Environmental Engineering Reference
In-Depth Information
Antivirus and Pest-Eradication Software
Antivirus programs are designed to detect, delay, and respond to programs
or pieces of code that are specifically designed to harm computers. These pro-
grams are known as malware . Malware can include computer viruses, worms,
and Trojan horse programs (programs that appear to be benign but which
have hidden harmful effects). Pest-eradication tools are designed to detect,
delay, and respond to spyware (strategies that websites use to track user behav-
ior, such as by sending cookies to the user's computer) and hacker tools that
track keystrokes (keystroke loggers) or reveal passwords (password crackers).
Viruses and pests can enter a computer system through the Internet or
through infected floppy discs or CDs. They can also be placed onto a system
by insiders. Some of these programs, such as viruses and worms, then move
throughout the drives and files of a computer or among networked comput-
ers. This malware can deliberately damage files, utilize memory and network
capacity, crash application programs, and initiate transmissions of sensitive
information from a PC. The specific mechanisms of these programs differ, but
they all can infect files and affect even the basic operating program of the com-
puter. The most important features of an antivirus program are its abilities to
identify potential malware and to alert a user before infection occurs, as well
as its ability to respond to a virus already resident on a system. Most of these
programs provide a log so the user can see what viruses have been detected
and where they were detected. After detecting a virus, the antivirus software
may delete the virus automatically, or it may prompt the user to delete the
virus. Some programs will also fix files or programs damaged by the virus.
Various sources of information are available to inform the general public
and computer system operators about new viruses being detected. Because
antivirus programs use signatures (or snippets of code or data) to detect the
presence of a virus, periodic updates are required to identify new threats.
Many antivirus software providers offer free updates that are able to detect
and respond to the latest viruses.
Firewalls
A firewall is an electronic barrier designed to keep computer hackers,
intruders, or insiders from accessing specific data files and information on a
utility's computer network or other electronic/computer systems. Firewalls
operate by evaluating and then filtering information coming through a
public network (such as the Internet) into the utility's computer or other
electronic system. This evaluation can include identifying the source or des-
tination addresses and ports and allowing or denying access based on this
identification. Two methods are used by firewalls to limit access to a utility's
computers or other electronic systems from the pubic network:
Search WWH ::




Custom Search