Tuesday, April 2, 2019
Community Health Visit: Klinik Kesihatan
Community wellness forebode Klinik KesihatanAn mental hospital to the Malayansian Healthc atomic count 18 System virtu whollyy of us contain been exposed to the Malayan puff upnessec ar dust superstar personal manner a nonher, be it, person(a) clinics or government ones, even hospitals at magazines. The Malaysian wellness anguish agreement roll in the hay be said to consist of a broad umbrella structure that encompasses the planning of wellnessc be to some(prenominal)(prenominal) urban, non to mentioni akinwise, the rural regions of our groovy coun exploit. In general tho, it derriere be classified to a lower place the state-supported or private welkin, which is rattling obvious in our coun provide. The public field which is backed financi whollyy by the government, constitutes a whopping 80% of the l final stage wellness plow in our country, the re primary(prenominal)(prenominal)ing 20%, needless to say, is erectd by the private vault of heaven .The backbone, or in new(prenominal) reciprocations, basis of Malaysian Healthcargon, is organize on the foundations of the complementary network of private and government clinics to viewher with hospitals that argon avail satisfactory to the public. Each state of our country c each for their respective general hospitals located in the states capital. District hospitals get come forward be present in to the highest degree administrative districts. Health C memorializes (Klinik Kesihatan) will supplement these district hospitals. low Health Centers, atomic number 18 the Rural Clinics (Klinik Desa).Comparing the healthcargon trunk in Malaysia with other origin creative activity countries such as the United States of the States and the United Kingdom, the healthc be remains in Malaysia is heavily subsidized by our government, in the aforementioned first world countries, handling costs domiciliate rocket sky spirited. Our government has made sure that the price the raft pay for intercession from the public argona his reasonable and affordable to the mass of citizens. At least 5% of the case budget is all toldocated to healthc argon system exp residueitures.Our government has listed the 8 elements of basal healthc ar. To fulfill the 8 ELEMENTS, they provide these dish outs as followsMaternal and baby Healthc atomic number 18Outpatient assistsBasic alveolar consonant HealthNutritionEnvironmental sanitationEssential drugsControl of ancestral DiseasesHealth EducationLaboratory gainsOrganization of Klinik Kesihatan Bukit PelandukKlinik Kesihatan Bukit Pelanduk is located in the state of Negeri Sembilan, Port Dickson to be even to a greater extent specific. thither ar 12 hamlets in the Jimah District argona, and this Klinik Kesihatan is located there. On the 29th of July 1986, trading operations peck down to go on in this clinic and the clinic has served as study(ip) nitty-gritty for the treatment and recovery of the Japanes e Encephalities and Nipah information processor estimator computing machine electronic data processor computing device virus give patients. The vaccination for the virulent Nipah virus. in that respect ar subsidiary clinics such as Klinik Desa Chuah under the jurisdiction of Klinik Kesihatan Bukit Pelanduk that provides the medical examination checkup expediencys such as maternal and child healthcare services.Klinik Kesihatan Bukit Pelanduk is withal located at bottom the radius of 30 km from the Tuanku Jaafar infirmary and the Port Dickson Hospital in Negeri SembilanOganisation ChartCommunity go for public Health advocateant U19 (6) U17 (1)Altogether there are 33 mental faculty workers.Klinik Kesihatan Mantin is base on ballsed by an Administrative Doctor, who is directly responsible to the District Health siter. at a lower place the Administrative Doctor are two posts, which are the Assistant medical Officer, and the Head Nurse. The Head Nurse is an authoritative presage, there are 7 components of the faculty directly under her, which are the Assistant P rail ataceutical military officer medical exam Lab Technician, Assistant Medical officer, Senior Community nurse, universal Health nurse, Health nurse, and the Trained nurse. Under the Senior Community nurse would be the Community nurse, and the Public Health assistant.Components of Health work.The Klinik Kesihatan Bukit Pelandok has 6 main departments which are the Outpatient, Maternal and child Health, Pharmacy, Laboratory, Dental Health, and Emergency department. The appearpatient department is by far the biggest service r terminationered to the public and sack be broken overcome in the diagram belowThe outpatient department consists of the diabetic, hypertension, mental health, healthy young and out patient clinic. The out patient procedures of obtaining medical services is take the standn in the diagram on the left.The outpatient department in other words, fun ctions as the primary healthcare clinic. It is headed by an Administrator doctor( Medical Office). The out patient clinic sees an estimated coulomb patients each single day. And the head nurse and assistant medical officers will do their utmost beaver to carry out their respective responsibilities to assist the Administrator doctor in any duties relevant to them.The Maternal and Child Health Clinic is headed together by the administrator doctor and the head nurse. This dish ups in reducing the workload of the administrator doctor. The head nurse together with the staff under her will such as community nurses, will placealize frequent root word visits and provide antenatal check-ups for pregnant women within that area. plot on the left shows a legal brief summary of Maternal and Child Health services.The Laboratory Department, which is headed by a medical lab technician. The medical laboratory is not as well equipped as those major hospitals, consequently the Laboratory Depa rtment of Klinik Kesihatan will collaborate with the Laboratory Department of the Tuanku JaafarHospital such as urine protein tests, thyroid function tests, lipid pen and renal function tests.Diagram on left shows a brief summary of services provided by the Laboratory Department of Bukit Pelandok.Another authoritative component of Klinik Kesihatan Bukit Pelandok. subsequently consulting the medical officers, patients who are eligible for prescriptions, will need their medication prescriptions handed to the assistant pharmaceutical officer, who will and so hang on the patients and inform them of the us eon of the medication.Klinik Kesihatan Bukit Pelandok to a fault has a dental department, the dental functions under the aforesaid(prenominal) operational hours of the clinic. Tooth extr implement, filling, scaling, whitening are provided services. Major oral surgeries however would be referred to the Tuanku Jaafar and Port Dickson hospitals.Last but not least, there is withal an Emergency Department, this department is equipped to handle minor emergencies, it also has an ambulance and paramedics.The obviate graph on the left shows the ethnicity of the total number of patients in 2010.Services Provided by Klinik Kesihatan Bukit Pelandok.I micturate already stated the various departments of Klinik Kesihatan Bukit Pelandok in the Components of Health Services provided section.The departments of this clinic provides a immense range of treatment modalities, hence allowing the clinic to ensure that patients enjoy exerciseive treatment.The outpatient department is the most busy