Computer Viruses Essay, Research Paper
Computer Viruses
Explain the difference between viruses, worms and Trojan horses in the context of computer and data security. Discuss the measures that need to be taken in order to maintain security.
There is a type of computer program that is designed and written to destroy, alter or damage data stored on computers without your knowledge or permission. These are some of the problems that these programs cause
? Your computer displays annoying messages
? Your computer develops strange visual and sound effects
? Files on your computer mysteriously disappear
? Your computer starts working very slowly
? Your computer reboots unexpectedly
These programs are typically referred to as viruses although technically the computing term virus actually refers to a specific type of pest program. Other types are called Trojan horses and worms. The difference between these pest programs is how they behave when attacking a computer system and I am going to look at each type individually to explain the difference starting with viruses.
A computer virus is a program that is designed to replicate and spread itself on its own, preferably without anybody knowing it exists. They spread by attaching themselves to other programs (such as your word processing or spreadsheet programs). Then when a file with a virus attached to it is executed the virus will also be executed. Viruses can also attach themselves to system files the computer uses every time it is switched on, these are called boot sector viruses, and can cause persistent and widespread disruption to the computer. Viruses can also infest documents such as those created with a word processor. Infested documents are stored with a list of instructions called a macro, which is essentially a mini program. Then when the document is viewed the macro is activated. These viruses are called macro viruses and actually account for 67.5% of all virus damage.
Worms are very similar to viruses but are technically different in the way that they replicate and spread through the system. The difference is that programs or files don t need to be run in order to activate the spreading of a worm. Because of this worms can be very dangerous when released on to computer networks. The Internet Worm was released on to the Internet on the 2nd November 1988 spread to over 6,000 computers in less than a day. And the total monetary costs of this infection are estimated at about $98,000,000. Which proves how much damage can be done with a worm. The final type of pest program is a Trojan horse.
A Trojan horse is a malicious program that masquerades as a legitimate program. It will appear to do one function while actually doing something else. For example, you might think you are opening up a compression program when you re actually running a Trojan horse which erases your hard drive. They tend to be very nasty and very difficult to detect. However they do not replicate themselves which is what separates them from a virus. A popular Trojan horse is one that masquerades as a network login screen. So when the user logs in the Trojan horse records the users ID and password so the hacker can access them at later date. With these details the hacker can then gain access to the network and any data that was thought to be secure.
There are precautions that can be taken to protect and maintain data security. You can generally avoid a computer virus if you are just careful not to use files from high-risk areas such as off the Internet. If you do need to use a file from a high-risk source then you can use a virus detection program before you run it. A virus detection program will check for viruses and if necessary eliminate the problem. Other ways of protecting data is to make frequent backups so if a virus does destroy any data it can be replaced once the virus has been removed. And finally take basic steps to ensure that there is no unauthorised access. Unfortunately, even with all these precautions it is almost impossible to ensure complete data security but they will help to reduce the risk drastically of any unlikely occurrence.
Другие работы по теме:
Descriptive Essay About A Comp Essay Research
Paper The Computer A computer is a very unique machine. It has many different parts and a lot of different noises. Some parts are hot, and some are cold. Computers have many different sounds that they make. Depending on the sound it makes, it could have a problem. When your computer beeps at you. It normally means that an error has occurred and that it needs to be fixed.
Computer Education Essay Research Paper Back to
Computer Education Essay, Research Paper Back to the 1940s, the modern electronic computer was developed at U.S. universities; however, in the year, there was no computer education yet. It needed more 10 years to have computer education. The period of the computer revolution was 1950 in the U.S.. Computer education began in the middle of the 1950s with an organized body of knowledge.
What Would You Like A Computer To
Do For You Essay, Research Paper The first computer was invented almost 25 years ago. Since then, various improvements have been made to the computer. Recently, the internet was invented. This made a vast impact on our lives. As you can see, computers are an important part of our lives. We rely heavily on computers to do many everyday tasks for us and we cannot do without them.
Computer Essay Research Paper Computer is useful
Computer Essay, Research Paper Computer is useful for finding the information. As long as the Internet is installed in the computer, the people can be able to what they want to find. Of course, they have to waste the time for doing. Acquiring the information, they feel that it is valuable. Renctly years, the number of people is increased by using computer.
Computer Literacy Essay Research Paper Everywhere you
Computer Literacy Essay, Research Paper Everywhere you look you see some sort of computer. There everywhere from schools, to the grocery store checkout line, movie theatres and even in the shirt pockets of some businessmen. Back about ten years ago it was a chore to find someone with a computer, and the Internet please what good is that.
John Vincent Atanasoff Essay Research Paper John
John Vincent Atanasoff Essay, Research Paper John Vincent Atanasoff inventor of the electronic computer In any scienctific field, there needs to be a person with the vision to define the future. John Vincent Atanasoff was a genius with such a vision. He developed the first electronic digital computer that has dramatically changed our lives.
Computer Engineering Essay Research Paper Since birds
Computer Engineering Essay, Research Paper Since birds could fly and fish could swim there has always been questions, problems, and answers. This it what I am interested in. The questions and more importantly the answers. I have been seeking answers all my life. The one question I have always had is How do things work.
