top-rated free essay

Computer Threats

By naiffatma Mar 30, 2010 944 Words
My speech will be related to an important echo that face technology with is computer threats. I will cover some of important threats that face most of us; I will tell you how to protect your computer from threats, how to deal with hackers, crackers and what to do if your computer was attacked.

The most popular threat that face computers are viruses,
A virus is a program written intentionally to change the way your computer operates without your permission or knowledge. Their behavior is similar to how real-life biological viruses work, and the ways of dealing with them can be quite similar as well! A virus attaches copies of it to other files such as program files or documents and is inactive until you run an infected program or open an infected document. When activated, a virus may damage or delete files, cause erratic system behavior, display messages or even erase your hard disk. Maybe all of you know these information about computer viruses ,but do you know what was the first virus appeared in the world , who created it He is Richard Skrenta( showing his picture in the powerpoint)

Other type of threats are Worms

They are the most effective and dangerous threats because they replicate and spread by them self without even opening the file, hackers often use this type to gain access to the computers that they infect. Worms can also spread by copying themselves from disk to disk or by email. The most dangerous worm ever created is I LOVE YOU worm. It was first noticed in Philippines on May 4 2000 and then spread all over world in just one day! Affecting 10% internet users all around the world and causing loss of about $5.5 billion. It arrives in email inbox with subject “ILOVEYOU”. It had an attachment “LOVE-LETTER-FOR-YOU.TXT.vbs”. Also, it sent the worm to everyone on victim contact list. Although, worm spread very fast. Only windows users were affected.

The other type of threats is Trojan horse;
Trojan horses are programs that appear to serve some useful purpose or provide entertainment; it looks like an interesting program with a beautiful link. It’s mostly annoying but some times it damages files. I will show you how it’s done briefly…( in the computer)

I talked to you about some of the threats; and know I will tell you how to protect your self from them

1. Never open an e-mail, attachment, or click on an e-mail link from any unknown source.

2. Use antivirus software that includes e-mail scanning. I recommend Kaspersky Anti-Virus 2010(have a sample and show the students) or Shield Deluxe anti virus

3. Install a firewall on your computer.

4. Change your password regularly and create a smart password with different characters. 5. Always back up your system in case your computer was attacked you not lose your data.

But what if your computer was attacked, what you will do if you faced a hacker or your e-mail was stolen. Don’t worry I will tell you what to do

Bad news—you've suffered a virus attack. Take a few seconds to get over the initial shock, but only a few seconds. =) It can quickly go through your system, destroying files, corrupting data, rendering applications useless, and in general causing many problems. You need to act immediately. Follow the steps below to remove the virus and restore your. - First of all disconnect the machine from the network to not infect other computer. - Once the computer has been disconnected, you need to remove the virus by cleaning up the system Use virus removal tools written for the specific virus causing the damage. - If your operating system is completely destroyed, you'll need to reinstall. Use the 'quick restore' CD that came with your computer to restore your computer to its original configuration. - Scan for viruses. After restoring, scan your entire network from viruses.

It is very easy to deal with a virus but what if you had to deal with a haker a person who breaks into computers or a cracker a person who steals passwords. But just be aware that not all hackers are dangerous or have bad intention some times they just do it for fun. I am going to try (only trying) to come up with some good ways to either force the hacker to leave or have them leave legally. - First off all, just try to avoid them

- When you are not using your computer, disconnect it from the Internet. One of the worst things that can happen is when a hacker breaks into your computer and you don't even know it - Never post your IP address in a public place. This is like inviting a hacker to your door. Once they know your Internet Protocol address (four numbers divided by periods e.g. 168.320.001.01) they can begin hacking you. - but if your computer is already been hacked , just report hacking by taking a recording and screenshots. Don't be afraid of being targeted.

In conclusion , computer threats maybe not as important as some of other topics discussed . but still just as real ! will viruses kill anyone?..probably not. Will they cause an epidemic? I doubt it. But computer threats are larger threats to society than most people realize. Therefore , weather you are writing a college report or your saving your best friend picture, just remember what are the threats that can in a blink destroy everything . so write away protect yourself because you never know when you'll be attacked.

[pic]

Cite This Document

Related Documents

  • The Threats to an Accounting Information System

    ...I. Introduction The report provides basic knowledge about “safeguarding assets” and explain in what way MYOB can help Mark firm achieves the term. Following that the report will address internal & external threats associated with a small business for Mark – owner of Dive for Fun Pty Ltd – as well as giving suggested solutions for each ...

    Read More
  • Internet Security Threats

    ...This paper is going to be on the different security threats on the internet, and the different ways to prevent and protect yourself from them. The different threats that are going to be covered are viruses, trojan horses, hackers, spam, corrupt IP packets, port scanner attacks, DOS(denial of service) attacks, spider attacks, worms and socail...

    Read More
  • Computer System: Security Threats and Defenses

    ...Security threats and defenses Amanda Knight BSA / 310 July 8, 2013 Ivon Young Security threats and defenses The thing about not having any kind of anti-virus protection can destroy a computer’s system. You need to have an anti-virus protection on the computer so that you know the information that is stored is safe and also know t...

    Read More
  • A Computer Virus Is a Computer Program That Can Copy Itself

    ...A computer virus is a computer program that can copy itself[1] and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when i...

    Read More
  • Computer Security Risk for Home Users

    ...Computer Security Risk for Home Users BUIS 260 11/7/2011 BUIS 260 November 6, 2012 Computer Security Risk for Home Users This history of computers started long before it emerges in the 20th century. Computer was a man made device that acts as string from mechanical inventions and mathematical theories towards the modern concepts and m...

    Read More
  • Essay on Computer Virus

    ...Computer viruses are, like their biological namesake, programs that infect your system and multiply. Viruses have many symptoms: some can simply slow down your computer whilst others can have more severe effects like moving documents and/or deletion of documents or programs. No matter the severity of the virus and its symptoms they should be dea...

    Read More
  • IMP Definition(Computer Science)

    ...Computer Science 2210 (Definitions) By: Talal Ahmad Adware is a program installed without a user's consent or knowledge during the install of another program.. There basic function is to advertise companies. Add-on is any third-party software program or script that is added to a program that enhances the program by giving it additional feature...

    Read More
  • Computer Viruses Compilation

    ...other programs on the same computer. A computer virus is an executable program. Depend on the nature of a virus, it may cause damage of your hard disk contents, and/or interfere normal operation of your computer. By definition, a virus program is able to replicate itself. This means that the virus multiplies on a computer by making copies of i...

    Read More

Discover the Best Free Essays on StudyMode

Conquer writer's block once and for all.

High Quality Essays

Our library contains thousands of carefully selected free research papers and essays.

Popular Topics

No matter the topic you're researching, chances are we have it covered.