Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Virus

Handbook of Research on Securing Cloud-Based Databases with Biometric Applications
It is an infected program which when executes self replicates in other parts of the program, corrupt or delete various important files etc.. Its effects acquire lot amout of useful memory and also produces a halt in the system.
Published in Chapter:
BDS: Browser Dependent XSS Sanitizer
Shashank Gupta (National Institute of Technology Kurukshtra, India) and B. B. Gupta (National Institute of Technology Kurukshtra, India)
DOI: 10.4018/978-1-4666-6559-0.ch008
Abstract
Cross-Site Scripting (XSS) attack is a vulnerability on the client-side browser that is caused by the improper sanitization of the user input embedded in the Web pages. Researchers in the past had proposed various types of defensive strategies, vulnerability scanners, etc., but still XSS flaws remains in the Web applications due to inadequate understanding and implementation of various defensive tools and strategies. Therefore, in this chapter, the authors propose a security model called Browser Dependent XSS Sanitizer (BDS) on the client-side Web browser for eliminating the effect of XSS vulnerability. Various earlier client-side solutions degrade the performance on the Web browser side. But in this chapter, the authors use a three-step approach to bypass the XSS attack without degrading much of the user's Web browsing experience. While auditing the experiments, this approach is capable of preventing the XSS attacks on various modern Web browsers.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Information Warfare: Survival of the Fittest
A self-replicating program that is hidden in another piece of computer Code.
Full Text Chapter Download: US $37.50 Add to Cart
Auditing Defense against XSS Worms in Online Social Network-Based Web Applications
It is a self-replicating code which looks like good code but performs harmful effect. It may cause severe harm to the user by taking control of his computer or cruses his computer.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security Awareness Among Postgraduate Students: A Study of Mangalore University
It is malware that replicates and propagates itself by inserting copies of itself into other executable code or documents.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Defending Information Networks in Cyberspace: Some Notes on Security Needs
a) A type of malware, which spreads in an automated fashion between vulnerable computers, much like a biological virus does with living creatures; b) Computer viruses are small programs or scripts that can negatively affect the health of your computer. These malicious little programs can create files, move files, erase files, consume your computer's memory, and cause your computer not to function correctly. Some viruses can duplicate themselves, attach themselves to programs, and travel across networks. In fact opening an infected e-mail attachment is the most common way to get a virus.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Current Network Security Technology
Malicious code added to an executable file loaded to a computer and executed without the user’s knowledge and consent. Computer viruses often copy and spread themselves to other computers in the same network.
Full Text Chapter Download: US $37.50 Add to Cart
POSMASWEB: Paranoid Operating System Methodology for Anonymous and Secure Web Browsing
Program that runs on a machine with or without user knowledge and that targets the integrity, availability or confidentiality of the information.
Full Text Chapter Download: US $37.50 Add to Cart
Malicious Software
A type of self-replicating malware that infects other files or programs.
Full Text Chapter Download: US $37.50 Add to Cart
Mathematical Models for Computer Virus: Computer Virus Epidemiology
Malicious software that infects other programs by modifying them.
Full Text Chapter Download: US $37.50 Add to Cart
Application Service Provision for Intelligent Enterprises
A malicious code added to an e-mail program or other downloadable file that is loaded onto a computer without the user’s knowledge and which runs often without the user’s consent. Computer viruses can often copy themselves and spread themselves to a user’s e-mail address book or other computers on a network.
Full Text Chapter Download: US $37.50 Add to Cart
Malicious Software in Mobile Devices
A virus is a piece of a software program that attaches to a normal program or file and depends on execution of the host program to self-replicate and infect more programs or files.
Full Text Chapter Download: US $37.50 Add to Cart
Hackers, Hacking, and Eavesdropping
A virus is a piece of software which is capable of reproducing itself and causing great harm to files or other programs on the same computer. A true virus cannot spread to another computer without human assistance.
Full Text Chapter Download: US $37.50 Add to Cart
Practical Measures for Securing Government Networks
A virus is a program or piece of code that is loaded onto your computer without your knowledge and infects programs already in existence by inserting new code. Viruses can replicate themselves and are dangerous because they can quickly use all available memory and bring the system to a halt.
Full Text Chapter Download: US $37.50 Add to Cart
Taxonomy of Cyber Threats to Application Security and Applicable Defenses
Malicious code that attaches to a file, document, or master boot record (MBR).
Full Text Chapter Download: US $37.50 Add to Cart
An Overview of Threats to Information Security
Computer code that performs malicious actions by attaching to another computer program.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR