Malware And Operating Systems

S. Murugan*, K.Kuppusamy**
* ACTS Coordinator, CDAC Knowledge Park, Madras Road, Bangalore.
** Associate Professor, Department of Computer Science and Engineering, Alagappa University, Karaikudi, Tamilnadu.
Periodicity:December - February'2011
DOI : https://doi.org/10.26634/jele.1.2.1365

Abstract

Superior system and network security starts with a good indulgent of an organization’s operating environment. Organizations that have a good understanding of their operating environment  and that environment’s boundaries and vulnerabilities  should be able to secure their system moderately . Maintaining a high level of system security, however, is an on-going process that requires continued attention and solid organizational policies and procedures. This paper will review the various malware potential with different Operating System. It will help us to get a new system that will suitable to any operating system to safeguard from the malware.

Keywords

Malware, Operating Systems, Organizations

How to Cite this Article?

S. Murugan and K. Kuppusamy (2011). Malware And Operating Systems. i-manager’s Journal on Electronics Engineering, 1(2), 1-4. https://doi.org/10.26634/jele.1.2.1365

References

[1]. Malware on Mac OS X Marko Kostyrko CEO - SubRosaSoft.com Inc http://www.MacForensicsLab.com February 29, 2008.
[2]. Linux security A look at implementation and tools By Javier Fernandez,Sanguino Peiza -Germinus Solutions.
[3]. Visualizing Windows Executable Viruses Using Self- Organizing Maps InSeon Yoo.
[4]. Open Systems Security 1996 March 5, (1996). (MIS Training, OSF, ISSA, Bell core, Hilton Disney World Village Info Security News) Lake Buena Vista, FL.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.