This document discusses computer viruses and application security. It begins by defining a computer virus and describing how viruses spread and their symptoms. It then covers various types of viruses like resident, direct action, overwrite, boot, macro, and polymorphic viruses. The document also discusses other malware like worms, Trojans, spyware and adware. It emphasizes the importance of application security for protecting data integrity, confidentiality, availability and accountability. It provides examples of basic security concepts and outlines strategies for securing applications like authentication, authorization, access control, logging and auditing. The document concludes by stating that developing secure applications requires an ethical hacking perspective to prevent data and system loss or misuse.
Related topics: