Computer Viruses Essay

1026 words - 5 pages

Today, many people rely on computers to do homework, work, and create or store useful information. Therefore, it's important for the information to be stored and kept properly. It's also extremely important to protect computers from data loss, misuse and abuse. For example, businesses need to keep their information secure and shielded from hackers. Home users also need to ensure their credit card numbers are secure when participating in online transactions. A computer security risk is any action that could cause loss of information to software, data, processing incompatibilities or damage to computer hardware.
An intentional breach in computer security is known as a computer crime, which ...view middle of the document...

They use blackmail to demand a certain amount of money in exchange for not launching an attack.
An unethical employee is one who illegally accesses their company’s network for numerous reasons. One could be the money they can get from selling top secret information, or some may be bitter and want revenge.
A script kiddie is similar to a cracker because they might want to do harm, but often lack the technical skills. Script kiddies tend to use prewritten hacking and cracking programs.
A corporate spy has extensive computer and networking skills and is hired to break into a specific computer or computer network to steal, delete data and/or information. Shady companies hire these types’ people in a practice known as corporate espionage. They do this to gain an advantage over their competition. Business and home users must do their best to protect or safeguard their computers from security risks. The next part of this article will give some pointers to help protect your computer. However, one must remember that there is no guaranteed way of protecting your computer, so learning about your options is important.
When you transfer information over a network it has a high security risk compared to information transmitted in a business network because the administrators usually take stringent measures to protect against security risks. Over the Internet the risk is much higher. If you're not sure if your computer is secure, it's advisable to use an online security service to check your computer for email and Internet vulnerabilities. The company will then give some pointers on how to correct these vulnerabilities. The Computer Emergency Response Team Coordination Center is a good resource.
The typical network attacks that put computers at risk are: viruses, worms, spoofing, Trojan horses and denial of service attacks. Every unprotected computer is vulnerable to a computer virus. Once the virus is in the computer it can spread throughout, infecting other files and potentially damaging the operating system itself.
A computer worm is a program that repeatedly copies itself and is similar to a computer virus. However, a virus needs to attach itself...

Other assignments on Computer Viruses

Nt1110 Essay

676 words - 3 pages The purpose of an operating system is to make the computer work. The (OS) operating system software enables the user to interact with the system or the computer. The operating system manages the different devices connected to the systems like a mouse or keyboard. The operating system provides a user interface to the machine and offers a way for a user to control the system. No computer can operate without an operating system. The functions of

Keeping Information Secure Essay

1741 words - 7 pages leave your company. Use network logging and security tests to check your network for security holes and possible break-ins. Passwords One bad password can compromise your entire network. Avoid passwords that contain dictionary words or personal information, and require users to change their passwords regularly. When an employee leaves the company, disable their password immediately as part of the termination process. Viruses Computer

Netw Lab 12

335 words - 2 pages Lab 12.1 1. The type of events are system log, application log, and security log. Errors will happen same as warning and information. 2. Applications and Services Logs vary. They include separate logs about the programs that run on your computer, as well as more detailed logs that pertain to specific Windows services. 3. Custom Views, it’s easier to call up a commonly used filter. You can easily remove old events and then show


1401 words - 6 pages computer crime is sabotage of hardware or software. Modern computer saboteurs commonly use malware (malicious software). The name given to the saboteurs’ destructive programs-viruses, worms, and Trojan horses-sound more like biology than technology, and many of the programs even mimic the behavior of living organisms. Many military experts suggest that future wars may not be fought in the air, land or sea. The front line of the future may be in

Nt2580 Project 2

858 words - 4 pages files and add a password to it. 3) Malicious Code and Activity – countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses and other related forms of intentionally created damaging code. Software - ClamAV is an open source (GPL) antivirus engine designed for detecting Trojans, viruses, malware and other malicious threats. Gateway Anti-Virus, a Vermont Department of Taxes project, allows applications

It/280 Final Project

5065 words - 21 pages . Viruses can cause large amount of damage to the computer’s software as well as spread the infection to other computers on the same network. There are many different types of viruses and most cannot be seen or even known they are installed on to your pc. The number one way to battle the issues of computer virus infections is by installing an anti-virus program on all work stations and proactively scanning and monitoring them. Today it is no longer

Management Of Information Systems

1747 words - 7 pages Vulnerability and Abuse • An unprotected computer connected to Internet may be disabled within seconds • Security: • Policies, procedures and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems • Controls: • Methods, policies, and organizational procedures that ensure safety of organization’s assets; accuracy and reliability of its accounting records; and

Radical Leadership

714 words - 3 pages customers thus fulfilling the interpersonal role.  3.This case study is abut the management roles and management skills .There is a company name Symantec Corporation at Santa Monica, that deals with viruses that are very dangerous and dirtiest   and find out their solutions in order to provide the customer support and ease in their daily business life. The situation at Symantec is very unique and hard because of rapid change in the environment


1613 words - 7 pages people cannot exercise free will to disengage” (London, 31) and it is true. People are so dependent in today’s age that they find themselves difficult to exclude themselves from the computer dependency. London cleverly points out that everyone is relying on computers, including the military, but what people fail to realize is the fact that computer viruses can just completely cripple the system and can lead to an “invulnerable hegemon


999 words - 4 pages | | |Sending or forwarding email that is likely to contain computer viruses. | | |All sensitive [AGENCY] material transmitted over external network must be encrypted. | | |All user activity on [AGENCY] Information Resources assets is subject to

Acceptable Use Policy

805 words - 4 pages Assignment: Create an Internet and Email Acceptable Use Policy Course Foundations of Computer security Instructor: Amanda Lawrence Cooley Investments is an organization based upon client trust and confidentially. Without the trust placed in the organization by the clients, the organization will cease to exist. As such, every employee should consider their daily actions and the correlation of those actions to the trust placed in the

Similar Documents

Submit A 4 Page Paper Discussing Three Types Of Cybercrime Risks And How Organizations And Individuals Can Protect Themselves From These Schemes. Please Identify At Least One Real Life Exmaple And...

1097 words - 5 pages committed where the computer or electronic data device is integral to the criminal act (Kranacher, Riley, and Wells 114). Although many do not believe that they can cause any vital damage, cybercrimes such as wiretapping, piggybacking, and computer viruses can have significant repercussions on various organizations. By identifying the type of cybercrime, discussing how organizations can protect themselves from it, and multiple real-life examples, an

Internet Essay

444 words - 2 pages Another privacy issue is hacking. Because social networks do not offer security measures for their users, many of the computers used by networkers are vulnerable to hackers. Every bit of information on a networker’s computer becomes available to those skilled in this science, often without the knowledge of the networker. Along with the ability to hack is the ability to plant viruses. Many viruses today are passed through social networks

Secutiry Threats Essay

452 words - 2 pages Security Threats Computer security is no longer just an organization’s concern but everyone’s who uses their computer to access the internet. Anyone who uses their personal computer to access the internet faces potential security threat. This document will identify all the potential security threats on a personal computer and some techniques an attacker might employ to access information on the file system. Security threats can be broadly

Project Part 2 It Security Essay

953 words - 4 pages contained on portable media and storage devices (such as DVDs, USB drives, floppy disks, etc.) for malware and malicious code prior to being used on any department information systems (such as laptops, PDAs, desktop computers, etc.). Definitions Antivirus Anti-virus software is used to prevent, detect and remove a range of malware, including computer viruses, worms, trojan horses, adware and spyware. Computer Virus Computer program that can