¶ … computer virus is among the greatest enemy of computer technology's globalization. In just a few split of seconds, it can turn our endeavor of automating our diverse activities into a nightmare. This is especially a catastrophe to businesses whose operation at a large percentage depends on computerized data access and retrieval. Globally, computerization is the trend among businesses. Thus, the damage that computer viruses can cause is a global threat and problem to the stabilization and progress of businesses and economy.
There are many types of computer virus. Almost everyday, a new computer virus is created. Since the emergence of computer networks, such as LAN, WAN, and the Internet, there has been quite a number instance where a computer virus had infected and brought damage to a great amount of information and data globally. As a consequence, many businesses are paralyzed when a computer virus attacks.
Purpose
This paper aims to provide useful information about computer viruses. By exploring the different types of a computer virus, the different existing viruses classified in each type, and the damage each virus can do to system data and files, this paper aims to provide the necessary and possible prevention tools and techniques to avoid the risks a computer virus can bring. It aims to provide a well researched and well presented report that draws clear conclusions and offers solid recommendations about the ways to handle virus threat.
1.2 Sources
The sources that will be used in this research paper will come from online literatures, journals, and recent researches and studies. These sources, especially the use of the Internet, are ideally beneficial for this research paper because of the wide-range of information that they generally provide.
This research paper will gather essential information pertaining to computer viruses and integrate them into a useful reading material and reference.
1.3 Authorization
For future recommendation of anti-virus softwares, it is essential that the user will obtain a licensed and authorized copy of the software. Basically, in this research study, the only subject that needs authorization is the use of legal copies of software.
2. Conclusion
Computer viruses are threats to computer systems and data. The usual purpose why viruses are being created is to maliciously damage computer systems and data. Those that are in greater risk of being attacked by a computer virus are computer systems that are connected to a network. This includes the LAN, WAN, and the Internet connections. To prevent from being infected by a computer virus, it is a critical standard operating procedure to implement anti-virus softwares. It is essential to provide computer systems with effective security tools that block viruses from infecting computers. Moreover, having the knowledge on the different viruses that exist and the corresponding ways to handle them is important.
3. Recommendation
Pertaining to the computer systems that are connected to a network, may it be a LAN, WAN, or the Internet, this research recommends that any computer connected to a network be equipped with anti-virus software and network security systems. In the growing demand of being connected to a network, these simple preventions are important to prevent the risk of becoming victims of holes in technology. On the other hand, pertaining to future researches that will be conducted on computer viruses, it is recommended that a list of further viruses as well as the necessary techniques to prevent or solve the problems they may cause be provided to the readers. This is important since almost everyday new computer viruses emerge.
4. Threats to Local Area Networks (LAN)
There are different types of threats to local area networks. Some of which are threats on the existence of computer data itself while some are threats on the security of computer systems across a network. An example of data threats are computer viruses, worms, and Trojan horses, while an example of threats on computer systems' security are the crackers. Following is a discussion of these types of threats to local area networks.
Computer Viruses
What is a computer virus? Mark K. Brouwer, in his Virus or Hoax? online, defines a computer virus as program which reproduces its own code by attaching itself to other programs in such a way that the virus code is executed when the infected program is executed.
A they have an infection phase where they reproduce widely, and an attack phase where they do whatever damage they are programmed to do.
Boot Sector
Before discussing what a boot sector virus is, it is important to have an overview...
Security Information is the Power. The importance of collecting, storing, processing and communicating the relevant information presently is viewed as crucial in order to achieve success in almost all the fields be it business firms, individuals or organizations. An integrated set of components assisting collection, store, process and communication of information is termed as information system. Increasing dependence on information systems is noticed in order to excel in the respective fields
S. Department of Defense (DOD) uses over two million computers and more than ten thousand local area networks, most of which are linked to, and vulnerable to attack from, users of the larger Internet. (2008, p. 276) These increasing threats correspond to the growing reliance on information systems to manage the entire spectrum of modern commerce and energy resources, making the disruption of a single element in the integrated system a
The increasing skill of these terrorists in using cyberspace has led some officials to believe that they are on the point of using computers for increasing bloodshed. This new threat is not similar to hackers' earlier using computers for passing viruses and worms. This has now reached a level of being able to reach the meeting point of computers and physical structures controlled by computers. The belief of analysts
Technology and Project Management The Politics of Technology Technology today is such an integrated part of life that it has become inseparable from everyday activity. Indeed, it affects all areas of life, including general public life, professional life, schooling, and politics. In this regard, Cohen (2003) mentions that technology, when combined with politics, could become something of a double-edged sword. Terrorism, for example, could become particularly sophisticated. Enemies of the country, for example,
Accounting and Intrusion Detection In a report issued by Paladin Technologies, Inc., entitled: "Security Metrics: Providing Cost Justification for Security Projects," 273 organizations were surveyed on the topic of security. The report illustrates in quantifiable terms the depth and reach of intrusion detection on the financial viability of the organization. The combined reported losses from the firms surveyed totaled $265.6 million in 1999. The highest loss categories were reported as follows: Type
Contemporary Cyber-warfare Cases Studies In 2011, the Center for Strategic and International Studies published Significant Cyber Incidents Since 2006 (Lewis, 2011) as part of its Cyber and Internet Policy, Technology and Public Policy Program. Among the incidents detailed in that report, referenced by their year of occurrence: 2007 After officials in former-Soviet Estonia removed a World War II memorial from its capital city of Tallinn in the Spring of 2007, a large-scale cyber-attack
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now