Free Essay

Computer Viruses

In:

Submitted By kimdavis2009
Words 2647
Pages 11
-------------------------------------------------
Computer Viruses are a major threat to business information systems

April 23, 2013

Computer Viruses are a major threat to business information systems Computer viruses are programs that infect your system and multiply. Viruses have many symptoms: some can simply slow down your computer whilst others can have more severe effects like moving documents and/or deletion of documents or programs. No matter the severity of the virus and its symptoms they should be dealt with by an up-to-date anti-virus program and security software, as systems with out-of-date protection are more susceptible and at risk. I agree that computer viruses are a major threat to business information systems because it is a way for hacker to gather useful information about a company and harm them. According to CNN workplace computer virus infections are up forty-eight percent over last year due to the increased spread of macro viruses usually found in files attached to E-mail, according to the International Computer Security Association, Inc.
The number of infections per one thousand personal computers was twenty-one point fourty-five in nineteen ninty-seven; it's now at thirty-one point eighty-five, said the ICSA, in Carlisle, Pa. The study is based on a survey of some 300 corporations and corporate sites, representing some 750,000 PCs and servers.
The rising virus epidemic can be blamed on macro viruses in Microsoft Word documents sent as attached files over the Internet. But it's not only the ease of sending infected documents that is increasing the number of infections; it's that writing a macro is so simple, said John Wheat, who works in the virus area of ICSA.
"Word viruses are so easy to write," Wheat said. "You purchase a copy of MS Office, and you have all the tools you need," he said.
Aside from ensuring that antivirus software is updated, IS departments can also instruct users to open any E-mail attached a Word file in WordPad and save it as a Rich Text Format file. That process will remove the macros, Wheat said, and the file can then be reopened in Word, he said.(CNN.com)
Computer viruses are most commonly passed through interaction over the internet, whether they are attached to (or are disguised as) downloaded files or emails sent from friends with already compromised systems. Viruses can be passed from computer to computer without the owners knowing they are passing them along.
There are 3 basic types of viruses: Trojan Horses, Worms and Email Viruses.
Trojan Horses – A Trojan – named after the Greek army’s tactic of hiding their soldiers in a giant wooden horse that was sent as a gift to the city of Troy (In Homer’s epic Illiad) – disguises itself as a document or file of interest, e.g. a sound-bite or song for a music lover, a new patch for an MMO or game for gamers or a picture/video. These viruses do not multiply but rather make your computer’s protection weaker and thus makes your system more susceptible to viruses and other kinds of malicious software.
Worms – The Worm-style of virus is a program that, once inside your system, multiplies and scans for flaws or loop-holes in your security systems and protection. The Worm-style virus attempts to spread itself through a large network by taking advantage of the loop-holes and flaws that it finds or sending itself through the intranet of the network to other computers.
Email Viruses – Email viruses use (as suggested by the name) emails to send itself to other computers and spread itself, they often forward themselves from infected computers.
Prevention and protection from these types of viruses are simple; usually an up-to-date anti-virus software and security program is all that is needed. Recommended companies that supply anti-virus software and other protection/security programs are AVG, Symantec, Avast! And Sophos.
Anti-Virus software is a useful tool against viruses, which is a given. Having been specifically designed to combat the viruses, any good A-V software will regularly scan, at routine intervals that you can set, your computer, stored files and hard drives for viruses. Most decent A-V software will give you several options, allowing you to enact a scan at your discretion, the depth of the scan and connects you, through the software and internet, to a database which stores data on the viruses found on a fellow A-V user’s computer. Another feature most A-V software gives is the automatic scan of any files you download through your web browser, or the option to scan any file you already have downloaded on to your system. Downloading from the internet is risky, you can never be sure of where the file is coming from. Viruses, as stated above, can be, and often are, disguised as files of interest for certain people to fall foul of.
As well as receiving viruses through an email system, which are usually disguised as a file attached to an email from an unknown sender or random contact, there are other problems associated with email systems. These problems are things such as: files not attaching to emails, mail from misrepresented or unknown users and inappropriate content in junk-mail. (www.spamlaws.com)
