1 - 1 of 1 Comments Last updated Feb 26, 2013

Clementon, NJ

#1 Feb 26, 2013
Information assurance (IA) is the practice of assuring information and managing risks related to the use, processing, storage, and transmission of information or data (digital mostly in the computer-centric Information Age) and the systems and processes used for those purposes. Information assurance includes protection of the integrity, availability, authenticity, non-repudiation and confidentiality of user data (source: Wikipedia).

A virus is a small infectious agent that can replicate only inside the living cells of an organism and destroy genetic or cellular information security. A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.

Malware includes computer viruses, computer worms, ransomware, trojan horses, keyloggers, most rootkits, spyware, dishonest adware, malicious BHOs and other malicious software. Worms and Trojans simply distribute themselves across computer linked by networks, while viruses have the ability to replicate themselves (source: Wikipedia).

Most viruses and malware function by substituting flexible algorithms to trick CPUs into outputting data that seems on reading simple answers given by the CPU’s processors.

To “out-trick” malware, anti-virus software and anti-malware software must be written to protect the integrity and output strictness of a given CPU’s algorithm. For example, if a CPU’s algorithm reads,“If input = X and/or Y, then output = 1 and/or 2, and If input = Z, then output = 3,” then a malware algorithm will read,“If input = X, then output =2,” tricking the CPU into thinking that the simplified command is more efficient rather than less strict (and creating potential to insert false data), so an inserted appropriate anti-malware sub-program must read,“If input = X and/or Y, then output = 1 and/or 2, and if input = Z, then output = 3, but if input = X or Y, then output = 1 or 2.”

In other words, to create software protocols that are reliable and verifiable, anti-malware tools must be developed that will effectively assist a CPU or entire network of CPUs to create command template verification stencils, suggesting that relevant skeleton structure descriptive-themed Hollywood (USA) movies such as "Ghost in the Machine" (1993) represent summary intentions.

Are they printing movie posters on hemp/recycled paper yet?

God bless!

Tell me when this thread is updated: (Registration is not required)

Add to my Tracker Send me an email

Add your comments below

Characters left: 4000

Please note by submitting this form you acknowledge that you have read the Terms of Service and the comment you are posting is in compliance with such terms. Be polite. Inappropriate posts may be removed by the moderator. Send us your feedback.

Computer Science Discussions

Title Updated Last By Comments
Spotlight on ROC resident entrepreneur Ludovic ... Aug 26 Taz 1
Facebook to acquire Oculus VR for $2 billion Aug 21 Kid_Tomorrow 2
4 Convincing Reasons Why ARM Holdings' Pullback... Aug 7 otr214424 1
IT officers facing key industry challenges [Gul... Aug 5 NITiN 2 Aug 2 FedBook down last... 1
Dematic taps BlackBerry executive to launch R&D... Jul '14 Ukraine launch 1
thesis Jul '14 dona mae 1
Enter and win $5000

Computer Science People Search

Addresses and phone numbers for FREE