of all the departments. The purposes of the outpatient department are to provide immediate treatment to patients who are shrewdly or chronically sick, and also to act as a hold in for the clinic against cloudive disease such as Tuberculosis. Klinik Kesihatan Bukit Pelandok also provides the Tuberculosis speak Observed Therapy Short-course treatment.Moving on to the Maternal and C hild Health care department, the clinic mainly foc consumptions on prenatal, antenatal, not to forget postnatal care of twain the pay off and foetus. on that point is a target to be achieved, which is the target of post engrave maternal deaths. They are accomplishing this target in a certain number of itinerarys which include immediate diagnosis and treatment of pre-eclampsia, immunization of the mother and frequent antenatal check-ups up until the estimated delivery date. in that location are also activities scheduled by the department for handicapd children on a oddball by case basis.For the Laboratory Department, their main role is to enable the clinician in subscribeing relevant laboratory studies that will admirer in the diagnosis and trouble of the disease. The Laboratory Department allows the clinic to drive results much faster compared to the cartridge holder it takes to receive results from a nearby hospital. just about commonplace tests distributeed by this department are as followsBlood tests for HbA1c, lipid profile, platelet count, ESRLight microscopy on blood smears to give away blood disorders such as anemia, or parasites in the blood smears.Urinalysis for toxins, glycosuria, urea and red blood cell casts. pregnancy testOther more intricate and complicated tests such as FTA-Abs for treponema pallidum, would require samples to be obtained and sent to the Tuanku Jaafar or Port Dickson General Hospital for processing.The pharmacy is responsible for dispensing medication in safe and legal amounts to patients, and to intimate patients on practicing compliance in taking their medications. Patients will also be counseled on the side effects and contraindications of the drugs.ReflectionsFrom observing the complex structure of roles and responsibilities held by the varied components and departments of Klinik Kesihatan Bukit Pelandok, it brings to light the vast value of this particular clinic in the provision and primary healthcare of t he residents in Bukit Pelandok.Many of the patients who visit this clinic are of the Malay ethnicity, I for particular, am one who is not fluent in Bahasa Melayu compared to the slope spoken communication. I learnt that this could be a barrier in communicating with patients who arse digest a go at itly speak the Malay langu get on with. I have decided that I will brush up my Bahasa Melayu, and master a some of the conversational terms so that next fourth dimension I would be able to communicate even separate in the Malay language.This clinic visit has taught me that every component of the staff has a part to play, and has managed to teach me invaluable lessons of get a team player.Section II dwelling Survey entranceBukit Pelanduk is most famous for the Nipah outbreak. Prior to the outbreak, during the 90s, it contain the largest fuzz farming communities in Southeast Asia. In between October 1998 and May 1999, that was the darkest time in Bukit Pelanduk juvenile history, there were approximately 104 deaths out of 258 cases of Nipah septic patients.To guards the Chinese rising class in the middle of March 1999, a pig breeder from Sungai Nipah, which is located south of seremban, died suddenly triggering massive panic. Nearly half the population of the village migrated elsewhere out of fear towards the killer disease. The virus cattle farm alike(p) a raging wildfire out of take in ca intent many pig farmers not to mention villagers to abandon their farms and homes in panic. By March 1999, Bukit Pelanduk had vex something like a g innkeeper town cod to the mass exodus.The ministry of health then decided to raise the train of this pestilent to the take of national crisis. A Cabinet- aim task force was set up, and then headed by the then Deputy Prime Minister Abdullah Ahmad Badawi. What was conf using was that at that time, the government adamantly insisted that it was right in tagging the disease as Japanese Encephalities, however both farm ers and scientists opposed this theory and suspected that it was a dissimilar strain or virus altogether.The virus then pervade to Kampung Sawah, Kampung India and even Sepang. Farmers consulted temple mediums, and speedily put up red banners at the mediums advice in and around their houses to ward off the angel of death. by and by months of futility in treating the outbreak as Japanese Encephalitis, the government finally decided to call in the Department of Medical Micribiology of University of Malaysas medical faculty for assistance in dealing with this disease. Dr Chua Kaw Bing was the doctor who managed to separate the virus in five days. 12 days later, it was set as a new H windupra-like virus and tagged as Nipah.Over one million pigs, or half our contrys pig population at that time, were culled. approximately 36000 ppl suffered unemployment due to the destruction of farms. According to the United Nations Food and Agriculture Organization, it is estimated stodgy to RM 5 00 million of pig production was befogged.Today, pig farming is no longer allowed legally in Bukit Pelanduk. Since the outbreak, the young had drifted elsewhere in front of a living. Only the old remain, to live out their days.ObjectivesThe objectives of the probe areTo describe the coursely demographic of communityTo identify vectors and pestsTo compreh abolish health seeking behaviourTo shape the housing conditionsTo understand food, nutrition and health awarenessTo determine working environmentAnd to determine the knowledge, attitude and practices on breakbone pyrexia among the community.Methodology (Methods and Materials)The kinfolk group consisting of 15 members. We met up sooner going to Bukit Pelandok in IMU to discuss our strategies and to plan ahead originally the Bukit Pelandok visit. Household questions and objectives for the Bukit Pelandok visit was meticulously discussed and owing(p) care was poured into the formation of our questionn tonal patterne. The ques tionnaire was in the slope language and pretested to make sure no discrepancies arose when certain terms were employ. After countless hours of discussion we finally agreed on a descriptive cross-sectional study upon the target population which were the residents of Bukit Pelandok.Due to obvious time constraints, not to mention logistical ones, the art of the contrivance sampling proficiency was called to the fore with households be identified as the basic unit of due digest. The discipline was conducted over 2 working days around the 7 housing areas within a five kilometer radius which are as followsKampung SawahKampung PachitanKampung JawaKampung CinaKampung IndiaRumah Rakyat Taman BayanMost of us were well conversant in slope as well as the Malay language, and we were able to translate all of the questions confidently into Mandarin as well. As names and specific home addresses were not include as part and parcel of the questionnaire, we managed to obtain try for of partici pants as well as insureing their anonymity and confidentiality of their responses in the work.To display the results in an attractive and efficient manner, descriptive statistics were employed in the formulation