Howard Mayo NT1230 4/3/12 8 Common Types of Computer Viruses Dictionary.com defines a computer virus as “a segment of self-replicating code planted illegally in a computer program, often to damage or shut down a system or network (“Virus,” 2012).” The term virus has become more generic over the years and has come to represent any type of malware, or malicious software. There are many types of malware that can be classified as viruses but it is the intention of this paper to examine 8 of the
Words: 642 - Pages: 3
segment that has data information required for the computer to start up. The boot sector virus loads onto the boot sector partition table of the hard drive spreads to all other programs that are used. File: A set of information, but the place where viruses are attached from com or exe extensions. A file virus attaches or replaces the file name extensions in a file and spreads through the executable extensions of other files. Multipartite: A virus that has similarities of the boot sector and file virus
Words: 364 - Pages: 2
provides an insight of the history of virus. The report also analyses the spread of viruses and defines certain measures that computer users may take into account to avoid viruses. Overall ,it was learnt from the report that it is important to keep us updated about computer viruses to be able to successfully safeguard us from computer virus attacks Introduction to Computer Virus: Viruses are mischievous programs, the purpose of which is to disrupt the sensible use of
Words: 2136 - Pages: 9
computers running Windows 2000, Windows XP, Windows Vista, Windows 7, and Mac OS X, you must research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses, and other related forms of intentionally created deviant code. Introduction Malicious software is written with the intent to damage or infect the system of Richman Investment. Malicious code or software is a threat to
Words: 953 - Pages: 4
on a Windows Server Instructor Name: Lab Assessment Questions 1. Workstation and desktop devices are prone to viruses, malware, and malicious software, especially if the user surfs the Internet and World Wide Web. Given that users connect to the Internet and World Wide Web, what security countermeasures can organizations implement to help mitigate the risk from viruses, malware, and malicious software? First the Security Professional needs to education their users of the dangers of these
Words: 506 - Pages: 3
1) Identify the Operating System and note whether you are and/or have been running your Operating system updates regularly. When was your last update? Do you have outstanding updates? Is your computer set to run and download these updates automatically? Be sure to get your computer up-to-date if it isn't already. The operating system running on my Mac air now is OS X Mavericks. I updated it on last Monday. I set up an alert system to make sure my computer update the new system automatically
Words: 815 - Pages: 4
Malicious Code This research paper attempts to explain the methodologies used in the creation of viruses, the frequency of their development, and the skill level required in creating this code. Although we live in a society that presents various malicious threats that includes virus, worms, Trojan programs, and logic bombs, the focus of this paper will concentrate on the comparison of viruses and worms. I will also examine the question as to weather of not non-Microsoft operating systems as less prone
Words: 490 - Pages: 2
P2-Explain the purpose of an operating system The Operating system is the most vital set of programs which runs on the computer. Its PURPOSE is to providing the very basic user interface there are no other programs or application running. The key roles of the Operating system are to recognise input from peripherals such as a mouse, keyboard, USBs, digital sketch pads and other input devices and also controls other peripherals such as printers and scanner. It also has the role of managing hardware
Words: 1232 - Pages: 5
Ch. 1 1. A threat agent is the specific instance or a component of a threat, whereas a threat is a category of objects, persons, or other entities that presents a danger to an asset. 3. By ensuring the protection and continuity of utility services for an organization you prevent potential loss of productivity and revenue for that organization, as well as the prevention of possible breaches in security that may ensue if, for instance the power goes out and an alarm system or other remote monitoring
Words: 565 - Pages: 3
type of virus, he/ or she wants to use. Once the attacker determines what type of virus is going to be used, then they must determine who they want to attack. Lastly, ask what type of data they want to gain from the attack. People write computer viruses. The person has to write the code, test it to make sure it spreads properly and then release it. A person also designs the virus's attack phase, whether it's a silly message or the destruction of a hard disk. . There are at least four reasons why
Words: 963 - Pages: 4