Virus, a whole case, but not lost
Malware Malicious software includes viruses, worms and Trojans. Its severity ranges from jokes to be attacks that cause loss of data, equipment damage, denial of services and economic losses. It originated in the beginning of computing to mid-twentieth sophistication, and affecting the Internet, to...
Saved in:
Main Authors: | , |
---|---|
Format: | Online |
Language: | eng |
Published: |
Universidad Autónoma de Tamaulipas
2010
|
Online Access: | https://revistaciencia.uat.edu.mx/index.php/CienciaUAT/article/view/258 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
oai:ojs.pkp.sfu.ca:article-258 |
---|---|
record_format |
ojs |
spelling |
oai:ojs.pkp.sfu.ca:article-2582017-11-21T16:30:29Z Virus, a whole case, but not lost Virus informáticos, todo un caso, pero no perdido Mata Villalpando-Becerra, Isaac Guevara-Juárez, Oscar Antonio malware malware prevention malware incidents solution. Malware prevención de malware solución de incidentes por Malware. Malware Malicious software includes viruses, worms and Trojans. Its severity ranges from jokes to be attacks that cause loss of data, equipment damage, denial of services and economic losses. It originated in the beginning of computing to mid-twentieth sophistication, and affecting the Internet, to all platforms and all operating systems, mainly to Microsoft Windows because of its great popularity and commercial. To expand, the malware used primarily social engineering (practice of obtaining confidential information through the manipulation of people), instant messaging and social networks. Putting into practice methods and response prevention tips can successfully mitigate the risks. El malware incluye software malicioso como los virus, gusanos y troyanos. Su gravedad va desde ser bromas hasta ataques que causan pérdida de información, daños en los equipos, denegación de servicios y cuantiosas pérdidas económicas. Tiene su origen en el comienzo de la computación a mediados del siglo XX, a lo largo de la historia el malware ha evolucionado aumentando en cantidad, gravedad, sofisticación, afectando a internet, a todas las plataformas y a los sistemas operativos, principalmente a Microsoft Windows debido a su gran popularidad y su carácter comercial. Para expandirse, el malware utiliza principalmente la ingeniería social (práctica de obtener información confidencial a través de la manipulación de las personas), la mensajería instantánea y las redes sociales. Llevando a la práctica métodos y atendiendo consejos de prevención es posible mitigar satisfactoriamente los riesgos. Universidad Autónoma de Tamaulipas 2010-06-30 info:eu-repo/semantics/article info:eu-repo/semantics/publishedVersion application/pdf https://revistaciencia.uat.edu.mx/index.php/CienciaUAT/article/view/258 CienciaUAT; Vol. 4 No. 4: April-June 2010; 56-61 CienciaUAT; Vol. 4 No. 4: Abril-Junio 2010; 56-61 2007-7858 2007-7521 eng https://revistaciencia.uat.edu.mx/index.php/CienciaUAT/article/view/258/124 |
institution |
CIENCIA UAT |
collection |
OJS |
language |
eng |
format |
Online |
author |
Mata Villalpando-Becerra, Isaac Guevara-Juárez, Oscar Antonio |
spellingShingle |
Mata Villalpando-Becerra, Isaac Guevara-Juárez, Oscar Antonio Virus, a whole case, but not lost |
author_facet |
Mata Villalpando-Becerra, Isaac Guevara-Juárez, Oscar Antonio |
author_sort |
Mata Villalpando-Becerra, Isaac |
title |
Virus, a whole case, but not lost |
title_short |
Virus, a whole case, but not lost |
title_full |
Virus, a whole case, but not lost |
title_fullStr |
Virus, a whole case, but not lost |
title_full_unstemmed |
Virus, a whole case, but not lost |
title_sort |
virus, a whole case, but not lost |
description |
Malware Malicious software includes viruses, worms and Trojans. Its severity ranges from jokes to be attacks that cause loss of data, equipment damage, denial of services and economic losses. It originated in the beginning of computing to mid-twentieth sophistication, and affecting the Internet, to all platforms and all operating systems, mainly to Microsoft Windows because of its great popularity and commercial. To expand, the malware used primarily social engineering (practice of obtaining confidential information through the manipulation of people), instant messaging and social networks. Putting into practice methods and response prevention tips can successfully mitigate the risks. |
publisher |
Universidad Autónoma de Tamaulipas |
publishDate |
2010 |
url |
https://revistaciencia.uat.edu.mx/index.php/CienciaUAT/article/view/258 |
work_keys_str_mv |
AT matavillalpandobecerraisaac virusawholecasebutnotlost AT guevarajuarezoscarantonio virusawholecasebutnotlost AT matavillalpandobecerraisaac virusinformaticostodouncasoperonoperdido AT guevarajuarezoscarantonio virusinformaticostodouncasoperonoperdido |
_version_ |
1712116096098631680 |