Virus, a whole case, but not lost

Malware Malicious software includes viruses, worms and Trojans. Its severity ranges from jokes to be attacks that cause loss of data, equipment damage, denial of services and economic losses. It originated in the beginning of computing to mid-twentieth sophistication, and affecting the Internet, to...

Full description

Saved in:
Bibliographic Details
Main Authors: Mata Villalpando-Becerra, Isaac, Guevara-Juárez, Oscar Antonio
Format: Online
Language:eng
Published: Universidad Autónoma de Tamaulipas 2010
Online Access:https://revistaciencia.uat.edu.mx/index.php/CienciaUAT/article/view/258
Tags: Add Tag
No Tags, Be the first to tag this record!
id oai:ojs.pkp.sfu.ca:article-258
record_format ojs
spelling oai:ojs.pkp.sfu.ca:article-2582017-11-21T16:30:29Z Virus, a whole case, but not lost Virus informáticos, todo un caso, pero no perdido Mata Villalpando-Becerra, Isaac Guevara-Juárez, Oscar Antonio malware malware prevention malware incidents solution. Malware prevención de malware solución de incidentes por Malware. Malware Malicious software includes viruses, worms and Trojans. Its severity ranges from jokes to be attacks that cause loss of data, equipment damage, denial of services and economic losses. It originated in the beginning of computing to mid-twentieth sophistication, and affecting the Internet, to all platforms and all operating systems, mainly to Microsoft Windows because of its great popularity and commercial. To expand, the malware used primarily social engineering (practice of obtaining confidential information through the manipulation of people), instant messaging and social networks. Putting into practice methods and response prevention tips can successfully mitigate the risks. El malware incluye software malicioso como los virus, gusanos y troyanos. Su gravedad va desde ser bromas hasta ataques que causan pérdida de información, daños en los equipos, denegación de servicios y cuantiosas pérdidas económicas. Tiene su origen en el comienzo de la computación a mediados del siglo XX, a lo largo de la historia el malware ha evolucionado aumentando en cantidad, gravedad, sofisticación, afectando a internet, a todas las plataformas y a los sistemas operativos, principalmente a Microsoft Windows debido a su gran popularidad y su carácter comercial. Para expandirse, el malware utiliza principalmente la ingeniería social (práctica de obtener información confidencial a través de la manipulación de las personas), la mensajería instantánea y las redes sociales. Llevando a la práctica métodos y atendiendo consejos de prevención es posible mitigar satisfactoriamente los riesgos. Universidad Autónoma de Tamaulipas 2010-06-30 info:eu-repo/semantics/article info:eu-repo/semantics/publishedVersion application/pdf https://revistaciencia.uat.edu.mx/index.php/CienciaUAT/article/view/258 CienciaUAT; Vol. 4 No. 4: April-June 2010; 56-61 CienciaUAT; Vol. 4 No. 4: Abril-Junio 2010; 56-61 2007-7858 2007-7521 eng https://revistaciencia.uat.edu.mx/index.php/CienciaUAT/article/view/258/124
institution CIENCIA UAT
collection OJS
language eng
format Online
author Mata Villalpando-Becerra, Isaac
Guevara-Juárez, Oscar Antonio
spellingShingle Mata Villalpando-Becerra, Isaac
Guevara-Juárez, Oscar Antonio
Virus, a whole case, but not lost
author_facet Mata Villalpando-Becerra, Isaac
Guevara-Juárez, Oscar Antonio
author_sort Mata Villalpando-Becerra, Isaac
title Virus, a whole case, but not lost
title_short Virus, a whole case, but not lost
title_full Virus, a whole case, but not lost
title_fullStr Virus, a whole case, but not lost
title_full_unstemmed Virus, a whole case, but not lost
title_sort virus, a whole case, but not lost
description Malware Malicious software includes viruses, worms and Trojans. Its severity ranges from jokes to be attacks that cause loss of data, equipment damage, denial of services and economic losses. It originated in the beginning of computing to mid-twentieth sophistication, and affecting the Internet, to all platforms and all operating systems, mainly to Microsoft Windows because of its great popularity and commercial. To expand, the malware used primarily social engineering (practice of obtaining confidential information through the manipulation of people), instant messaging and social networks. Putting into practice methods and response prevention tips can successfully mitigate the risks.
publisher Universidad Autónoma de Tamaulipas
publishDate 2010
url https://revistaciencia.uat.edu.mx/index.php/CienciaUAT/article/view/258
work_keys_str_mv AT matavillalpandobecerraisaac virusawholecasebutnotlost
AT guevarajuarezoscarantonio virusawholecasebutnotlost
AT matavillalpandobecerraisaac virusinformaticostodouncasoperonoperdido
AT guevarajuarezoscarantonio virusinformaticostodouncasoperonoperdido
_version_ 1712116096098631680