"Computer Viruses" Essay

394 words - 2 pages

Computer VirusesA computer virus is an illegal and potentially damaging computer program designed to infect other software by attaching itself to any software it contacts. In many cases, virus programs are designed to damage computer systems maliciously by destroying or corrupting data. If the infected software is transferred to or accessed by another computer system, the virus spreads to the other system. Viruses have become a serious problem in recent years, and currently, thousands of known virus programs exist.Three ...view middle of the document...

A file virus inserts virus code into program files. The virus then spreads to any program that accesses the infected file. A Trojan horse virus (names after the Greek myth) hides within or is designed to look like a legitimate program.Some viruses interrupt processing by freezing a computer system temporarily and then displaying sounds or messages. Other viruses contain time bombs or logic bombs. A time bomb is a program that performs activity on a particular date. A logic bomb is a program that performs an activity when a certain action occurs, such as an employee being terminated. A worm, which is similar to a virus, copies itself repeatedly until no memory or disk space remains. To detect computer viruses, antivirus programs have been developed. Besides detecting viruses, antivirus programs also have utilities to remove or repair infected programs and files. Some damaged files cannot be repaired and must be placed with uninfected backup files. The table below outlines some techniques used to protect computer systems.If your system becomes virus infected and you have questions, contact the National Computer Security Association (NCSA) for low-cost assistance.ØNational Computer Security (NCSA).ØNorton Antivirus Protection Software.

Other Essays On "Computer Viruses"

Advantages and Disadvantages of Networking - South University - Assignment

2848 words - 12 pages robustness. Hey, remember that system shutdown from the one main computer we talked about earlier? Well, it still is down. In the event that it still remains down, many networking systems use a computer port as a file server. In this type of system, the settings and maintenance become easier to maintain…but not completely foolproof. Computer viruses and Malwares. The concept of computer viruses and diverse malwares are just as common today than they

Window XP Outline

820 words - 4 pages back to a selectable date* Recovery Console allows administrators to perform advanced recovery tasks* User State Migration provides a convenient mechanism to move user setting to a new computer* Safe Mode options are available to troubleshoot startup problems* Application Compatibility enhancements allows XP to run hundreds of programs that Windows 2000 failed to operate* Automatic install and update latest security and software from Microsoft

Cisco networking and computer assessment - Varsity - Assignment

3360 words - 14 pages viruses and spyware. · Remove unwanted or unused programs. · Scan hard drives for errors. · Optimize (defragment) hard drive Clean the Case and Internal Components It is important to keep the computer case and internal components clean. The amount of dust and other airborne particles in the environment and the habits of the user determine how often to clean the computer components. Regularly cleaned (or replaced) air filters in the building in

IT & Management (Subject) 1st Year College Risks And Responses Associated With IT Systems

933 words - 4 pages purchasing departments when need be.Identify & describe four key points, which should form the basis of an organisation's computer usage policy.1The first aspect of any computer usage policy should include steps educating users of the threat to the organisation from viruses, worms and other hostile programming code. Complete with either guidelines or regulations, regarding the updating of antivirus software, personal usage disks/email and downloads

Organizational Ethical Analysis Paper - Ethical leadership - essay

2296 words - 10 pages enough to make investments more in R&D to preserve their leading position, and their gross income margin is an excellent 46 % (Li 2012). Apple’s strength is in its differentiated products. Apple’s computer operating system is highly secured and is not subject to viruses and hackers which tend to affect the Windows software of Microsoft. Moreover, Apple’s products are designed to address the worries approximately clients’ lifestyles which make the

The fight against cyber security threat - SERC Access - Essay

783 words - 4 pages crucial to be educated on the associated risks. The aim of this assignment is to highlight these risks, and to offer advice on how to minimise them when using connectable devices. Internet related cyber-attacks are on the increase and it is the most common connection type to be targeted (Landi, 2018). This is most likely due to the numerous ways to connect with someone else’s Computer, Smartphone, Tablet etc. Security expert Mathy Vanhoef discovered

Submissions quizzes for many courses at Seneca - Seneca - Assignment

2099 words - 9 pages Quiz Submissions - Quiz 3 - Chapter 3 Top of Form (username: se-) Attempt 1 Written: Oct 27, 2018 4:36 PM - Oct 27, 2018 4:55 PM Submission View Your quiz has been submitted successfully. Quiz 3 - Chapter 3 Question 1 1 / 1 point Scenario 3-1 Workers in nursing homes regularly experience a number of physical and psychological health and safety issues. Incidents can involve twisting and/or lifting injuries, contact with viruses and bacteria, as

Climate Change and cyber security - English - Essay

2220 words - 9 pages to critical infrastructure and information risk. The correlation can assist companies to come up with successful cybersecurity policies. In the virtual space, firewalls, computer servers, routers and related technology rest at the utmost border, or edge, of a secure computer network. These cyber tools create a borderline between susceptible internal sources and external networks, and hackers time and again concentrate on getting through these

Information Technology In Banking And Financial Institutions

1614 words - 7 pages these professional hackers. That is why banks should not only invest in providing new I.T. based services but they should also invest in a good security system to protect themselves and their customers against viruses, spyware, keystroke loggers and eavesdropping programs.Information technology does not always mean fewer costs for banks to operate, but it has become a necessity in today's competitive market. This showed very clearly when visiting

DAZZLING JEWELRY

3388 words - 14 pages places.DisadvantagesSecurity; Security continues to be a problem for online businesses. Customers have to feel confident about the integrity of the payment process before they commit to the purchase, Frauds are not completely eliminated in the e-commerce transactions. System and Data integrity ; Data protection and the integrity of the system that handles the data are serious concerns. Computer viruses are rampant, with new viruses discovered every day. Viruses

Informtion snd tecnolodgy future with aertifical inteligency - school - assignment

1810 words - 8 pages addressed by machine learning, including user monitoring, spam filtering, zero-day attack identification, risk analysis, and many more d) With the pace and amount of cyber attacks, human intervention is simply not sufficient for timely attack analysis and appropriate response. The fact is that the most network-centric cyber attacks are carried out by intelligent agents such as computer worms and viruses; hence, combating them with intelligent semi

Similar Papers

Anti Virus Software Essay

602 words - 3 pages fortified with Private IE privacy manager. Software safeguards by wiping out all the sensitive documents on your computer. The software fights against identify theft by deleting the Internet History, cookies, and cache files. It will also delete your recent documents. The software will stop computer fraud and online fraud by fighting spyware viruses, Trojans, and worms that may be on your computer without a person's knowledge. E-mail fraud is one of the

Internet Crimes Informative Speech Burges High School Informative

407 words - 2 pages anyone. Cybercrime begins as a way for hackers to break into computer networks either for fun or to access classified information. This led to the spread of viruses that were able to cripple and disrupt the computers’ network operations. This causes a malware to infiltrate the computer system without the owner’s consent and steals confidential information. As a matter of fact, this is very popular, now that there is no physically confrontation

Stress And Lifestyle The Problems College Essay

627 words - 3 pages stress like drinking and smoking.  A Study by Cohen - Cohen did a study with 394 participants where he had their stress index measured using questionnaires, which took in account their ability to cope and their feelings about stress. Then they were given nasal drops that infected them with the cold viruses and then were tested by a doctor to see if they had caught the cold viruses. The results showed that there was a link between their stress

Spyware Essay

554 words - 3 pages Spyware is a universal phrase used for software that executes certain behaviors such as advertising, collecting personal information, or changing the configuration of your computer, usually without properly acquiring your permission. Spyware is often associated with software that displays advertisements, known as adware. Adware is considered any software application in which advertising banners are displayed while the program is running. Adware