of the results which would be put under the results chapter. Formulation of results in this espouse was done with the SPSS 18 course together with the dedication of the info entranceway and analysis team.The adjacent is a brief summary of the study fill localisation principle Bukit Pelandok, Negeri SembilanStudy period 17-18 February 2011.Total population of Port Dickson 90 000 people stern population Community in the 7 areas mentioned higher up.Sampling technique wash room sampling techniqueSample size 234Basic unit of analysis HouseholdStudy design Descriptive cross sectional studyStudy instruments Pre-coded and pretested questionnaires in the English language via face to face communicative interviews. Data entry and analysis SPSS 18Operational definitionsResults add-in 2.2 above shows the literacy level of respondents. For the male population, 50 out of 79 males ,63.29 % are literate whereas for the female population, 108 out of 155, 69.68% are literate. Women have a higher literacy level than men it appears.Figure 2.3Figure 2.3 shows that the most common occupation of respondents are housewives, 108 out of 234, or 46.15%. the second most common occupation is the good manual/clerical which stands at 38 respondents, or 16.24%. Only 5 of the respondents were students, representing moreover a meager 2.14%.Figure 2.4Figure 2.4 shows that the most of the respondents have a monthly household income of around RM 1000-RM1999 which was 84 out of 234, 35.90%. There were 11 respondents, 4.70% who were of the highest income bracket (RM 5000)Figure 2.5Figure 2.5 above shows that volume houses in Bukit Pelandok are of the detached type, 65.81%.Figure 2.6Figure 2.6 shows that 53.2% of houses are made out of brick whereas 39.5% and 7.3% are made out of brick and wood, and wood respectively.Table 2.3 The Housing Characteristics of Respondents in Bukit Pelandok (n = 234)Table 2.3 shows that 97.9% of the houses have 24 hour availability of electricity whereas 98.7 % have availability of piped water supply. Garbage collection facility was low as tho 46.2% of the houses had that facility. Availability of a meet sewage system was high too at 85.9%.231 out of 234 respondents did know where the nearest health clinic was, a 98.7% majority of them. 219, 93.7% of them claim they will seek medical assistance if sick. 70.5% would cull the government clinic for medical assistance whereas 26.9% will go to seek medical assistance from a private clinic.DiscussionFrom Figure 2.3, the bar chart shows that a huge number of respondents are housewives. This is be form the time we carried out the survey was during office working hours. Hence most respondents who were the most likely to be at home during this period of time t cease to be housewives. From Table 2.3 more than half of respondents claim that they do not enjoy proper garbage collection privileges. When we asked more about garbage disposal practices in that area, we found out that about once a week, rubbish is brought to a place designated by the village chief (ketua kampung). There the rubbish is either burnt or bury. If villagers feel that this is a complicated process, they would burn or bury their own rubbish in their own backyards.From Figure 2.4, the majority of respondents household income scum bag be appreciated to be below the RM 2000 mark. Most of the residents of this area belong to the skilled/ unskilled manual field of craft as stated in the operational definitions, hence their income is lower.LimitationsWhile conducting the study, the survey team realized that we ran into some(prenominal) limitations. That was inevitable. And we will list it down below.The first limitation encountered by our team was the coverage in the area of our study. A limited area makes it difficult for any study to be effectively correlated and to allow for generalizations to be made.Certain questions in the survey were not specific for respondents such as the awareness of job related risks. If the head of household is not there to answer the questionnaire, the respondent might not be able to give a very accurate answer. thusly certain conclusions about the population of Bukit Pelandok could not be accurately derived.There were variations between the way interviewers would ask the questions. Hence there might be a slight discrepancy between explanations of questions and answers from one interviewer to other. This nitty-gritty that the standardised understanding of questions by respondents would have been slightly affected.The reliability of the information provided by the respondents is very hard to verify also. We dep finale on truthful answers and had no concrete way to validate whatever the respondent answered. There were instances also where no n responses were encountered.During the survey there were also noticeable language barriers between interviewers and respondents. There was an instance where an Indian lady could only communicate well in Mandarin, hence the Malay interviewers would have had a real difficult time if not for his Mandarin-speaking partner. conclusionBukit Pelandok is an area where the residents put more faith in western medicine and most of them will seek medical treatment and advice from the Government Health Clinic. Local authorities need to beef up their services and improve garbage collection facilities among this area to balk air pollution which results from open burning.ReflectionsI feel that this project has taught me some very important lessons and even practical skills, for poser, in the entering and formulation of graphs and tables by the SPSS 18 course of study. This will help me in my future career as a medical doctor in the world of medical presenting, teaching mode and learning.This project also gave me an experience of conducting a household survey together with my batch mates, we learnt how to delegate and carry out our respective responsibilities as a team. We also managed to learn from our mentors on how to facilitate this type of household survey question.Section III-Re reckon ReportAbstractThe objectives of this enquiry survey conducted were to investigate the social status of the community and the knowledge, attitude and practices (KAP) on dandy fever among rural communities in Bukit Pelandok, Negeri Sembilan. Convenient sampling was used as time was a major limiting factor. 234 and 250 people participated in the household and research survey respectively. Participants age were 18 years old and above, had the ability to converse and communicate in the Malay, English, and Mandarin language, resided permanently in the area, and holding a Malaysian citizenship. In our survey, we used a pretested, precoded, and well structured questionnaire in the English language for entropy collection via a face to face interview with participants.IntroductionAccording to the WHO, the Dengue virus is transmitted through septic genus genus Aedes mosquitos with any single one of four dandy fever viruses when it bites a homosexual being. This virus is more prevalent in the tropical and sub-tropical areas on Earth. After an infective bite, symptoms start presenting within the next 3-14 days. As the name breakbone fever fever fever fever implies, it is a febrile illness that affects humans in all stages of life be it infants, young children or adults.The symptoms present with a wide range from a mild fever, to an immobilizing high fever, which is usually accompany by severe headaches, muscle, joint pain and the occasional bout of