Also I feel that when you are at work you should not check your personal e-mails because a virus can only spread from one computer to another when its host is taken to the uninfected computer via a network, Internet or a removable device. However, viruses can easily spread by attachments in e-mail messages, instant messaging messages, funny images, greeting cards, They can also be hidden in illicit software or other files or programs that you might download. (Microsoft)
So keep in mind Be careful when you click that "send" button on your office computer. The e-mail message you send could come back to haunt you. Just ask former and current employees of Enron.
As part of its investigation of the scandalized energy giant, the government collected massive amounts of evidence — including more than 1.6 million e-mails to and from Enron workers. And now, all of those messages have been posed on a public, government Web site.
Most of the electronic notes have to do with the highly technical business of trading energy. Some of the messages have to do with human resources, like reminding workers to get flu shots.
But plenty of the e-mail is personal. Very personal.
There are the messages arranging for sailing and skiing trips, as well as messages complaining about the job and so forth.
Then there are more steamy messages.
In one, an e-mailer cryptically writes to an Enron worker, "So, you were looking for a one night stand after all." In another e-mail, someone else ironically wrote: "I hate calling your cell phone. You never know who is there."
If only the writer knew who would be reading his or her e-mail now.
And that's a lesson that all Internet users can learn from, says Internet privacy expert Parry Aftab.
"Think before you click 'send,' " says Aftab."If it's something you don't want read by others, don't do it at work, don't do it by e-mail."
But the lesson is even more important to office workers, says Aftab, because it help shatter a common myth: using the office PC for personal business is OK.
Aftab says most companies use so-called "acceptable use policies" that tell workers flat out they're not supposed to have personal e-mail on their office computers. "You're not supposed to do things like sending [e-mails] to your kids or having romantic e-mails because [the companies] have the right to monitor them," says Aftab. (ABCNews.com) Companies can make a huge impact on reducing viruses in their workplace by encouraging their employees to take computer etiquette courses. They should understand that worldwide problem exists with spam e-mail. Laws have been passed in the United States and in other countries to reduce the abuse of the Internet caused by people who send millions of unwanted e-mails. Several recent high-profile cases have sent the spammers to jail or charged them very large fines. Spam hurts everyone who uses the Internet because it clogs e-mail servers and frustrates people who use e-mail responsibly when they have to delete 1/2 or more of their e-mail because it's spam. Unwanted spam e-mails may contain advertising, offensive material, viruses, ad-ware, spy-ware or simply clog up the mail servers and people's inboxes. Let your employees know that they as well as managers can help prevent infecting company computers because most average computer users are not well prepared to deal with Adware, Spyware, Phishing or Spam. If you work for a company or non-profit agency, contact your Help Desk or Technical Support staff for help if you suspect you are receiving spam or your computer might have adware or spyware. They will usually have special programs that can check your computer for viruses, adware, spyware, trojans and other unwanted software. If your computer is running very slowly or programs are crashing regularly, you may have adware or spyware that is taking all of your computer's resources for itself without your knowledge.
To protect against spam, be very careful about how you and your employees give out their e-mail addresses. If you use newsgroups or post messages to public websites, make sure you use an alternate e-mail address as these are prime targets for automated programs that harvest e-mail addresses then sell them to spammers. Alternate or disposable e-mail addresses can be obtained at any of the free e-mail services. You can change these addresses without jeopardizing the security of your business. Be especially careful about opening attachments to e-mail. Before opening any attachment, be absolutely sure you know what it is and that you know the person sending it. If you are not sure, write back to them and ask them what they sent you before opening the attachment.
Just because an e-mail has a familiar name, doesn't mean it's really from that person. The newer viruses steal e-mail addresses and use them to fool people into opening malicious attachments. Many corporate servers and some Internet service providers have the ability to block the most common types of harmful attachments.
