⬆️ ⬇️

How to answer the question - what is a "computer virus"

Almost every IT / IS specialist has to answer the question - what is a “computer virus”? Well even if this is another question of the next user, when you can send to Wikipedia and not go into details.



And if you need to develop a document (regulation, instruction, justification for the budget), or, more difficult, a document for any verification? And it would be good not to invent your own, but to take ready, proven, "reinforced concrete."



The concept of "computer virus", as well as its more current analogue "malicious code", is used very widely. Each (media, experts, users, regulators, etc.) puts its meaning into this concept.



What sources other than Wikipedia will help?

TermDefinitionDocument
Computer virusA program that can create its own copies (not necessarily the same as the original) and embed them in files, system areas of a computer, computer networks, and other destructive actions. At the same time copies keep working further distribution. Computer virus refers to malware.GOST R 51188-98

PROTECTION OF INFORMATION. SOFTWARE TESTING FOR COMPUTER VIRUSES. TYPICAL GUIDE *
Malicious programA program designed to provide unauthorized access to information and (or) impact on information or information system resources.GOST R 50922-2006

PROTECTION OF INFORMATION. KEY TERMS AND DEFINITIONS *
Malicious programA program designed to provide unauthorized access and (or) impact on information or information system resources.
and at this time in BDU
In the Information Threat Information Database located at http://bdu.fstec.ru , a slightly different definition is given with reference to the same GOST R 53113.1-2008
GOST R 53113.1-2008

INFORMATION TECHNOLOGY. PROTECTION OF INFORMATION TECHNOLOGIES AND AUTOMATED SYSTEMS AGAINST INFORMATION SECURITY THREATS IMPLEMENTED BY USING HIDDEN CHANNELS. PART 1. GENERAL PROVISIONS *
Malicious codeA computer program designed for implementation in automated systems, software, computer equipment, telecommunications equipment of a credit institution and its customers - users of remote banking services, leading to the destruction, creation, copying, blocking, modification and / or transmission of information, as well as to the creation of conditions for such destruction, creation, copying, blocking, modification and / or transfer.BULLETIN OF THE BANK OF RUSSIA No. 34 (1512) of MARCH 31, 2014

Bank of Russia Letter No. 49-T, dated March 24, 2014, “On Recommendations for Organizing the Application of Means of Protection Against Malicious Code in Banking Activities” *


The evolution of the concept is clearly traced: each subsequent definition becomes wider and includes all the properties of the previous ones, with the exception of the mandatory possibility of self-reproduction.

')

GOSTs are in force, which sometimes simplifies the task - you can not rewrite the regulatory documents, but sometimes, on the contrary, it complicates - what definition do you want, the verifier does not agree, because uses another, sometimes departmental, but no less official, document.



The classification of malware is a separate, extensive and quite debatable topic. Each major developer of antivirus solutions or a research company has its own opinion and its own established methodology. It is better to turn to primary sources:



Source: https://habr.com/ru/post/305268/



All Articles