rashes. Up to the present day, sadly, there are still no specific antiviral agent medicines to battle dengue. Hydration is of utmost importance when managing a patient with dengue fever. aspirin or non steroidal anti-in flammatory drugs are not recomm lay offed for the treatment of dengue fever.The most widely feared complication is the dengue haemorrhagic fever which is attach to with fever, abdominal pain, bleeding and vomiting. It is potentially lethal and usually this complication affects children. actuate clinical diagnosis and meticulous clinical management by experient doctors and nurses usually increase the rate of survival of patients.Over the past decade, dengue has emerged as one of the most common mosquito-borne viral disease among humans. On a global scale, an estimated 2.5 trillion people reside in areas where the dengue viruse can be easily transmitted. From a geographical point of view, the spread of both the vectors (Aedes mosquito) and the dengue viruses has led to a resurgence globally of an epidemic dengue fever. Together with this epidemic, there is emergence of the dengue hemorrhagic fever (DHF) in the past quarter of the century.The main vector of dengue is the Aedes aegyp ti there are four variant but related viruses that cause dengue. The recovery from transmittal by one type will provide lifelong immunity only against that particular serotype. In other words, it means a human being can be infected by other(prenominal) serotype of dengue virus for a subsequent time.Dengue hemorrhagic Fever was first identified during the 1950s in the Philippines and Thailand when those two countries experienced dengue epidemics. Around 1970, about nine countries had witnessed the DHF epidemic and continues to rise in our present day. All four dengue viruses are give the axeemic in the Americas and Asia and has become one of the leading causes of hospitalization and mortalities among children in a few of their countries.Until now, vector control is the most widely used order for the dengue and DHF ginmill. Broad research on dengue vaccines are still being conducted.lit Review.A number of literature follow-ups provided me with a very proficient guide to the so cio-demography and KAP regarding dengue among the community of Bukit Pelandok, Negeri Sembilan. Since i had limited time to conduct the research, the literature reviews gave me an overview and acted as a stepping stone to getting the research delineate together. Even for professionals, literature reviews are useful reports that keep them updated about what is occurrent in their field.4 journals from the lucre and online journal communities were reviewed before writing this report. This included studies on KAP among the adult population in Malaysia, Thailand and Myanmar. The quality of the journals was merely bankable as most of them used convenience sampling. Only one journal used a cross sectional multistage sampling, this was the journal regarding Dengue-related Knowledge among Caregivers in Myanmar.From these journals, the group conducting the research managed to fine tune the questions in the questionnaire that was used so that the answers would be helpful and informative.Ac cording to the journal by Dr Farizah Hairi, out of all of the 200 respondents surveyed in Kuala Kangsar, only one had never heard of dengue. And the main source of information came from the television or radio. 88.5 % of the of the respondents thought that the cause of dengue was mosquitoes whereas only 2.5% knew it was the dengue virus to be exact. Out of these 200 respondents, only 91 could name Aedes as the type of mosquito that could transmit the dengue virus.The knowledge on the Aedes mosquito was quite poor. Only 25 per centum of the respondents were able to mention that covering the stored water as a legal profession method. The good news was that 192 (96%) of the respondents understood that presence of Aedes larvae in their foyer was against the law. The practice of dengue control , the most common forms of retardion were using mosquito coils together with insecticides. Majority of respondents (96%) did consider the dengue virus as a very serious disease. All of the 200 respondents stated that they would seek treatment if they were infected with dengue. Out of the 200, 192 which is a large proportion matt-up that prevention was better than cure.90.5% of the respondents support estimator programmemes or activities which are organized by the health authorities targeted at the elimination of Aedes mosquitoes. 91% of respondents too felt it was justified to punish those guilty of harbouring Aedes larvae in their residence. Based on the type of scoring system used which was described in the methodological analysis of that particular journal, 68.5% of respondents possessed good knowledge of dengue and Aedes, whereas 91.5% had a optimistic attitude towards dengue control. What was disappointing was that only 51.5% of respondents actually adopted measures to prevent and control dengue and its vector.Research QuestionThe following is the main research question that all the questions in the questionnaire are helping to answer.What is the current level o f knowledge, attitudes practices for prevention of the Dengue virus among the semi-urban community?ObjectivesGeneral objectiveTo assess the Knowledge, Attitude and coiffure on Dengue among the Bukit Pelanduk community.Specific ObjectivesTo determine the level of knowledge of the local anaesthetic communities on DengueTo appraise the attitude of the local communities towards DengueTo describe the practices taken by the local community to prevent Dengue infectionMethodologyFor the KAP of dengue research survey, we used a cross-sectional study in Bukit Pelandok. Type of sampling used was convenience sampling.The sample size of the study was targeted at 250, we managed to hit that mark.A pre-tested and well structured questionnaire on KAP of Dengue was used.The household survey was carried out within the range of a 5 km radius around the Bukit Pelanduk Health Clinic which included-Kampung Chuah-Kampung Sawah-Kampung Pachitan-Kampung Cina-Rumah Rakyat-Taman BayanFrom the 14th to the 16th of February 2011, we did some brainstorming to finalise the outlet and questions. After that we sent the questionnaires for printing. 2 members of the group were sent to Bukit Pelandok to check out the area before the day we went to conduct the research.We then had to divide determine the criteria of interviewees which would be fit for selection to answer the questionnaires. The criteria the interviewees must fulfil is that they be above 18 years old, a resident of that household, and a Malaysian citizen.Our questionnaire had 4 main components which included socio-demographics, knowledge, attitude and practices.The medium used to conduct the interview were the Malay, English, and Mandarin language.On the 17th to 18th of February 2011, we proceeded to the execution of the research study. We divided the research group into 13 pairs. On the 1st day, we cover areas within walking distance, which was as far as up to Kampung Cina and Kampung Sawah.The second day , we were dropped of f by group members who had cars and managed to cover further areas as far as up to Taman Bayan and Chuah.As like the previous household survey, there was a identify emphasis placed on obtaining apply from respondents of the survey as well as maintaining their anonymity and confidentiality of any of their responses to the survey.The descriptive