Some companies have spam e-mail filters that will block known junk mail before it gets to you. Some programs allow you to flag each send of spam so that any future e-mail from them will be deleted. There are also programs such as Mailwasher that review your mail on the server before you read it and can be programmed to identify spam for you automatically. You can flag your "friends" so their e-mail is saved for you.
For your home or office computer, be sure you have an up-to-date anti-virus program. Major vendors of good virus programs include Norton and McAfee. These can be purchased online or at business supply stores. The newest versions include protection against the worst forms of Spyware.
Newer web browsers such as Firefox have some built-in features to block malicious programs when you visit websites. Microsoft's Internet Explorer version 6.0 with Windows XP Service Pack 2 contains a built-in pop-up ad blocker that can prevent obnoxious ads, which sometimes lead people to websites with spyware.
Many malware programs target known security weaknesses in Microsoft products, seeking computers that do not have the latest updates installed. Using an alternate browser (such as Firefox or Opera), and alternate e-mail programs (such as Netscape, Mozilla or Thunderbird) can prevent disaster for home computers. Even some large companies are using alternate programs to reduce their security risks.
Not only personal e-mails are harmful but certain sites you visit on your workplace computer are harmful as well. According to Symantec, 20 percent of all blog and Web communication sites are infected with malicious code, 15 percent of hosting sites are infected, and 10 percent of business and economy sites. Surprisingly, a mere 2 percent of pornographic sites are infected. Conventional wisdom would flip that list upside-down. (cbsnews.com) * Blogs and Web communications * Hosting and personal hosted sites * Business and economy * Education and reference * Technology * Entertainment and music * Automotive * Health and medicine * Porn
Obvious sites that most often include malicious programs include porn and gambling sites, lyric websites and any site that requires a file download before it opens. Coupon sites, screensavers and wallpaper sites, survey sites and any email attachments from unfamiliar people are also potentially dangerous. Your employees might think that their personal email, favorite shopping sites and news sites are safe. Unfortunately, almost any site can be dangerous. The games they play as stress relief between projects, those stock market updates, even scheduling a doctor’s appointment for a sick child could result in malicious programs attaching themselves to company computers. Online activity is never really anonymous, especially on work-issued equipment. If they need to hide online activity from you, they shouldn’t be doing it at work.
Even with all of those precautions in place, dangerous sites sometimes hide behind a veneer of authenticity that an employee might not see through. Using antivirus software is the most reliable way to tell if a site is safe. It checks sites before opening them, which prevents your employees from accidentally compromising your company’s personal data. (pacificcommunityventures.org) Computer viruses have been around for a long, long time pretty much as long as personal computing and mainstream software development they've been making international news since the Internet graduated from a researcher's toy to a tool for consumers. While the first virus in this brief history coincided with the birth of the 3.5-inch floppy disk, a lot of the malware we see these days relies on social media or mobile apps for transmission, adequate proof that with any innovation comes an opportunity for exploitation. The twist these days is that more viruses are specifically targeted to steal personal data and make money for their creators, which was not necessarily a goal for many of the virus-writing hackers of the late 1980s and early 1990s. In fact, according to this data, the first money-making computer virus didn't hit PCs until 2003. In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge the subculture that has evolved around hackers is often referred to as the computer underground and is now a known community. While other uses of the word hacker exist that are not related to computer security, such as referring to someone with an advanced understanding of computers and computer networks, they are rarely used in mainstream context. They are subject to the long standing hacker definition controversy about the true meaning of the term hacker. In this controversy, the term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker, not making a difference between computer criminals (black hats) and computer security experts (white hats). Some white hat hackers claim that they also deserve the title hacker, and that only black hats should be called crackers.
To prevent your computer from being infected by viruses, it's essential to keep your computer current with the latest updates and antivirus tools, stay informed about recent threats, and to follow a few basic rules of safety when you surf the Internet, download files, and open attachments. Always remember not to open an attachment file unless you know who it’s from and what it’s for. (Microsoft)

