Saturday, March 14, 2020

Free Essays on Computer Viruses

Computer Viruses A computer virus is an illegal and potentially damaging computer program designed to infect other software by attaching itself to any software it contacts. In many cases, virus programs are designed to damage computer systems maliciously by destroying or corrupting data. If the infected software is transferred to or accessed by another computer system, the virus spreads to the other system. Viruses have become a serious problem in recent years, and currently, thousands of known virus programs exist (Reed 85-102). Three types of viruses are boot sector virus, file virus, and Trojan horse virus. A boot sector virus infects the boot program used to start the system. When the infected boot program executes, the virus is loaded into the computers memory. Once a virus is in a memory, it can spread to any floppy disk inserted into the computer. A file virus inserts virus code into program files. The virus then spreads to any program that accesses the infected file. A Trojan horse virus (named after a Greek myth) hides within or is designed to look like a legitimate program. Some viruses interrupt processing by freezing a computer system temporarily and then displaying sounds or messages. Other viruses contain time bombs or logic bombs. A time bomb is a program that performs an activity on a particular date. A logic bomb is a program that performs an activity when a certain action occurs, such as an employee being terminated. A worm, which is similar to a virus, copies itself repeatedly until no memory or disc space remains. To detect computer viruses, antivirus programs have been developed. Besides detecting viruses, antivirus programs also have utilities to remove or repair infected programs and files. Some damaged files cannot be repaired and must be replaced with uninfected backup files. The table below outlines some techniques used to protect computer systems. Table Techniques for Virus Protection and System Back... Free Essays on Computer Viruses Free Essays on Computer Viruses Computer Viruses A computer virus is an illegal and potentially damaging computer program designed to infect other software by attaching itself to any software it contacts. In many cases, virus programs are designed to damage computer systems maliciously by destroying or corrupting data. If the infected software is transferred to or accessed by another computer system, the virus spreads to the other system. Viruses have become a serious problem in recent years, and currently, thousands of known virus programs exist (Reed 85-102). Three types of viruses are boot sector virus, file virus, and Trojan horse virus. A boot sector virus infects the boot program used to start the system. When the infected boot program executes, the virus is loaded into the computers memory. Once a virus is in a memory, it can spread to any floppy disk inserted into the computer. A file virus inserts virus code into program files. The virus then spreads to any program that accesses the infected file. A Trojan horse virus (named after a Greek myth) hides within or is designed to look like a legitimate program. Some viruses interrupt processing by freezing a computer system temporarily and then displaying sounds or messages. Other viruses contain time bombs or logic bombs. A time bomb is a program that performs an activity on a particular date. A logic bomb is a program that performs an activity when a certain action occurs, such as an employee being terminated. A worm, which is similar to a virus, copies itself repeatedly until no memory or disc space remains. To detect computer viruses, antivirus programs have been developed. Besides detecting viruses, antivirus programs also have utilities to remove or repair infected programs and files. Some damaged files cannot be repaired and must be replaced with uninfected backup files. The table below outlines some techniques used to protect computer systems. Table Techniques for Virus Protection and System Back... Free Essays on Computer Viruses In the past decade, computer and networking technology has seen enormous growth. This growth however, has not come without a price. With the advent of the "Information Highway", as it's coined, a new methodology in crime has been created. Electronic crime has been responsible for some of the most financially devastating victimizations in society. In the recent past, society has seen malicious editing of the Justice Department web page (1), unauthorized access into classified government computer files, phone card and credit card fraud, and electronic embezzlement. All these crimes are committed in the name of "free speech." These new breed of criminals claim that information should not be suppressed or protected and that the crimes they commit are really not crimes at all. What they choose to deny is that the nature of their actions are slowly consuming the fabric of our country's moral and ethical trust in the information age. Federal law enforcement agencies, as well as commercial computer companies, have been scrambling around in an attempt to "educate" the public on how to prevent computer crime from happening to them. They inform us whenever there is an attack, provide us with mostly ineffective anti-virus software, and we are left feeling isolated and vulnerable. I do not feel that this defensive posture is effective because it is not pro-active. Society is still being attacked by highly skilled computer criminals of which we know very little about them, their motives, and their tools of the trade. Therefore, to be effective in defense, we must understand how these attacks take place from a technical stand-point. To some degree, we must learn to become a computer criminal. Then we will be in a better position to defend against these victimizations that affect us on both the financial and emotional level. In this paper, we will explore these areas of which we know so little, and will also see that comp uters are really extensions ...

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.