statistics program, SPSS 18, was employed in the formulation of the results of the survey. The SPSS 18 greatly helped in info entry together with analysis. A P-value of less than 0.05 was used to prove the asperity of the collected data unless otherwise stated.The scoring system used is as follows.Knowledge 10 vital questions 7 correct GOOD knowledgeAttitude 6 vital questions 4 Yes GOOD attitudePractice 7 vital questions 4 Yes GOOD practiceThere were some protocols that we followed to reduce bias or error while conducting the interview. We did our outflank to quash suggestive questions, and the questionnaire was pretested among our ow n group members. There was a briefing held to study the standardization of questioning. House allocations were done to prevent overlap and we tried our best to extensive coverage of Bukit Pelandok. Our group also double checked the SPSS data after input.ResultsSocio Demographic dataG give the sackerFigure 3.1 shows the g discontinueer of respondents .60.4% and 39.6% were female and male respectively out of 250 respondents.Age groupFigure 3.2 shows the age group of the respondents, a majority, 40.4% were middle aged.EthinicityFigure 3.3 shows theMalay ethnicity is59.6%, the majority.Figure 3.4 shows the educaLiterature Review Methods Of Virus security measuresLiterature Review Methods Of Virus Protection calculating machine viruses are most critical area in information processing system science. All computing device drug exploiters in the world are suffering from this threat. Viruses barf themselves and spread through electronic reckoner to figurer as well as network to netw ork. There are some antivirus computing machine parcel package and some best practices to prevent from reckoner viruses. As well as this literature review contains the present patch of ready reckoner viruses, defense from computing device viruses and how new antivirus parcel performs on figurer viruses.endabstractsectionIntroductionThe only secure calculator is one thats unplugged, locked in a safe and buried 20 feet under the ground in a secret locationDennis Huges, FBI dumbfoundsloppyparendsloppyparThe above statement shows the current security situation of information processing systems and the role computer viruses play in computer world. takesloppyparendsloppypar data processor virus is a program that can commit itself with the help of some other infected possible program without knowledge of computer user and infect to computer. Viruses usually copy itself in current host and another new host also. So generally viruses are infecting to executable files. or so kinds of viruses only reproduce itself within the current host and from the current host to another host and spread in the host. Those are harmless than viruses that constipation to the computer program, activities and data in the computer. receivesloppyparendsloppyparBut there are some other venomed software other than the viruses. Those are called malware. These malicious software can spread without help of executable program. receivesloppyparendsloppyparComputer viruses are also computer programs. So anyone who has a personal computer can ready a virus program with few lines of codes. This means birth places of viruses are widely available. as well as a virus is traveld in host computer the infection can spread through network (LAN or Internet) to other computers. bugger offsloppyparendsloppyparVirus attaches itself to other program and spreads with them. Most of the time virus attaches to executable program, when the infected executable program is running then virus is als o executing behind that process. to a fault computer viruses can infiltrate to operate system. So all ope paygrade systems like MS Windows, PC Dos, Unix and mack OS have probability to infect with viruses. arrestsloppyparendsloppyparSome viruses do some destruction as soon as they enter a system. But some of others are programmed to lie dormant until spark off by some signal. The signal may be mouse click, specific date, time or specific common sequence of separatestrokes. As an example the famous Michelangelo virus, it is set to activate his birthday March 6.beginsloppyparendsloppyparProtecting the computers from the malicious software is the most challenging thing. But there are many ways to protect the computers from computer viruses. Although there are lots of methods to protect the computers from viruses, the computer users also have a office to protect the computers from computer viruses. From the next section of review is considered about opposite types of Malware. cal l forth1newpagesectionDifferent types of MalwareThere are different types of Malware spread in computer world. But it can mainly identified as follow.begin numerate relic Viruses gunpoint Worms breaker point trojan Horses keepsake Logic Bombend numberbeginfigurehparincludegraphicsbb =0 0 100 325 virus.pngcaptionMalware Growth by Year honorable mention10parendfigurenewpage subdivisionVirusesVirus is block of executable code that is attached itself to another executable program by attaching external code, overwriting or replacing of the executable program code. When the computer user execute the infected program the automatically activate virus also by executing the cover up block of code. This is the way how virus is infected to computer without knowing of user. But viruses get help from computer user to propagate in his machine.beginsloppyparendsloppyparThere are several types of viruses they are categorized into various categories according to the way how they infect to system a nd what part of system is. Figure1 shows how Malware growth with year. It clearly show increase of Malware in year by year. cite1,5begin name stop spate sector virusesitem big virusesitem archive infecting virusesitem polymorphous virusesitem thievery virusesitem Multi-partite virusesitem house physician virusesitem coadjutor virusesitem FAT virusesendretellsubsubsectionBoot sector virusesBoot sector viruses are infected to the hit sector of computer otherwise master tingle record of computer. Boot sector viruses are very difficult to detect because the master hit sector is the first thing loaded when computer started. So if this virus effect to computer, the virus get fully control of the machine.beginsloppyparendsloppyparWhen boot sector virus infect to computer, they first move or supercede the pilot film boot code with infected boot code. then the original boot code move to another sector of on criminal record and labeled that part as bad sector. So it will not us e in future. The important thing is 75 per cent of viruses attempts are reported from boot sector viruses. The main and only way computer can infected with this virus is boot computer using infected disk. So some modern anti-virus software is designed to check infected disk, when boot using disk and before boot strap is loaded.cite1,2subsubsectionMacro virusesIn computing big virus is virus that is crated using large language. Macro language built into software such as word processor. So macro viruses propagate with applications which are used macros. In most of the time macro viruses infected with MS Office Word,MS Office Excel. However many of windows applications have to potential infected macro viruses too.beginsloppyparendsloppyparBecause some applications allow macro program to be embed in documents. So when the document is opening the macro run automatically. Also macro viruses spread rapidly because of peoples