Similar Documents

Free Essay

Computer Viruses

...Abstract Now that personal computers are pretty much a must have in every household, school, or business cyber-criminals have moved from just being a hacker for fun into an estimated multi-million dollar world of computer crimes. New revenue streams have been realized and viruses in choice Computer crimes encompass unauthorized or illegal activities perpetrated via computer as well as the theft of computers and other technological hardware. As firms of all sizes, industrial orientation, and geographic location increasingly rely on computers to operate, concerns about computer crime have also risen, in part because the practice appears to be thriving despite the concerted efforts of both the law enforcement and business communities to stop it. But computer experts and business consultants alike note that both international corporations and modest family-owned businesses can do a great deal to neutralize computer "viruses" and other manifestations of computer crime. “http://rahimimohammad.blogspot.com/p/law-for-computer-crimesand-economic.html” Many analysts believe, however, that small business owners are less likely to take steps to address the threat of computer crime than are larger firms. Indeed, many small businesses admit that they are passive about the threat because of costs associated with implementing safeguards and the perception that computer "hackers" and other threats are far more likely to pick on bigger companies. But as Tim McCollum flatly stated in Nation's Business...

Words: 4313 - Pages: 18

Premium Essay

Computer Viruses

...Computer Viruses While technology advances have brought many benefits to society there have also been technological abuses (1). In today’s generation, with the help of the Internet and the rapid growth of the personal computer in the average household, we are able to talk to and share information with people from all sides of the globe (2). Unfortunately this transformation of data has opened the doors for a new era of high tech crime – the computer virus. The Internet is now a complex gateway for transgression and immoral activities where often the perpetrators of the crime are far removed from the scene of the criminal activity and hidden behind a maze of double speak (3). Computer viruses are enigmatic and grab our attention. They move silently from computer to computer under a shroud of secrecy and deceit. If they are not caught in time, these malicious programs can erase all the data off a hard drive, rearrange numbers in a spreadsheet file, or practically anything else a clever programmer can devise. A computer virus is a potentially dangerous computer program designed with the intent of obliterating or corrupting data that it comes into contact with. Computer viruses are mysteriously hidden beneath seemingly innocuous programs, which explains the reason for their effective dissemination across the Internet. These malicious computer programs are designed to replicate themselves or insert copies of themselves into other programs when executed within the infected program...

Words: 2468 - Pages: 10

Free Essay

Computer Viruses

...Going back to the origin of viruses, it was in 1949 that Mathematician John Von Neumann described self-replicating programs which could resemble computer viruses as they are known today. However, it was not until the 60s that we find the predecessor of current viruses. In that decade, a group of programmers developed a game called Core Wars, which could reproduce every time it was run, and even saturate the memory of other players' computers. The creators of this peculiar game also created the first antivirus, an application named Reeper, which could destroy copies created by Core Wars. However, it was only in 1983 that one of these programmers announced the existence of Core Wars, which was described the following year in a prestigious scientific magazine: this was actually the starting point of what we call computer viruses today. At that time, a still young MS-DOS was starting to become the preeminent operating system worldwide. This was a system with great prospects, but still many deficiencies as well, which arose from software developments and the lack of many hardware elements known today. Even like this, this new operating system became the target of a virus in 1966: Brain, a malicious code created in Pakistan which infected boot sectors of disks so that their contents could not be accessed. That year also saw the birth of the first Trojan: an application called PC-Write. Shortly after, virus writers realized that infecting files could be even more harmful to...

Words: 1088 - Pages: 5

Free Essay

Computer Viruses

...Definition of virus "Computer viruses" is the term that defines the class of programs which illegally explore resources of systems. It is an executable code able to reproduce itself. Viruses are an area of pure programming, and, unlike other computer programs, carry intellectual functions on protection from being found and destroyed. They have to fight for survival in complex conditions of conflicting computer systems. Computer viruses have pervaded popular culture at least as successfully as they have the world's computer population. Computer viruses replicate by attaching themselves to a host a program or computer and co-opting the host's resources to make copies of themselves. Symptoms can range from unpleasant to fatal. Computer viruses spread from program to program and computer to computer. There are other computer pathogens, such as the "worms" that occasionally afflict networks, and the "Trojan horses" that put a friendly face on malicious programs, but viruses are the most common computer ill by far. Types of viruses. There are different types of viruses, and they have already been separated into classes and categories. For instance: dangerous, harmless, and very dangerous. No destruction means a harmless one, tricks with system halts means a dangerous one, and finally with a devastating destruction means a very dangerous virus. But viruses are famous not only for their destructive actions, but also for their special effects, which are almost impossible to classify...

