Identifies three types of computer viruses: worms, logic bombs and Trojan horses; and outlines their effects on computer systems. Describes the effects of a virus outbreak at the E. Latunde Odeku Medical Library, University of Ibadan, Nigeria, and the measures taken to recover from it. Explains measures to prevent and detect virus attacks, and makes recommendations for ensuring the security of computer systems.
Get full access to this article
View all access options for this article.
References
1.
Warman, A.R.Computer security within organizations. London, Macmillan, 1993.
Burton, P.F. and Petrie, J.H.Information management technology: a librarian's guide. London, Chapman and Hall, 1991.
5.
Bailey, T.C. and Reichley, R.M.The investigation of a computer virus outbreak in the pharmacy of a tertiary care teaching hospital. Infection Control andHospital Epidemiology, 13 (10): 594-8, Oct. 1992.
6.
FPROT Antivirus program version 2.17 - March 1995; designed by Fridrik Skulason.
7.
Cohen, F.Computer viruses: theory and experiments. Proceedings of the 7th National Computer Conference. Washington, DC. pp. 220-225.
8.
Clyde, R.A.Network worms. Proceedings of the 8th An-Inual Conference for Information Securing Professionals. San Diego, CA. pp. C11-C18.
9.
Mungo, Paul and Clough, Bryan.Computer viruses: the Bulgarian connection, Discover, Feb. 1993.
10.
University of Ibadan. College of Medicine. Prospectus, 1992-94 Session.
11.
Walls, J. and Turban, E.A methodology for selecting controls for computer based information systems. Working Paper, School of Business, University of Southern California.
12.
Simpson, R.L.Securing your system from hackers and other hazards. Nursing Management, 22 (3): March 1991.
13.
Wilson, J.L. , Turban, E. and Zviran, M.Information systems security: a management perspective. International Journal of Information Management , 12, 105-119.