Law of Ukraine «On the Basic Principles of Cyber Security of Ukraine», Kyiv,
5 October 2017 No. 2163-VIII.
Monakhov, Yu.M. Malicious programs in computer networks: training. allowance / Yu.M. Monakhov, LM Gruzdeva, M.Yu. Monakhov; Vladimir. state. un-t. Vladimir: Publishing house of Vladimir. state. University, 2010. 72 s.
Bragg R. Network Security. Full leadership / R. Bragg, M. Rhodes-Ousley,
C. Strassberg. М .: 2006. – 912 с.
Goshko S.V. Encyclopedia on protection from viruses / S.V. Goshko. M.: SOLON-R, 2005. 352 p.
Kaspersky K. Computer viruses: inside and out / K. Kaspersky. St. Petersburg. : Peter, 2005. 528 s.
Kozlov D.A. Encyclopedia of computer viruses / D.A. Kozlov, A.A. Parandovsky,
A.K. The Parandovsky. M. : SOLON-R, 2001. 464 p.
Sobeykis V.G. The ABC of the hacker 3. Computer virology / V.G. Sobeykis. M. : Major, 2006. 512 s.
Published
2018-08-26