Words: 1595 - Pages: 7

Free Essay

Computers and Viruses

...A computer virus is a computer program that can replicate itself[1] and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability. Malware includes computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious or unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves. An example of a virus which is not a malware, but is putatively benevolent, is Fred Cohen's theoretical compression virus.[2] However, antivirus professionals do not accept the concept of benevolent viruses, as any desired function can be implemented without involving a virus (automatic compression, for instance, is available under the Windows operating system at the choice of the user). Any virus will by definition make...

Words: 5194 - Pages: 21

Premium Essay

Computer Viruses

...A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also used to refer to other types of malicious software, including: adware and spyware programs. A virus can spread from one computer to another. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer. As stated above, the term "computer virus" is sometimes used as a catch-all phrase to include all types of malware (malicious software). Malware includes computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. A Trojan horse, or Trojan, is malicious software designed to secretly access a computer system without the owner's permission or approval. It appears to perform a desirable function for the user prior to run or install but instead, it facilitates unauthorized access of the user's computer system. On the other hand, a computer worm is a self-reproductive malware computer program. It uses a computer network to send copies of itself to other computers on the network and it may...

Words: 341 - Pages: 2

Premium Essay

Computer Viruses

...Computer Virus A computer virus is a malicious piece of executable code that propagates typically by attaching itself to a host document that will generally be an executable file. ✓ Typical hosts for computer viruses are: – Executable files (such as the ‘.exe’ files in Windows machines) that may be sent around as email attachments – Boot sectors of disk partitions – Script files for system administration (such as the batch files in Windows machines, shell script files in Unix, etc.) – Documents that are allowed to contain macros (such as Microsoft Word documents, Excel spreadsheets, Access database files, etc.) ✓ Any operating system that allows third-party programs to run can support viruses. ✓ Because of the way permissions work in Unix/Linux systems, it is more difficult for a virus to wreak havoc in such machines. Let’s say that a virus embedded itself into one of your script files. The virus code will execute only with the permissions that are assigned to you. For example, if you do not have the permission to read or modify a certain system file, the virus code will, in general, be constrained by the same restriction. ✓ At the least, a virus will duplicate itself when it attaches itself to another host document, that is, to another executable file. But the important thing to note is that this copy does not have to be an exact replica of itself. In order to make more difficult the detection by pattern matching, the virus may alter itself...

Words: 2382 - Pages: 10

Premium Essay

Computer Viruses

...people rely on computers to do homework, work, and create or store useful information. Therefore, it's important for the information to be stored and kept properly. It's also extremely important to protect computers from data loss, misuse and abuse. For example, businesses need to keep their information secure and shielded from hackers. Home users also need to ensure their credit card numbers are secure when participating in online transactions. A computer security risk is any action that could cause loss of information to software, data, processing incompatibilities or damage to computer hardware. An intentional breach in computer security is known as a computer crime, which is slightly different from a cybercrime. A cybercrime is known as illegal acts based on the Internet and is one of the FBI's top priorities. There are several distinct categories for people that perpetrate cybercrimes, and they are: hacker, cracker, cyberterrorist, cyberextortionist, unethical employee, script kiddie and corporate spy. A hacker is defined as someone who accesses a computer or computer network unlawfully. They often claim that they do this to find leaks in the security of a network. The term cracker refers to someone intentionally accessing a computer or computer network with malice in mind. They access computers with the intention of destroying or stealing information. Both crackers and hackers are having advanced network skills. A cyberterrorist is someone who uses a computer network or...