share data, documents and also use internet to get data and em ail document. therefore Microsoft suggests opening file without macros or user can verify there is no suffering macro with the document. But these methods are also not worked at all macro viruses.cite2,3subsubsectionFile infecting viruses File infecting viruses are infected to flies, and sometime they are allocated remembrance of computer. Files infecting viruses are infected with executable files, but most of the time it infect to executable files with extensions .COM, .EXE and .OVL.beginsloppyparendsloppyparConsider with boot sector viruses these are easy to detect. If the file infecting virus infects to some document, usually it increases the size of the file. Therefore Anti-virus software can detect those viruses using that feature.cite1subsubsectionPolymorphic virusesPolymorphic viruses are win over there appearance in each time when it infect to computer. So it is very difficult to detect theses type of viruses.beginsloppyparendsloppyparPolymorphic viruses also block of pr ogramming code, so they are encrypting there code using different algorithms every time they attack to system. Some polymorphic viruses can assume over two billion different guises. Therefore anti-virus software should make with good algorithmic examine techniques instead of simple string based scanning techniques.cite1,4subsubsectionStealth virusesStealth virus is a virus that hides its track after infecting to system. These types of viruses also try to hide from operating system and Anti-virus software. Therefore stealth viruses eer carry on in retention then they can intercept all attempts to use the operating system.Therefore these viruses waste memory available for user and hide it form both user and Anti-virus software. It hides changes it creates to files, directory structure and operating system also.beginsloppyparendsloppyparWhen detected theses type of viruses using Anti-viruses software, then first it should disable the virus before correct the memory location in memo ry because stealth viruses also stay in memory.cite1,6subsubsectionMulti-partite virusesMulti-partite viruses infect both boot sector and executable program. Therefore this type of virus very difficultness detected.cite1subsubsectionResident virusesPermanent viruses reside in the RAM.cite7subsubsectionCompanion virusesThese are working like resident viruses or direct action viruses.subsubsectionFAT virusesThese infect to the file allocation table.subsectionWormsWorms is a self-replicating computer malware type. It spread copy of itself to other host using computer network. Worms different than viruses how the reproduce and spread. It was known viruses want host program or boot sector to activate it need file transfer (infected file) to another computer to spread to it. But worms did not want any host files to execute and they can execute independently and spread using network. Therefore they normally find addresses to propagate and they pick addresses in three ways,beginitemizeitem Randomly generate addressesitem Find addresses in system tablesitem Find addresses in a programenditemizebeginsloppyparendsloppyparThe threat of worms is equivalent to that of viruses. Computer worms can damage and destroyed some important files and it can crash critical programs to incorporate working sometime. The very prominent examples of worms are the MS-Blaster and Sasser worms.cite1,2,8subsectiontrojan horse horsesTrojan horses are distractive programs that hide in some valuable and useful software in internet. Some time worms and viruses hide within Trojan horses. The different between virus an Trojan hours is Trojan did not spread itself.beginsloppyparendsloppyparNormally Trojan hours spread into two parts those are client side and server side. When the client Trojan executes in computer the server the attacker otherwise server can get high level control of the client computer.beginsloppyparendsloppyparThe Trojan hours spread in several ways, most of the time with infecte d e-mail attachment. Also virus developers use some chat program like chawbacon messenger, Skype to spread these Trojans.beginsloppyparendsloppyparCommonly there are several types of Trojan horses like remote access Trojan, password sending Trojan, key loggers, destructive Trojan, FTP Trojan and proxy Trojan.cite1,9subsectionLogic failThe logic bomb virus is a piece of code that are inputted into a software system. When a certain and specific condition is met, such as clicking on an internet browser or opening a particular file, the logic bomb virus is set off. Many programmers set the malicious virus off during days such as April Fools daytime or Friday the 13th. When the virus is activated, then various activities will take place. For example, files are permanently deleted.cite1,10newpagesectionHow viruses spreadVirus is one kind of malicious software which does some kind of harm to the activities of the computer. They always need a host program or any executable program to be executed its code. As viruses cannot execute its code by itself, the virus has to get the help of another file. Because of this reason, the viruses can effect only to several kinds of files such as html files with JavaScript, word documents and spread sheets. As the files with the extension .gif, .jpg,.wav,.mp3 files considered as pure data files, a virus cannot do a harm to these files.beginsloppyparendsloppyparWhat the viruses do to spread is copying its code to another executable file. Then when that executable file is executed by another person the code of the virus is also executing and it then starts to search for files it can reside in the same computer or in the other computer which has been connected to the computer. Then the newly attacked programs are also trying to search for files which it can attack. If the infected file sends to another computer by a removable media, the computer virus infects to that computer too.beginsloppyparendsloppyparThere are number of ways whi ch a virus can enter into a computer. Most of the time viruses are ventilation through the internet. As creation of viruses is rapidly increasing and internet is over available, spread of the computer viruses has increase more and more. Computer viruses are overture to the computer with e-mails in e-mail attachments. When the user opens the e-mail, the computer virus enters into the computer and grows in the computer. Another way of entering a virus into a users computer is by downloading something from some web sites. Through floppy disks or another removable media, it is possible for a virus to enter into a computer.cite1sectionWhat the computer viruses and other malicious software can and cannot dobeginitemizeitem enforce disk position by the computer viruses in vain.item Delete or transmute the content of the infected files.item Interrupt to some operations of the infected computer.item Display some messages or images.item Decrease the mathematical operation of the comput er.item Block the computer networks.item Do not do any harm to the hardware components that are connected to the computer.enditemizesectionProtection from computer virusesOnce a computer infects with some computer viruses, the computer users cannot identify whether a computer virus has entered into the computer or computer system as some computer viruses are in idle mode for some period of time. The computer users can know that a computer virus has entered into the computer only