Being A Smart Consumers Essay Research Paper
Being a Smart Consumers Ryan Romme When deciding to buy a computer it is a very important decision. First decide that range of money you are willing to spend. Then research the many different companies and the product they have to offer. Then after deciding the company to purchase the computer the next step is to price watch.
Untitled Essay Research Paper A hacker is
Untitled Essay, Research Paper A hacker is a person obsessed with computers. At the heart of the obsession is a drive master the computer. The classic hacker was simply a
Another Computer Essay Essay Research Paper The
Another Computer Essay Essay, Research Paper The Computer Underground. The beginning of the electronic communication revolution that started with the public use of telephones to the emergence
Printer Technology Essay Research Paper Since the
Printer Technology Essay, Research Paper Since the introduction of computers into our society, there have been countless advancements in this technology. One of the most frequently used output devices in the computer system is the printer. Like all other components of the computer, this piece of equipment has been developed and improved over time.
Computer Net Crime Essay Research Paper Computer
Computer Net Crime Essay, Research Paper Computer crimes are terrorism of the present day. Everything from Website attacks, viruses, and cyber sex. People have even been charged for rape over the internet. Government computers have been an easy target for hackers for decades. According to Defense Information Systems Agency s data, the military may have experienced about 250,000 attacks in 1995 with 2/3 s of the intrusions being successful.
Another Hole In The Wall Essay Research
Paper ANOTHER HOLE IN THE WALL Opinion: This was a very interesting article because it seems that everybody That owns a computer has the fear of hackers and viruses. It’s a big issue
Computer Scientist Essay Research Paper The title
Computer Scientist Essay, Research Paper The title computer scientist can be applied to a wide range of computer professionals who usually design computers and the software that runs them, develop information technologies, and develop and adapt principles for applying computers to new uses. Computer scientists perform many of the same duties as other computer professionals, but their jobs are distinguished by the higher level of theoretical expertise and innovation they apply to complex problems and the creation or application of new technology.
Essay On Hacking Essay Research Paper Essay
Essay On Hacking Essay, Research Paper Essay On Hacking by Philip Smith A topic that i know very well is computers and computer hacking. Computers seem very complicated and very hard to learn, but, if given time a
Landscaping Essay Research Paper Computer Hacking BasicsComputer
Landscaping Essay, Research Paper Computer Hacking Basics Computer hacking is very popular. With every thing on the Internet having to cost something. Someone will try to hack that database and retrieve free information. As every on knows but doesn?t take very seriously is that hacking is illegal. Hacking is anywhere from hacking in to the school data base and change your grades to make a stop light change with a special clicker.
Computer Gave Technology A Bo Essay
, Research Paper The computer has come a long way since it was first invented, which put the power of technology in the spotlight. Through the years there have been many advances with the help of computers. Advances in which have been of great help.
Virii Essay Research Paper Viruses are
Virii Essay, Research Paper Viruses are not truly alive. They are much smaller and less complex than cells. Most viruses multiply exclusively inside living host cells. Viruses
Windows 30 Essay Research Paper Windows 30
Windows 3.0 Essay, Research Paper Windows 3.0 With window’s 3.0, you can unleash the power of your 286 or 386 computer’s protected mode. Unlike earlier releases that made you purchase separate versions
Computer Crime 3 Essay Research Paper Ever
Computer Crime 3 Essay, Research Paper Ever since I got my first computer. I have enjoyed working on them. I have learned a tremendous amount of trouble shooting. With my recent computer I have come across computer crime. I got interested in hacking, prhreaking, and salami slicing. But before I go to far, I need to learn more about it like the consequences? One question in mind is what crimes are their and what kind of things you can do with them? I would like to find out why people do thesis things? I would also like to learn the laws against all computer crime?
Computer Viruses Essay Research Paper A computer
Computer Viruses Essay, Research Paper A computer virus is a program that attaches itself to, overwrites and/or otherwise replaces another program in order to reproduce itself without the knowledge of the computer user. Generally, the first thing a virus does is attach itself to other executable files in such a way that the virus code is in effect when the infected files are run.
Computer Viruses Essay Research Paper Anna L
Computer Viruses Essay, Research Paper Anna L. Porter Professor J. Brown Information Systems 201 December 1, 1998 Computer Viruses A computer virus is an illegal and potentially damaging computer program designed to infect other software by attaching itself to any software it contacts. In many cases, virus programs are designed to damage computer systems maliciously by destroying or corrupting data.
A Look Into The Computer Virus Essay
, Research Paper A Look Into The Computer Virus by, Michael Ross Engineering 201.02 January 22, 1997 Most of us swap disks with friends and browse the Net looking for downloads.
The Computer Mouse Essay Research Paper The
The Computer Mouse Essay, Research Paper The Computer Mouse The computer mouse is a common pointing device, popularized by its inclusion as standard equipment with the Apple Macintosh. With the rise in
How To Maintain A Computer System Essay
, Research Paper How to Maintain A Computer System Start a notebook that includes information on your system. This notebook should be a single source of information about your entire system, both hardware
Computer Violence Essay Research Paper Violent Computer
Computer Violence Essay, Research Paper Violent Computer Games A lot of adults say violent computer games make you violent. I disagree. When you are mad you can take out your anger while playing that game. Lots of kids I know have violent computer games and none of them are violent. Pretty much everything in this world has violence in it.