Essays.club - TCC, Modelos de monografias, Trabalhos de universidades, Ensaios, Bibliografias
Pesquisar

O VÍRUS COMPUTACIONAL

Por:   •  5/12/2018  •  8.481 Palavras (34 Páginas)  •  398 Visualizações

Página 1 de 34

...

Palavras-chave: Vírus, Informática e boot.

---------------------------------------------------------------

ABSTRACT

The virus is a program or part of a program, usually malicious, that spreads by infecting, that is, by inserting copies of itself and becoming part of other programs and computer files. The first computer virus was created in 1982 by a boy of just 15 years old, and was named Elk Cloner, the virus could infect Apple II computers via floppy disks serving as the operating system and the same was of the boot class, His function was to cause delays in the operating system and mostly damaged the hard drive. From there began to be set up more and more dangerous viruses and causing more damage. The first virus that emerged with impact in Brazil was the ping-pong, arose in the time of MS-DOS Operating System / PC-DOS, Stoned and also belongs to the boot class. With the considerable increase in the number of computer crime, there was the need to create laws to punish the practice of these types of offenses. The first person to be arrested for using computer viruses to harm others, was in use from the Pathogen virus, made in England, was tracked by Scotland Yard and the author was sentenced to 18 months in prison. With the exchange of information via the internet, the term information security in computer came along, his goal in computer science is to ensure that information did not suffer any changes or violation at the time that it is stored, or when the same is pending a right recipient. Also the virus were created in the 1980s in order to reduce the viruses and remove them, providing security and tranquility for the user to navigate with a certain tranquility on the Internet, but to the virus have its intended effect, needy that you take certain precautions, such as: open, run and install only trusted programs or files.

Key words : Virus , Computer and boot .

---------------------------------------------------------------

LISTA DE FIGURAS

Figura 1- Fluxograma ações do vírus da categoria boot 23

Figura 2 - Vírus da categoria hoax em rede sociais 24

Figura 3 - Leitura da unidade F:\(pendrive) 33

---------------------------------------------------------------

LISTA DE SIGLAS

CD → Compact Disc (em português Disco Compacto).

DD → Double Density

DVD → Digital Versatile Disc (em português Disco Digital Versátil).

EDS → Extra Density Super

HD → Hard Disk (em português Disco Rigido).

KB → Kilobyte

MB → Megabyte

NFC → Near Field Communication (em português Comunicação por Campo de Proximidade).

PC → Personal Computer (em português Computador Pessoal).

TB → Terabyte

USB → Universal Serial Bus (em português Transporte Universal de Serial).

---------------------------------------------------------------

SUMÁRIO

INTRODUÇÃO 12

CAPÍTULO I 14

1. SINTESE DE VÍRUS COMPUTACIONAL 14

1.1 HISTÓRIA DOS PRIMEIROS VÍRUS COMPUTACIONAIS 14

1.1.1 CRONOLOGIA DOS VÍRUS NOS MICROCOMPUTADORES. 15

1.2 HACKER E CRACKER 18

1.2.1 INVASÕES DE CRACKER EM SMARTPHONE 18

1.2.2 Vírus pela rede Wi-Fi 18

1.2.3 Roubo por proximidade 19

1.2.4 Aplicativo que descobre senha pelo som do teclado. 19

1.2.5 Perigo ao tocar a tela 19

1.2.6 Apps falsos 20

CAPÍTULO II 21

2 CATEGORIA DE VÍRUS COMPUTACIONAL 21

2.1 ARQUIVO 21

2.2 BACKDOOR 21

2.3 BOOT 22

2.4 HOAX 23

2.5 MUTANTE 25

2.6 POLIMÓRFICO 25

2.7 PROGRAMA 25

2.8 SCRIPT 26

2.9 STEALTH 26

2.10 ENCRIPTAÇÃO 27

2.11 PERCA DE PRIVACIDADE COM O VÍRUS 27

CAPÍTULO III 29

3 SEGURANÇA DA INFORMAÇÃO 29

3.1 CRIMES DIGITAIS COM VÍRUS COMPUTACIONAL 30

3.2 FORMAS DE PREVENÇÃO CONTRA OS ATAQUES MALÉFICOS DOS VÍRUS 31

3.2.1 Estar sempre atento com oque é aberto no e-mail 31

3.2.2 Realizar download apenas de sites confiáveis 32

3.2.3 Ter cuidado com o que será conectado ao computador 32

3.3 ANTIVÍRUS 34

3.3.1 Antivírus pagos 34

3.3.2 Antivírus gratuito 35

CONSIDERAÇÕES FINAIS 37

REFERENCIAS BIBLIOGRÁFICAS 38

---------------------------------------------------------------

INTRODUÇÃO

Nos dias atuais é comum ouvir falar sobre os ataques de vírus computacional, porém poucas pessoas dão a devida atenção a essa praga virtual. Os vírus são

...

Baixar como  txt (55.7 Kb)   pdf (121.9 Kb)   docx (604 Kb)  
Continuar por mais 33 páginas »
Disponível apenas no Essays.club