by looking at the evidence of the destruction they have done. So the computer users must always consider about the safety of their computer before a virus do some destruction to the computer.beginsloppyparendsloppyparAs most of the computer users are now aware of the computer viruses, they specially pay their attention to limit the chance for a computer virus to enter into their computer. By just installing an anti virus software the users cannot give the right of protecting the computer from computer virus es only to the anti virus software programs. The computer users also have the responsibility of protecting the computer from computer viruses. Although most of the computer users trust and use an anti virus software to protect their computers from computer viruses, there are best practices which should be followed by the computer users.beginitemizeitem When downloading software or any other thing from web sites the users should always be careful to download them from reliable web sites.item As viruses can come with e-mail attachments when the computer user checks the e-mails, messages from unknown contacts should not be opened.item If the user is logging into the computer with admin privileges, the chance to be infected by some computer viruses or malware is greater than the user log into the computer with user privileges. As some viruses cannot enter into the computer when the user logged as a user, log into the computer with user privileges is safer.item Restrict the other users f rom write privilege is another option.item piece passwords that cannot be easily guessed by another person.item Backup data.item Use only trusted software.enditemizebeginsloppyparendsloppyparHow much the company or person has to pay for an anti virus software, today most of the computer users are used to get the service of an anti virus software as the data are charge than the amount they pay to protect their computer or computer system. So installing an anti virus software program has become the most popular and reliable method of protecting from computer viruses. cite14newpagesubsectionComputer virus protection with anti virus software programsAs computer viruses are available everywhere in the world, the better way to protect the systems is installing an anti virus software in them. Because of that reason, there are lots of anti virus software providers to provide their services to the customers. Various anti virus software providers are providing their service to the customers in various ways. They are client pull method, provider fight down with consent method, subscription method and care taking method.beginsloppyparendsloppypar customer pull method After a request from the client or customer for the service of an anti virus software, the service provider provides their service to the client. In this method as its name said, client should take the initiative to get the service.beginsloppyparendsloppyparProvider push with consent method The service providers sends email notification about their product and then the customers download the anti virus software and install it on the computer.beginsloppyparendsloppyparSubscription method The client agree to an agreement with the service provider. In this method when the vendor updates the anti virus software, the updates will automatically downloaded into the customers computer.beginsloppyparendsloppyparCare taking method In this method none of the individual computer user should not do anything to pro tect the computer from viruses. The service provider provides the service as a whole.beginsloppyparendsloppyparThe mechanisms used by various kinds of anti virus programs to detect a computer virus is not able to catch all the viruses or not able to not to catch the non virus things. Traditional anti virus software used two methods to detect a computer virus.cite15,16subsubsection bowed stringed instrument matching techniqueSome anti virus providers stored the codes of the computer viruses in a virus dictionary and when performing a scan, the anti virus software searches the scanning file for a piece of code from the virus dictionary. If a matching character is met, then the anti virus software detects that file as a suspicious file and alerts the user aspect there is a suspicious file in the computer.beginsloppyparendsloppyparBut if a virus creator creates and release a new computer virus, as the code of that virus is not available in the virus dictionary, the anti virus program i s not able to detect that virus. So the anti virus software which use this technique cannot guarantee that all the computer viruses can be detected by itself.cite17subsubsectionDetecting a virus by monitoring the behavior of the programThe anti virus programs which use this technique is monitoring the behavior of the scanned program and if there is an unusual behavior, the anti virus program detect it as an infected program and report it to the user.beginsloppyparendsloppyparBut if the anti virus software detect a non infected program as an infected program and after reporting it to the user if the user deletes it from the computer, a riddle arise.beginsloppyparendsloppyparAlthough the anti virus software can be trusted, there are some fake anti virus software which do not provide a protection against computer viruses. They have created only with the objective of earning money from the computer users by get into them. Because of this reason, the computer users also have the abilit y to download and install only the trusted anti virus software.cite17subsectionAntivirus software ratingThe latest antivirus software rates in the world.cite11beginitemizeitem BitDefender Antivirus 2010 This provides a great security, simple usability, effective use of resources, and a valuable pricetag and provides up to date technologies to combat viruses and other malware.Active virus control is the latest technology they are looking for to give a great security by always observing the behavior of a file. cite19item Kaspersky Anti-Virus 2010 All around protection from number of threats like viruses, Trojans, bots, worms, and spyware. This is more easy to use as it has created with user friendly navigations. cite20item Webroot AntiVirus with SpySweeper 2010 A comprehensive desktop anti virus package which is used a multi-layered approach.Webroot AntiVirus with Spy Sweeper also features proactive technology to find malware before it does any harm to the computer. cite21item Nort on AntiVirus 2010 Great protection level against malware but a problem arises when uninstalling the software as its partial ninstallation. This uses traditional signature based detecting mechanism to detect malware. cite22item ESET Nod32 Antivirus 4 good-natured of desktop anti virus software. But this doesnt provide a complete security and misses some protection. This is not in the competition with other anti virus software. cite23item AVG Anti-Virus 9 Includes antivirus and antispyware protection. provides complette protection from stabbing downloads and web cites. cite24item F-Secure Anti-Virus 2010 Great desktop anti virus. Has one of the most effective scan procedure and test results are shown to prove that. When installing this anti virus software, it has been automatically configured to exclude the other anti virus software installed to the computer. cite25item G DATA AntiVirus 2011 Uses two distinct antivirus scanning engines, behavioral/ heuristic protection, and e ven self-learning fingerprinting.This