SecurityTAG’S
DOI:
https://doi.org/10.26438/ijcse/v10i1.4144Keywords:
SecurityTAG,, generator, key, virusAbstract
In this paper, initially we describe the present antivirus in aspects like –memory[1] they are consuming, and how efficiently they are protecting the system. In the next section of this paper we briefly discuss the design methodologies that are practiced presently, their drawbacks and limitations. Finally we describe an effective design methodology which uses SecurityTAG to protect the system. SecurityTAG is generated by the SecurityTAG generator which takes some parameters as inputs and gives the SecurityTAG as the output. This gives better protection against any virus and detection of infected files is very easy and effective.
References
[1] Memory- memory refers to the main memory or physical memory.
[2] van der Meulen, M.J.P., et al. Protective Wrapping of Off-the-Shelf Components. in the 4th International Conference on COTS-Based Software Systems (ICCBSS `05). Bilbao, Spain: Springer. 2005.
[3] Strigini, L., Fault Tolerance Against Design Faults, in Dependable Computing Systems: Paradigms, Performance Issues, and Applications, H. Diab and A. Zomaya, Editors. J. Wiley & Sons. p. 213-241, 2005.
[4] http://www.raymond.cc/blog/archives/2008/07/11/ -free-antivirus-is-the-lightest-on-system-memory-usage/
[5] Fred Cohen, “Computer Viruses”, Computers €4 Security 0, 22-35.
[6] Computers & Security 7, Specid Issue on Viruses.
[7] Marvin Minsky, Computation: Finite and Infinite Machines, Prentice-Hall.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
