Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Solution to computer viruses
Computer security against viruses
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Solution to computer viruses
Introduction This report will look at viruses. It will look at what a virus is and what they do it will also look at why people create viruses and for what purpose. The report will also look at examples of famous well known viruses and the ways you can defend against viruses. What is a Virus? Firstly this report will look at the definition of a computer virus. This definition taken from Microsoft (n.d.) tells us what a virus is “Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation.” This definition tells us that viruses are designed to spread from one computer to another this could be through email attachments sent between friends or a multitude of …show more content…
These are all very different reasons as to why someone may create a virus. Although usually they are motivated to do it by financial gain this could be done by stealing peoples bank passwords with a virus hidden in an email attachment that when opened records what people type and sends it to the virus …show more content…
However there are some viruses that are created as a bit of fun by some developers. An example given by Georgi Dalakov (n.d.) in an article on History-Computer.com is the Creeper virus. This virus was designed to not be destructive at all by deleting data or other things that would really affect the user but just displayed a message on the user’s screen which would be little more than an annoyance. The message that was displayed is “I’M THE CREEPER : CATCH ME IF YOU CAN”. This virus was created around 1970 by Robert Thomas before the term computer virus existed so some credit this as the first example of a self-replicating computer
I decided to read the book by David Harley called Viruses Revealed. This book goes into great detail about the different kinds of viruses and virus mechanisms, the solutions to these viruses, studies on different cases of viruses and then the social aspects of viruses. In the first part of the book, Harley talks about the problems with viruses. A virus is a program that infects other programs to modify them. “Infecting means that a virus will insert itself into the chain of command” (Harley). The virus structure was defined into three different parts: Infection, Payload, and Trigger. The infection is defined as the way or ways in which the virus spreads. The payload is defined as what the virus does besides duplicating itself. Trigger is defined as the procedure that decides whether or not the payload is necessary. Harley also talks about the difference between damage versus infection. The major difference between the two is that many users have infected documents or applications on their computer. Whether or not those applications are run is the difference between the two. In part one Harley also converses about Trojan Horses. Trojan horses are normally known as a virus, but he shoots that down. Harley says that Trojan Horses are normally not viruses, but just a worm that goes from computer to computer. After talking about different kinds of viruses and worms, he goes into Anti-Virus softwares. There are two different kinds of anti-viruses. One being virus-specific. Virus-specific means that every time a virus is found on your computer, it is identified but not detected. Generic scanners do the opposite. Generic scanners detect viruses but do not identify them.
Computers have become a big part of our lives. They are being used more and more and the Internet has brought with it a big amount of computer criminals. In 1988, Victoria created the first Australian computer crime laws.
Lately,there are many examples about how Computer Misuse Act preventing crime and facilitating a prosecution. Lewis Stephen Martin,21 years old, launched DOS attacks on the websites of Kent Police and universities of Oxford and Cambridge between 29 January and 2 February 2012. The police website and Cambridge University was offline more than an hour and Oxford University was offline aproximately 30 minuts. Giulty plea of unauthorised modification,unautorised access and obtained information without autorization. Sentenced to two years of imprisonment ( Computer Misuse Act 1990, s 1 : Unauthorised accesss, s 3 : Unauthorised modification; s 3A : Making, supplying or obtaining articles for use in offence under section 1 or 3 ).
"Why is a computer virus called a virus?." WikiAnswers. Answers Corporation, n.d. Web. 18 May 2014. .
Why do people pirate software? The obvious answer is: people want to use the software, but not pay for it. However, when we change the question slightly, to: “Why do people steal source code?” A variety of interesting answers can pop up. Possibly, the thief wants to modify the code, make copies of it, and proceed to sell it as his own creation -- for a profit. Or, perhaps the perpetrator is a raging open source advocate and he simply wants to examine the stolen code to improve his programming skills. As harmless as the latter may sound, it is still a clearly defined crime in virtually every hi-tech country in the world.1
Firstly, computers nowadays acquire many different types of infections. These infections range from viruses, to spyware and adware, to Trojan horses. The number of viruses in known existence exceeded 50,000 in 2001 and this number has grown daily since (“Number” 1). The good news here is the greater portion of viruses are not in circulation, but exist in archives and reference libraries for analysis (“Number” 1). Also, as for the most common viruses and those in virus libraries, anti-virus programs have a way to remove them. One difficulty users often face, is trying to figure out if a virus resides on their computer. Some viruses exist on a user’s computer without him / her knowing it for months before detection. Other viruses are immediately detectable and easily removed. Then the really nasty viruses make it apparent they’re on your
There are different types of computer crimes that many people become victims of every day. Computer crime is any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target ("Computer Crime: Chapter 2: What Are the Crimes? ", n.d.) - " Crimes such as data diddling, pump and dump, social engineering and spoofing are computer crimes. Even though these crimes are difficult due to privacy issues, the new technology has made investigations and prosecutions well organized and effective.
Legislation Computer Misuse Act 1990 What it is? Comptuer misuse act is an act which was released in 1990 , this was designed to protect users against accts and thefts of information, this information can include addresses, names, credit card details etc… Theres many offences that come under this act which include hacking, unauthroised access to computer with the intent of spreaching malicion software such as viruses. This act also includes the modification of computer software and data which include passwords , settings and other changes which affect the normal operation of the system.
In today’s days malware is designated as a software which aims to disturb a computer with the consent or permission of the owner. This term “Malware” is used by computer professionals to describe a varied forms of destructive, annoying and intrusive software code. This word “Malware” is used to indicate all types of malware which include a true set of viruses.
What is the “MALWARE”? A malware refers to software programs designed to damage or do other unwanted actions on a computer system. In Spanish, "mal" is a prefix that means "bad," making the term "bad ware" .Malware includes viruses, worms, Trojan horses, and spyware. Viruses, for example, can cause havoc on a computer's hard drive by deleting files or directory information. Spyware can gather data from a user's system without the user knowing it. This can include anything from the Web pages a user visits to personal information, such as credit card numbers.
The act was molded (8.1) to protect computer users from malicious attacks and information thieves which has (9)become a model for (10)several other cuntries, including Canada and the Republic of Ireland whom then with the (11)inspiration of the Computer Misuse Act 1990 created (12)their own information security laws to (13)deal with cybercrime. (13.1)Some of the offences under the Act are hacking, unautorised access to computer system and spreading malicious software with any purpose. (13.2)According to the Act it is an offence to acces to a
First and foremost, a virus is defined as a particle composed of protein, nucleic acid, and sometimes, lipids, which can reproduce itself only by infecting live cells. The reason why viruses are questioned if they are living or nonliving is if they exhibit all the characteristics of life. One of the questionable characteristics regarding a virus is reproduction. Living organisms have the capability to reproduce on their own, sexually or assexually. However, viruses reproduce by infecting living cells, therefore being dependant on something. Another reason of why viruses are questioned as living or nonliving is their genetic code. Even though they have DNA and RNA inside a protein coat, they don't have a nucleus or ribosomes to copy their genes,
“ Prevention is better than cure ”, if computer users are aware of Malware attacks, they may prevent those attacks . So, in this research paper i am going to focus on Malware and Protecting Against Malware.
Virus is one of the most common malware. Unlike spyware, virus is largely designed to harm useful programs or wreck down an entire operating system. There are many ways through which virus may enter a computer. The most common way is via email attachments. A...
Computer crime or Cyber Crime is defined as any type of crime that involves or regards a computer or computer network. Cyber Crime mainly means that the computer may be used as a tool in the commission of the crime or the computer may be the main target of the criminal’s crime. The rapid growth of technology and gadgets as well as the further de...