Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Give effect of computer viruses
Give effect of computer viruses
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Give effect of computer viruses
Introduction Computer virus is a program or codes that loaded onto your computer without your knowledge and run against your wishes and can copy itself. In thes research I will talk about computer virus and the differents types of computer virus and how it infects the computer. Computer Virus Is an external program for the purpose of making deliberately change the properties of the files they infect to implement some commands either removal or modification or vandalism and other similar operations. In other words, computer viruses are programs that are written for the purpose of harming a compatible another, or to control and are written in a certain way so many styles and develop highly.(Fenlon, M, 2013) Computer Virus characterized as: 1- A Program copy and replace itself. 2- The computer virus connects itself to another program called an incubator. 3- Computer virus cannot establish host by itself . 4- Computer virus can move from an infected computer to another undamaged. The Computer Virus consists of four main parts: 1- The Replication Mechanism: it is the part that allows the computer virus to copy itself. 2- The Protection Mechanism: this part hides the computer virus from detection. 3- The trigger Mechanism: Allow the virus to spread before the user knows his presence. 4- The Payload Mechanism: The part that performs computer virus. Files types that the virus can infect: In general the virus infects executable files or encrypted files is a text such as the following: Files and records data (volume boot record) in floppy disks and a solid record number (0) in the hard disk master boot. (Kanish, 1997) General-purpose files such as patch files and script files an... ... middle of paper ... ... Conclusion Computer viruses are very dangerous for computer it can damage it also for students may they will lost their important files and researches you should protect your computer from viruses by set up an anti-virus software and scan your computer daily. Reference: Kanish, B. (1997, 1 25). virus32. Retrieved 10 10, 2013, from hicom: http://www.hicom.net/~oedipus/virus32.html Weinberger, S. (2012, 3 20). Top Ten Most Destructive Computer Viruses. Retrieved 10 11, 2013, from smithsonianmag: http://www.smithsonianmag.com/science-nature/Top-Ten-Most-Destructive-Computer-Viruses.htm anonymous. (2013). morevirusinfo. Retrieved 10 12, 2013, from http://acms.ucsd.edu/units/resnet/morevirusinfo.html. Fenlon, M. B.(n.d). virus. Retrived 6-10-2013, from howstuffworks: http://www.howstuffworks.com/virus.htm
The word virus comes from the Latin word, poison. A virus infects a cell and into it, inserts its DNA. The virus then multiplies inside the cell and when enough of the virus has been produced, the newly formed viruses will break out into the body of the host, destroying the cell in the process. Variola major and Variol...
In the book context it is a malware program that an attacker uses to replace a legal program. It is like a cuckoo bird laying it's eggs in another bird's nest. The cook bird does not lay eggs in its nest.
The next topic that is discussed is the topic of visual representations made by the computer such as pictures, so it speaks of how images are transferred into binary code and then reformed to create a rendering of the image. The resolution of this image is based on how many pixels the display has the more pixels the higher the resolution. The next point that of which the chapter speaks about is what happens to deleted data files. After data has been deleted the users think that it is gone. However, when data is deleted the blocks it is comprised of that are no longer part of any files are added to a “pool” of available disk blocks. This makes them accessible, if the binary code that formed the data was zeroed insead then they couldn’t be accessible. the data of the used blocks are saved to add these blocks to another file where to be reinstated into the computer in a data file. These blocks can be seen by anyone who has this knowledge, and these blocks can contain sensitive personal information that was deleted for a reason such as: account usernames, account passwords, bank account numbers, and
Facts On File, Inc., 2008. Bloom's Literature. Facts On File, Inc. Web. 11 June 2014
Then it enters into the host by exchanging its DNA or RNA. The virus then
Beal, V. (2011, March 29). The difference between a computer virus, worm, and Trojan horse.
The portals of exit for the virus are both direct and indirect. The host may infect another even before their own symptoms manifest; these may not become apparent for up to two weeks. The mechanism is as follows: after entry through the respiratory route, the virus replicates, inhabits the lymphatic system and finally the blood
6. Explain the potential impact of an outbreak of infection on the individual and organization.
At the Aim Higher College there have been recently discovered malware on the campus systems that are due to many recent attacks. I used an Anti-virus protection software called AVG on the computer systems on campus and ran a whole computer scan. The results came back very quick of numbers of malware being high and medium priorities that these should not be taken lightly. Furthermore, the scan found many viruses, Trojans, and malicious software and applications.
Unauthorized modification of computer material: An individual can't change, erase, or degenerate information. Also, if somebody attempts to put a virus onto another individual's system, they would be breaking the law. Ordinarily, carrying out unauthorized access to a machine is usually only a fine. Access with the expectation to the intent and unauthorized alteration are viewed as more serious crimes and might be prosecuted by overwhelming fines as well as prison time.
Malware is short for "malicious software”. It is a software installed (usually without someone’s knowledge) to disrupt computer operation, gather information, or gain access to private computer systems. Malware can appear in the form of a code, a script, an active content or other software’s. Once malware enters a computer it is capable of basically spying any actions that are taken using that computer. Any internet surfing, typing in your passwords by observing every keystroke, stealing personal information and identities, reading the emails that are received or sent through the computer, hijacking your browser to web pages that ‘phish’ for your personal information, and a variety of other invasive tactics are used by the ha...
Malicious software in short known as Malware. It is also known as computer Contaminant. Similar to biological parasite, malware also reside in a Host. Malware will get installed on host without user’s consent. Generally a software is considered malware based on the intent of the creator...
Malicious code, also known as malware, installed on a computer provides an attacker with the control over this machine. Therefore, malware can be defined as “a set of instructions that run on your computer and make your system do something that an attacker wants to do”. It is more common to see malicious code to be implemented in binary executable files. However, it can be implemented in almost any computer language. Attackers have used a huge number of scripting languages, word processing macro languages and a h...
...ntial information from a user. Luckily, there are reliable ways of defending against them. The most reliable way is to install strong security software that has the capacity to defend against the multifaceted forms of threats. Avoiding P2P file sharing sites and scanning email attachments before downloading them are also a surefire way of protecting a computer against malware threats. Basic acts like using an updated browser and allowing Windows updates to install and update themselves are also necessary to keep a machine safe. Furthermore, checking validity of individual website addresses and installing authenticated software can also help a computer user remain safe from potential data theft and possible damage of useful programs. It may also pay good dividends to backup files. In case of a lethal malware attack, backed-up files can always be recovered easily.
In today’s days malware is designated as a software which aims to disturb a computer with the consent or permission of the owner. This term “Malware” is used by computer professionals to describe a varied forms of destructive, annoying and intrusive software code. This word “Malware” is used to indicate all types of malware which include a true set of viruses.