Words: 1026 - Pages: 5

Free Essay

Types of Computer Viruses

...A computer virus is a program that is designed to damage your computer, programs, and files. Like a virus in a living thing, a computer virus can spread if it is not removed. Some viruses are more dangerous than others. One of the most common places for a computer virus to appear is on a file found on the Internet or attached to an E-mail. Computer viruses didn’t really exist until the mid 1980s. The first computer viruses were created in university labs to demonstrate how much of a threat the vicious code could be. There are many kind of viruses that exist today. Some of the most common of Computer Viruses are: File Viruses, Boot Sector/Partition Viruses, Multi-Partite Viruses, Trojan Horses, File Overwriters, Polymorphic viruses, and Stealth Viruses. A File Virus is the most common kind of virus. These kinds of viruses usually infect .EXE and COM files, which are the main component of a program or application. A file virus can insert its own code into part of the file, so that when the infected program file is run, the virus is executed first. Most file viruses are memory resident. Because of this, they can easily attach themselves to other programs that are being run and start to infect that file. A simple virus will overwrite and destroy a host file, immediately letting the user know that there is a problem because the software will not run. Because these viruses are immediately sensed by the computer, they have a less chance to spread. More complex written viruses will cause...

Words: 734 - Pages: 3

Premium Essay

Introduction to Computer Viruses

...The person might have a computer virus infection when the computer starts acting differently. For instance getting slow or when they turn the computer on, it says that all the data is erased or when they start writing a document, it looks different, some chapters might be missing or something else ubnormal has happened. The next thing usually the person whose computer might be infected with virus, panics. The person might think that all the work that have been done is missing. That could be true, but in most cases viruses have not done any harm jet, but when one start doing something and are not sure what you do, that might be harmful. When some people try to get rid of viruses they delete files or they might even format the whole hard disk like my cousin did. That is not the best way to act when the person think that he has a virus infection. What people do when they get sick? They go to see a doctor if they do not know what is wrong with them. It is the same way with viruses, if the person does not know what to do they call someone who knows more about viruses and they get professional help. If the person read email at their PC or if they use diskettes to transfer files between the computer at work and the computer at home, or if they just transfer files between the two computers they have a good possibility to get a virus. They might get viruses also when they download files from any internet site. There was a time when people were able to be sure that some sites...

Words: 366 - Pages: 2

Free Essay

An Overview of Computer Viruses in a Research Environment

...An Overview of Computer Viruses in a Research Environment Matt Bishop Department of Mathematics and Computer Science Dartmouth College Hanover, NH 03755 ABSTRACT The threat of attack by computer viruses is in reality a very small part of a much more general threat, specifically attacks aimed at subverting computer security. This paper examines computer viruses as malicious logic in a research and development environment, relates them to various models of security and integrity, and examines current research techniques aimed at controlling the threats viruses in particular, and malicious logic in general, pose to computer systems. Finally, a brief examination of the vulnerabilities of research and development systems that malicious logic and computer viruses may exploit is undertaken. 1. Introduction A computer virus is a sequence of instructions that copies itself into other programs in such a way that executing the program also executes that sequence of instructions. Rarely has something seemingly so esoteric captured the imagination of so many people; magazines from Business Week to the New England Journal of Medicine [39][48][60][72][135], books [20][22][31][40][50][67][83][90][108][124], and newspaper articles [85][91][92][94][114][128] have discussed viruses, applying the name to various types of malicious programs. As a result, the term “computer virus” is often misunderstood. Worse, many who do understand it do not understand protection in computer systems, for example...

