Preview

Computer Viruses: Past, Present and Future

Better Essays
Open Document
Open Document
4808 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Viruses: Past, Present and Future
Computer Viruses: Past, Present And Future

In our health-conscious society, viruses of any type are an enemy. Computer viruses are especially pernicious. They can and do strike any unprotected computer system, with results that range from merely annoying to the disastrous, time-consuming and expensive loss of software and data. And with corporations increasingly using computers for enterprise-wide, business-critical computing, the costs of virus-induced down-time are growing along with the threat from viruses themselves. Concern is justified - but unbridled paranoia is not. Just as proper diet, exercise and preventative health care can add years to your life, prudent and cost-effective anti-virus strategies can minimize your exposure to computer viruses.

· A history of computer viruses
· Who writes viruses - and how they can reach you
· The early warning symptoms of virus infection
· The real numbers behind the growth of viruses and their costs
· How viruses work - and how virus protection can stop them

What, Exactly, Is A Computer Virus?

A computer virus is a program designed to replicate and spread, generally with the victim being oblivious to its existence. Computer viruses spread by attaching themselves to other programs (e.g., word processors or spreadsheets application files) or to the boot sector of a disk. When an infected file is activated - or executed - or when the computer is started from an infected disk, the virus itself is also executed. Often, it lurks in computer memory, waiting to infect the next program that is activated, or the next disk that is accessed.

What makes viruses dangerous is their ability to perform an event. While some events are harmless (e.g. displaying a message on a certain date) and others annoying (e.g., slowing performance or altering the screen display), some viruses can be catastrophic by damaging files, destroying data and crashing systems. How Do Infections Spread?

Viruses come from a variety of sources. Because a

You May Also Find These Documents Helpful

  • Good Essays

    A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going.…

    • 787 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Is3440

    • 534 Words
    • 3 Pages

    system or kernel to load when the computer starts. It is very important to lock this down because of the high access…

    • 534 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    • A COMPUTER VIRUS is a computer program that attaches itself to another computer program (known as the host program) and attempts to spread itself to other computers when files are exchanged. • Creating and disseminating computer viruses is one of the most widespread types of cybercrimes. Tens of thousands of new viruses or modified versions of old viruses are released each year. • Viruses normally attempt to hide within the code of a host program to avoid detection. Viruses, by definition, have a method to spread themselves. • Any computing device such as a smartphone, notebook, netbook, or iPad can be infected with a virus. Even your car, which now contains embedded computer systems, could catch a virus, especially if it connects to the Internet for software updates.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1330 Unit 1

    • 345 Words
    • 2 Pages

    It is important to learn the various ways how the malwares, malicious files like the ones in context enters an unprotected PC system.…

    • 345 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 7 Ethical Hacking

    • 293 Words
    • 2 Pages

    It places the virus in a Virus Vault which is a quarantine area where all removed files, viruses go.…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3

    • 3151 Words
    • 13 Pages

    system. That is why one may have problems when booting from a floppy when a…

    • 3151 Words
    • 13 Pages
    Good Essays
  • Satisfactory Essays

    Payload is defined as the malicious activity that is a result of the activation of a computer virus. The CIH virus was designed to overwrite the machine’s BIOS program code, while still leaving it fully intact. The BIOS code is fundamental because it directly accesses hardware to test system memory and disk drives whenever the computer is booted. This is how the local disk is able to load the operating system at boot, and generally most [newer Windows OSs] will store the BIOS on write-able RAM memory to allow updates when available – hence a more secure network. CIH also disabled Font Removal and created conflict problems in the computer’s TCP/IP protocol.…

    • 418 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Chapter 18 WOS review

    • 590 Words
    • 3 Pages

    Which type of malware can hijack internal windows components and often goes undetected because it is already loaded when the anti software loads?…

    • 590 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    A major university opened a new computer lab for their Business School students. Due to the large number of students enrolled in the business school the computer lab had an overwhelming demand. The business school computer was unable to meet the overwhelming demand s the students needed to the computer lab. Therefore, Rod Stevenson, the director of the Student Computer Center decided to hold focus groups. The objective of the focus group was to determine overall student satisfaction with the lab, identify current problem areas and collect student recommendations for improvements.…

    • 544 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cis 207 Week 2/3 Quiz

    • 383 Words
    • 2 Pages

    4. The computer operating system starts the “boot sequence” using information retrieved from the boot sector of a drive(this can be a HDD, USB stick, etc) True…

    • 383 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    A general term for software that is designed to destroy or disrupt data or do other unwanted actions in a computer system.…

    • 1399 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    A part of a program that remains idle until some date or event occurs and then is activated to cause havoc in the system is a…

    • 997 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Laudon Mis 6ce Ch08

    • 13779 Words
    • 64 Pages

    4) A computer bacteria is a rogue software program that attaches itself to other software programs or data files in order to be executed, usually without user knowledge or permission.…

    • 13779 Words
    • 64 Pages
    Satisfactory Essays
  • Good Essays

    History of Computer Virus

    • 7464 Words
    • 30 Pages

    There are lots and lots of opinions on the date of birth of the first computer virus. I know for sure just that there were no viruses on the Babbidge machine, but the Univac 1108 and IBM 360/370 already had them ("Pervading Animal" and "Christmas tree"). Therefore the first virus was born in the very beginning of 1970s or even in the end of 1960s, although nobody was calling it a virus then. And with that consider the topic of the extinct fossil species closed.…

    • 7464 Words
    • 30 Pages
    Good Essays
  • Good Essays

    ms dos

    • 2589 Words
    • 11 Pages

    It searches for the operating system and, when located, loads it into the main memory.…

    • 2589 Words
    • 11 Pages
    Good Essays

Related Topics