病毒入侵微机的途径与防治研究(毕业论文).doc
约13页DOC格式手机打开展开
病毒入侵微机的途径与防治研究(毕业论文),题目:病毒入侵微机的途径与防治研究专业:计算机应用此毕业论文共8800字。摘要 病毒是具有破坏性极强的计算机程序构成,它会影响和破坏正常程序的执行和相关数据的安全.它不仅侵入到所运行的计算机系统之中,而且还能不断地把自己的复制品传播到其它的程序当中,以此达到破坏文件和相关程序的目的.微机病毒一般都具有极强的隐蔽性,没有...
内容介绍
此文档由会员 陈海峰 发布
题目:病毒入侵微机的途径与防治研究
专业:计算机应用
此毕业论文共8800字。
摘要
病毒是具有破坏性极强的计算机程序构成,它会影响和破坏正常程序的执行和相关数据的安全.它不仅侵入到所运行的计算机系统之中,而且还能不断地把自己的复制品传播到其它的程序当中,以此达到破坏文件和相关程序的目的.微机病毒一般都具有极强的隐蔽性,没有专业的软件往往不易被发现.结合实际,对病毒入侵微机的途径和防治进行简单的探讨.分析计算机病毒入侵微机的特点及途径,指出互联网是病毒发作酶最大载体?我们要坚持依法治毒,增强网络安全意识,并且要制定严格的病毒防治技术规范,防止计算机病毒的侵入。
[关键词]:计算机病毒信息安全 入侵途径 防治措施
abstract
The virus is highly destructive computer program structure, it will influence and disrupt the normal program execution and related data security. It not only invade has been run in a computer system, but also can continuously put their reproductions spread to other procedures, in order to destruction of documents and related procedures. The purpose of microcomputer virus generally with strong concealment, no professional software is often difficult to be found. Combining with practice, to virus intrusion microcomputer approaches and prevention are discussed in the paper. Analysis of computer virus intrusion microcomputer and the characteristics of the way, and points out that the Internet is a virus attack enzyme maximum carrier? We'll stick to govern the poison, enhance network safety consciousness, and shall formulate strict virus prevention specification, prevent the computer virus invades.
Keywords: computer virus information secure invasive pathways preventing measures
目录
第1章 计算机病毒概述……………………………………………- 4 -
第2章 计算机病毒入侵途径 - 7 -
第3章 计算机病毒的预防措施 - 8 -
第4章 个案分析 - 10 -
结束语 - 12 -
致谢 - 13 -
参考文献 - 13 -
专业:计算机应用
此毕业论文共8800字。
摘要
病毒是具有破坏性极强的计算机程序构成,它会影响和破坏正常程序的执行和相关数据的安全.它不仅侵入到所运行的计算机系统之中,而且还能不断地把自己的复制品传播到其它的程序当中,以此达到破坏文件和相关程序的目的.微机病毒一般都具有极强的隐蔽性,没有专业的软件往往不易被发现.结合实际,对病毒入侵微机的途径和防治进行简单的探讨.分析计算机病毒入侵微机的特点及途径,指出互联网是病毒发作酶最大载体?我们要坚持依法治毒,增强网络安全意识,并且要制定严格的病毒防治技术规范,防止计算机病毒的侵入。
[关键词]:计算机病毒信息安全 入侵途径 防治措施
abstract
The virus is highly destructive computer program structure, it will influence and disrupt the normal program execution and related data security. It not only invade has been run in a computer system, but also can continuously put their reproductions spread to other procedures, in order to destruction of documents and related procedures. The purpose of microcomputer virus generally with strong concealment, no professional software is often difficult to be found. Combining with practice, to virus intrusion microcomputer approaches and prevention are discussed in the paper. Analysis of computer virus intrusion microcomputer and the characteristics of the way, and points out that the Internet is a virus attack enzyme maximum carrier? We'll stick to govern the poison, enhance network safety consciousness, and shall formulate strict virus prevention specification, prevent the computer virus invades.
Keywords: computer virus information secure invasive pathways preventing measures
目录
第1章 计算机病毒概述……………………………………………- 4 -
第2章 计算机病毒入侵途径 - 7 -
第3章 计算机病毒的预防措施 - 8 -
第4章 个案分析 - 10 -
结束语 - 12 -
致谢 - 13 -
参考文献 - 13 -