Words: 12539 - Pages: 51

Premium Essay

8 Common Types of Computer Viruses

...Howard Mayo NT1230 4/3/12 8 Common Types of Computer Viruses Dictionary.com defines a computer virus as “a segment of self-replicating code planted illegally in a computer program, often to damage or shut down a system or network (“Virus,” 2012).” The term virus has become more generic over the years and has come to represent any type of malware, or malicious software. There are many types of malware that can be classified as viruses but it is the intention of this paper to examine 8 of the most common types. These types are virus, worms, trojans, adware/pop-up ads, spyware, keyloggers, rootkits, and scareware. * Virus- as defined above, a virus is self-replicating code planted in a computer program. This malware’s sole purpose is to destroy or shut down systems and networks. (“Virus,” 2012). * Worms- These are standalone programs whose sole purpose is to replicate and spread themselves to other computers. Their main use is to search for and delete certain files from computers. * Trojans- This malware is designed to look like a useful program while giving control of the computer to another computer. It can be used for several malicious things: * As part of a botnet to use automated spamming or distribute denial-of-service attacks. * Electronic money theft * Data theft * Downloading or uploading of files to the computer * Deletion or modification of files * Crashing the computer * Watching the viewer’s screen * Anonymous...

Words: 642 - Pages: 3

Free Essay

Dsadsa

...Introduction and Abstract Copyright(c), 1984, Fred Cohen - All Rights Reserved This paper defines a major computer security problem called a virus. The virus is interesting because of its ability to attach itself to other programs and cause them to become viruses as well. There are two spellings for the plural of virus; 'virusses', and 'viruses'. We use the one found in Webster's 3rd International Unabridged Dictionary Given the wide spread use of sharing in current computer systems, the threat of a virus carrying a Trojan horse [Anderson72] [Linde75] is significant. Although a considerable amount of work has been done in implementing policies to protect from the illicit dissemination of information [Bell73] [Denning82], and many systems have been implemented to provide protection from this sort of attack [McCauley79] [Popek79] [Gold79] [Landwehr83], little work has been done in the area of keeping information entering an area from causing damage [Lampson73] [Biba77]. There are many types of information paths possible in systems, some legitimate and authorized, and others that may be covert [Lampson73], the most commonly ignored one being through the user. We will ignore covert information paths throughout this paper. The general facilities exist for providing provably correct protection schemes [Feiertag79], but they depend on a security policy that is effective against the types of attacks being carried out. Even some quite simple protection systems cannot be proven 'safe' [Harrison76]...

Words: 8970 - Pages: 36

Premium Essay

How Ethics Relate to Computer Crimes

...How Ethics Relate To Computer Crimes Herman T. Everidge III Legal and Ethical Issues in Computing CIS 4253, 847 James R. Moore, Jr. September 29, 2012 Computer Viruses, Worms, Trojan Horses and Malware Malware refers to software programs designed to damage or do other unwanted actions on computer systems; viruses, worms, Trojan horses, and spyware are the most common types of malware. Computer viruses show us how vulnerable we are; viruses can have a devastating effect on businesses, they disrupt productivity and can cause billions of dollars in damages. They also show us how sophisticated and interconnected we have become. Computer viruses are called viruses because they share some of the traits of biological viruses; computer viruses pass from computer to computer much like a biological virus passes from person to person. Computer viruses are created by people by writing code to create the virus, and designing the attack phase which could be a message or initiate the destruction of a piece of hardware. Early viruses were pieces of code embedded in legitimate programs, like games or word processors. A virus is a small piece of software that piggybacks on real programs; it might attach itself to a program and each time the program runs the virus runs too, and they can reproduce by attaching to other programs. E-mail viruses travel as an attachments to e-mail messages and can replicate themselves by automatically mailing itself to people in the victim's e-mail address...

Words: 3580 - Pages: 15

Premium Essay

Nt1110 Unit 3

...put down some information to create an Xbox live account got sold off. Computer misuse act The computer misuse act is a law that is made to protect computer users against attacks that are meant to steal information from the user the people who would normally do these attacks are known as hackers. Hackers can get to your accounts through things like your password and username this is why people keep telling you to have strong passwords that don’t relate to you directly. There are many different ways that a user can have security problems on their computers these are things like… • Hacking • Viruses • Identity theft Hacking...

Words: 1099 - Pages: 5