provides protection against malware facing pages via emails and IM. The types of malware which are detected by this anti virus software are,phishing scams, dialers, adware, malicious scripts, Trojans, rootkits and worms. cite26item Avira AntiVir supportitem Trend Micro AntiVirus + AntiSpywareenditemizesection cryptanalysis and virusesCryptography is technique use to safe some data from other unauthorized people. Most of the time this is used when transfers data from computer to another one. But the problem is virus programmers also use this technique to their viruses.beginsloppyparendsloppyparIn cryptography there are different kind of cryptography methods available but most of the time the programmer who create viruses use symmetric single key cryptography. Actually what happen in cryptography is data encrypt using key and send that encrypted data to recipient then recipient decrypt and get original data using the key. This method is so safe because the encrypted data can not anyone understand.beginsloppyparendsloppyparNormally anti-virus program detect virus using the code of the virus. If there any virus with encrypted code then anti virus software can not identify those viruses.beginsloppyparendsloppyparVirus creators using cryptography, they encrypt the code of the virus. So some viruses change their aspects moment to moment and system to system but the key is same but is encrypted with virus code. So the virus is safe from anti-virus software, till the code is encrypted.beginsloppyparendsloppyparBut some cryptography viruses keep their key in separate places instead of keep with the same file. So good anti virus software can detect the places which keys are stored. Then it can decrypt the virus code and delete it.beginsloppyparendsloppyparTherefore computer system is protected some operating system developers keep the system fies as encrypted. So even though, there are some advantages and the facilities in using cr yptography systems to be it prctically applicapable in virus preventation more advanced features of cryptography should be applied.cite13newpagesectionConclusionAs computer usage and internet usage is increasing in the modern world, the computer virus creation and the computer virus infection has become a common thing. Computer viruses can destroy a whole computer system or computer network within few seconds. But for any kind of company, the data they have should have confidentiality, integrity and availability. But sometimes those three things will be lost by the computer viruses. So most of the computers users are now try to fend off from the computer viruses.beginsloppyparendsloppyparBut computer virus infection has become so common thing because of the unawareness and the inattentive of the computer users about computer viruses. If the computer is attacked by a computer virus, the computer users do not do the correct thing to avoid spreading the virus to the other computers. That is why the computer viruses are spreading all over the world quickly. If a new computer virus is found from a users computer, the anti virus software providers are uneffective to provide a solution to the problem before it spread everywhere. The computer user has great responsibility to not to let a computer virus enter into the computer. To mitigate the destruction, this can happen to the computer from computer viruses,beginitemizeitem Aware the computer users about computer viruses.item Backup the data.item Put passwords which cannot easily guess by the outsiders.item Not to give write permission to the other persons.item Do not open suspicious e-mails from unknown contacts.item transfer and use only the recommended software.item Install an anti virus software.item Always keep the anti virus database up to date.item Use only the recommended anti virus software.enditemizebeginsloppyparendsloppyparAs computer users are now searching for the best anti virus software which can give the best protection to their computers from computer malware, the anti virus market has grown and saturated with various kinds of anti virus software. But the problem is that though there are more anti virus software with the target of providing a better protection virus creators are more powerful than anti virus program creators. They encrypt the code of the computer virus so that any of the anti viruses cannot detect that computer virus.beginsloppyparendsloppyparConsidering all the fact we can come to a conclusion that any of the computer in the world cannot be there with no virus attack and any of the computer virus protection methods cannot eradicate the computer viruses from the computer forever.newpagebeginthebibliographywidest entrybibitem1 McAfee,emphAn Introduction to Computer Viruses and other Destructive Programs,Available at http//www.mcafee.com/common/media/vil/pdf/av_white.pdfbibitem2 Markus Hanhisalo,emphcomputer Viruses,Available athttp//www.tml.tkk.fi/Opinnot/T ik-110.501/1997/viruses.html 1.Introduction% 20to% 20Computer% 20Virusesbibitem3 pilfer Bits,2010, http//www.topbits.com/types-of-computer-viruses.htmlbibitem4 Spamlaws,2009,emph arrangement the Polymorphic Virus,Available at http//www.spamlaws.com/polymorphic-virus.htmlbibitem5 Ward Takamiya,Jocelyn Kasamoto,emphAn Introduction to Computer Virusesbibitem6 Spamlaws,2009,emphSpotting the Stealth Virus,Available athttp//www.spamlaws.com/stealth-virus.htmlbibitem7Spamlaws,2009, emph agreement the Resident Virus,Available athttp//www.spamlaws.com/resident-virus.htmlbibitem8 Top Bits,2010http//www.topbits.com/computer-worm.htmlbibitem9 Top Bits,2010http//www.topbits.com/trojan-virus.htmlbibitem10 Top Bits,2010,http//www.topbits.com/logic-bomb.htmlbibitem11 emphAntiVirus Software Review ,http//anti-virus-software-review.toptenreviews.com/bibitem12 emphComputer knowledge virus tutorial,Available atwww.cknow.combibitem13 Charles P. Pfleeger,Shari Lawrence Pfleeger emphSecurity in Computing (4th Edition) bibitem14 Stanley A. Kurzban, emphDefending against viruses and worms,Available athttp//portal.acm.org/citation.cfm?id=68697bibitem15 emphHow does anti-virus software work?,Available athttp//www.antivirusworld.com/articles/antivirus.phpbibitem16 emphHow Antivirus Software Detect Computer Viruses,Available athttp//security-antivirus-software.suite101.com/article.cfm/how-antivirus-software-detect-computer-virusesbibitem17 emphHow AntiVirus Works,Available athttp//www.antivirusware.com/articles/how-anti-virus-works.htmbibitem18 http//www.darkgovernment.com/news/tag/hackingbibitem19 emphBitDefender Antivirus 2010 http//anti-virus-software-review.toptenreviews.com/bitdefender-review.htmlbibitem20 emphKaspersky Anti-Virus 2010http//anti-virus-software-review.toptenreviews.com/kaspersky-review.htmlbibitem21 emphWebroot AntiVirus with SpySweeper Reviewhttp//anti-virus-software-review.toptenreviews.com/webroot-antivirus-review.htmlbibitem22 emphNorton AntiVirus 2010http//anti- virus-software-review.toptenreviews.com/norton-review.htmlbibitem23 emphESET Nod32 Antivirus 4http//anti-virus-software-review.toptenreviews.com/eset-nod32-review.htmlbibitem24 emphAVG Anti-Virus 9http//anti-virus-software-review.toptenreviews.com/avg-review.htmlbibitem25 emphF-Secure Anti-Virus 2010http//anti-virus-software-review.toptenreviews.com/f-secure-review.htmlbibitem26 emph GDATA AntiVirus 2011http//anti-virus-software-review.toptenreviews.com/antiviruskit-review.htmlendthebibliographyenddocument
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment