Viruses and the Personal Computer
Viruses and the effects on personal computers are part of life as we know it in the computer age. Computers and their software can get sick just like humans can get sick. The computer virus is a computer program written to cause problems and allow access to computers. Computer viruses can reproduce themselves to stay resident in your software for some time, without detection, and can spread to other computers on a network. The first mention of the computer virus was in 1949.
How computer viruses work
Computer viruses are not understood very well, but they get your attention. Viruses show us how vulnerable we are, but they also show how open and worldly human beings have become. Microsoft and other large companies had to shut down all their e-mail systems when the “Melissa” virus became a worldwide event.
A computer virus is passed on from one computer to another computer.
Viruses and Internet Security
Since the creation and development of the Internet, hackers and intelligent software developers have been able to spread viruses that cause great harm to corporations and households. The Internet has been the gateway for hackers into their journey of obstruction. For example, through the loopholes of Microsoft’s IIS services on its server operating system packages, hackers have been able to open “backdoors” into some of the most complex intranet firewall protected networks of the world. Once the access has been made available, hackers have the opportunity to manipulate data, retrieve confidential data, and destroy systems containing critical data with the help of their developed viruses. The fact of the matter is, hackers and other cyber criminals cause great amounts of financial damage to corporations and other smaller scaled victims.
I decided to read the book by David Harley called Viruses Revealed. This book goes into great detail about the different kinds of viruses and virus mechanisms, the solutions to these viruses, studies on different cases of viruses and then the social aspects of viruses. In the first part of the book, Harley talks about the problems with viruses. A virus is a program that infects other programs to modify them. “Infecting means that a virus will insert itself into the chain of command” (Harley). The virus structure was defined into three different parts: Infection, Payload, and Trigger. The infection is defined as the way or ways in which the virus spreads. The payload is defined as what the virus does besides duplicating itself. Trigger is defined as the procedure that decides whether or not the payload is necessary. Harley also talks about the difference between damage versus infection. The major difference between the two is that many users have infected documents or applications on their computer. Whether or not those applications are run is the difference between the two. In part one Harley also converses about Trojan Horses. Trojan horses are normally known as a virus, but he shoots that down. Harley says that Trojan Horses are normally not viruses, but just a worm that goes from computer to computer. After talking about different kinds of viruses and worms, he goes into Anti-Virus softwares. There are two different kinds of anti-viruses. One being virus-specific. Virus-specific means that every time a virus is found on your computer, it is identified but not detected. Generic scanners do the opposite. Generic scanners detect viruses but do not identify them.
Viruses are programs that attach themselves to legitimate programs with malicious intent. It is designed to spread from one host to another. Once a virus has successfully attacked, the program will remain dormant until the device has to execute its code. Once infected the computer virus can infect other devices on the same network and cause some major damage. These damages include corrupting files and even taking over the
Computer Viruses
Explain the difference between viruses, worms and Trojan horses in the context of computer and data security. Discuss the measures that need to be taken in order to maintain security.
There is a type of computer program that is designed and written to destroy, alter or damage data stored on computers without your knowledge or permission. These are some of the problems that these programs cause
? Your computer displays annoying messages
?
Viruses are commonly called “Trojan Horses”, as they usually disguise their true harm. Viruses are defined as a piece of programming code that can have devastating effects to one’s computer. Viruses are so dangerous because they can automatically be sent to another computer without one actually sending the program. Viruses most commonly come in an e-mail or attachment, a downloadable file, or on a CD-ROM or diskette. Most of the time, the source of the virus does not even know the virus is contained in the file or program. Some viruses must lie in wait until the computer does something to trigger the code into action.
Research Paper on
Protecting Against Malware
Among the three options given in the MIS6082 final paper requirements, i am going with option A and selecting Chapter 9 (Protecting Against Malware) as my research area.
Research paper at a GLANCE
1. Introduction
2.
Malware and its effect on computer world
Introduction:
“A digital world we became”. These days individuals turned to use computer systems in everything in their lives. They even use them in manufacturer instead of employees. I did not say that technological innovation is not essential for us but sometimes the technological innovation disregards our role in life. Technological innovation is very essential to any lifestyle to flourish.
Malicious code is a real danger to modern systems. Most systems nowadays do not work in isolation; they are more likely to be connected to other systems and sometimes they can even be dependent on them. Therefore an attack on one of the systems in the network is a potential attacking attempt to any other systems, with which it is interacting. Therefore, it is inevitable for any networked or Internet-connected computers to deal with malicious code attacks at some point. Businesses lose billions of dollars each year because of malicious code attacks. Responding to the attack and restoring all the data on the computers is a time-consuming and expensive task. It is a much better practice to try preventing it through organizing and maintaining effective defenses. However, it is important to keep in mind that there is no one general solution that can help to prevent all the attacks. Attackers are constantly looking for new ways to take advantage of systems’ vulnerabilities and find new ones. That’s why organizations have to not only defend themselves against existing attack methods, but also try to predict and prevent new attacking techniques. It means that computer and network security is a never-ending challenge and expense.