Preview

Antivirus: Is It Still the Hero that It Once Was?

Better Essays
Open Document
Open Document
1358 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Antivirus: Is It Still the Hero that It Once Was?
Shaswat Shrestha
Period 3
January 31, 2013
Antivirus: Still the hero that it once was? I. Introduction
In today’s world almost every home in the world has at least one computer. Computers have become a very beneficial tool; however there are many malicious programs that can harm computers, for example viruses, Trojans, and worms. We use different tools to protect computers such as antivirus software. Even with antivirus software viruses find a way to get in computer. The primarily reason is because many viruses are becoming more sophisticated to the point where the viruses attacking the antivirus software itself. (Latamore 24) Or the problem could be the type of method that is used by the antivirus and is affecting its performance. Because viruses and other harmful program are evolving to the point where antiviruses cannot stop them, people need to learn how to prevent viruses form entering their computer and how to have a clean computer. II. There are different types of viruses that can attack computers; every type of virus has its own specialty. a. A virus is a simple program that spreads by infecting files in areas of a computer or a router’s hard drive and then making copies of itself. Some viruses will do no damage but just spread form computer to computer and there are others that will destroy files. Viruses spread primarily through email messages and when people share portable media device, for example USB drives and floppy disks. (Virus 1) b. A worm is a type of virus that take up valuable memory that can cause a computer to stop responding and allow attackers to access the computer remotely.(Virus 4) for a worm to enter a computer there needs to be a system weakness for it to replicate, often spreading from computer to computer .(Worms) i. One of the most famous worms was made by a man name Robert Morris, it caused major havoc on the internet. He used three separate attacks, one was rsh, and this is a spawn process on a

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1330 Unit 3 Quiz Essay

    • 5533 Words
    • 23 Pages

    | d. A worm can replicate itself and does not need a host for distribution.…

    • 5533 Words
    • 23 Pages
    Satisfactory Essays
  • Satisfactory Essays

    13) What worm was released in 2001 and primarily defaced web sites? C) Code Red…

    • 284 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Mat 540 Quiz

    • 3391 Words
    • 14 Pages

    | Antivirus software can detect and eliminate viruses that are trying to enter your system. Answer…

    • 3391 Words
    • 14 Pages
    Good Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    Malicious software, referred to as malware, can contain a variety of threats, from data loss to system failures. There are several types of worms, viruses, Trojan horses and spyware, which can be delivered in a variety of ways. Computer viruses are a type of software or executable file that attaches itself to other programs to be uses. Viruses can cause system failures, rewrite hard drives, or destroy files and programs. Worms are similar to viruses, but are independent programs, rather that attaching to others. Viruses have a tendency to spread more rapidly over networks and through e-mail. Trojan horses are based off their namesake, in which they appear to benign types of programs, but when executed can introduce malware into your system. Spyware is programing that can track computer use. Forms of…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lab 2

    • 639 Words
    • 2 Pages

    1. What are the various types of malware? How do worms differ from viruses? Do Trojan…

    • 639 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Computer program that can copy itself and infect a computer. The term ‘computer virus’ is sometimes used as a catch-all phrase to include all types of malware, including true viruses.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    The CNC Machinist: Quiz

    • 7255 Words
    • 53 Pages

    A virus is software that is written with malicious intent to cause annoyance or damage. Question options:…

    • 7255 Words
    • 53 Pages
    Powerful Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    There are cybercriminals who commit crimes using the computers and networks. They spread malicious viruses through the networks such as worms and Trojan horses. They hack other people's computers to steal important data and identity or destroy data. A hacker uses a packet sniffer to intercept the unencrypted network traffic and capture the passwords or other important information which was communicated through the network. Botnet or a Zombie computer is a computer which a hacker uses to spread viruses and to commit cybercrimes while the owner of the computer is unaware of it.…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Module 4 Blank Study Guide

    • 2907 Words
    • 12 Pages

    1. How does the spreading of a computer virus compare to the spreading of human viruses?…

    • 2907 Words
    • 12 Pages
    Satisfactory Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Final Exam Paper

    • 491 Words
    • 2 Pages

    True or False: A computer worm consists of segments of code that perform malicious actions.…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    A virus is a small capsule that contains DNA or RNA, viruses, unlike bacteria are not self sufficient and need a host in order to reproduce I.E a human body.…

    • 1131 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Love Bug Research Paper

    • 1326 Words
    • 6 Pages

    They don’t know the half of it. The worm is where crap really hits the fan if you will. Going back to our best friend the love bug, that was actually a worm and not a virus. The biggest difference between the two,“A worm is a standalone program that doesn’t require user intervention to spread. Worms don’t infect existing files – they spread copies of themselves instead.” (Hoffman, 2012.) Meaning it does not need a host to leach onto spread. Also worms can be remotely accessed and used, viruses cannot. Worms typically use holes in the operating systems and back doors. Viruses need human interaction to be spread across computers whether it be sending a file by way of email or putting a file on a thumb drive. Though it does need to be physically transferred. In terms of how bad they are to a system and or network though it does differ. “Worms that spread over the network can generate a large amount of traffic, slowing down the network.” (Hoffman, 2012) A worm will make things run very slow may even make your computer restart multiple times. A virus can do similar things but a virus will corrupt files on your hard drive even possibly erase the entire thing. From what I’ve read granted the worm effects a lot more computers which for networked computers it would be a nightmare. I will have to say the virus sounds more dangerous. If your computer isn’t backed up or the important files are saved…

    • 1326 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    • A COMPUTER VIRUS is a computer program that attaches itself to another computer program (known as the host program) and attempts to spread itself to other computers when files are exchanged. • Creating and disseminating computer viruses is one of the most widespread types of cybercrimes. Tens of thousands of new viruses or modified versions of old viruses are released each year. • Viruses normally attempt to hide within the code of a host program to avoid detection. Viruses, by definition, have a method to spread themselves. • Any computing device such as a smartphone, notebook, netbook, or iPad can be infected with a virus. Even your car, which now contains embedded computer systems, could catch a virus, especially if it connects to the Internet for software updates.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Good Essays

    CyberSecurity

    • 754 Words
    • 3 Pages

    A segment of self-replicating code planted illegally in a computer program, often to damage or shutdown a system or network.…

    • 754 Words
    • 3 Pages
    Good Essays