Preview

Computer Viruses of Today

Better Essays
Open Document
Open Document
3397 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Viruses of Today
LOMONOSOV MOSCOW STATE UNIVERSITY

Research paper for the Course of English

Computer viruses of today

Student:
Submission date:
Instructor:

The Faculty of Computational Mathematics and Cybernetics

The English Department

Moscow 2010
CONTENTS
INTRODUCTION 3
1 Essence of computer viruses 4
2 TYPES OF VIRUSES. 6
3 Antivirus software 11 CONCLUSION 13
References 14

Introduction For last decades the technology of the software has strongly changed. In this time, the software has made very much to help mankind, and now we use various software every day of our life. Some people may say they’re completely dependent on it. Every year, every month, new software comes with new ways to aid us, so in any time if a new need arises, we can count on new software being released for that specific purpose. While the software is created to make our daily life and career easier, there also exits software, which sole purpose is to do harm and hinder the daily routine of ordinary users. Such programs are commonly referred to as viruses. Malicious programmers write computer viruses for various reasons. Some of virus-makers do it just for fun, others write viruses for personal gain, many do it for fame. Computer viruses are a big problem not only for those people who works with computers, but also for those people who depends on the companies which use computers as well. A well-written malicious virus could halt production in companies. It could also make the stock market crashing in the course of an hour, or could make to make millions of innocent internet users be helpless as their Internet providers struggle with intensive system overloads from cleverly created viruses. Now in information press appears a lot of various reports about the emergence of new species of viral infection. But usually, there is an advertizing of means of active and

You May Also Find These Documents Helpful

  • Better Essays

    References: Last, F.M., Last, F.M., & Last, F.M. (YEAR). The article title: And the article subtitle. The Journal Title, vol#, page–page…

    • 944 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    The CNC Machinist: Quiz

    • 7255 Words
    • 53 Pages

    A virus is software that is written with malicious intent to cause annoyance or damage. Question options:…

    • 7255 Words
    • 53 Pages
    Powerful Essays
  • Powerful Essays

    • A COMPUTER VIRUS is a computer program that attaches itself to another computer program (known as the host program) and attempts to spread itself to other computers when files are exchanged. • Creating and disseminating computer viruses is one of the most widespread types of cybercrimes. Tens of thousands of new viruses or modified versions of old viruses are released each year. • Viruses normally attempt to hide within the code of a host program to avoid detection. Viruses, by definition, have a method to spread themselves. • Any computing device such as a smartphone, notebook, netbook, or iPad can be infected with a virus. Even your car, which now contains embedded computer systems, could catch a virus, especially if it connects to the Internet for software updates.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Powerful Essays

    BUS 520 Case 1 1

    • 1885 Words
    • 6 Pages

    The computer virus employees of Symantec Corp. are never able to enjoy a finished product. They are constantly collecting viruses and suspicious codes to analyze the way they work and to find a solution to prevent these viruses form damaging the public’s computers. They are determined to provide their consumers with updated versions of anti-viruses for their computers. At the Symantec lab, they have a box, which has all dangerous types of viruses that needs or be disposed of. Vincent Weafer has been a part of Symantec since 1999. In 1999, there were only a few employees at Symantec and that there were only a few viruses spread out through months compared to how it is now. Nowadays there are about 20,000 viruses monthly spread out, so more talented employees around the world work for Symantec. Vincent Weafer said that colleges are not creating computer security experts everyday so as soon as they find someone who does, that no matter in what country they hire him or her. The Blaster-B worm made Symantec employees work really hard and this proved that they needed more employees would be more talented towards fixing these problems. Each employee has their own job; some people are managers who are responsible for responding to new security threats, some write research papers, some develop tools that will be used to fight the viruses and even some who find out about the new viruses. Symantec never stops meaning that the labs switch when they are done for the day. Vincent Weafer wants to have a well-defined process for dealing with the viruses that are found every day.…

    • 1885 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Viruses have been around for a long time, and can render a system useless if not dealt with. New, more destructive viruses and worms are being unleashed exponentially. Reports indicate that 50 percent more virus attacks were launched in 2003 than the prior year. The January-March 2004 Mydoom virus outbreaks were the biggest the Internet has encountered to date.…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cybersecurity Trends

    • 530 Words
    • 3 Pages

    Every year, millions of viruses are released through the Internet. The FBI reports that there are a variety of cyber-threats, such as identify theft, Internet fraud and cyber-crimes related crimes like terrorism.…

    • 530 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Malware, Spyware & Adware

    • 2084 Words
    • 9 Pages

    From the early days of cracking passwords and stealing information from personal computers, to deadly Internet based attacks that can shake entire’s nation security, cyber crimes have evolved from the endeavors of entertainment by cyber kiddies to organized crimes and terrorist activities of cyber mafia. Virus Attacks, hacking, browser hijacks, spam, phishing and so on are various manifestations of malicious activities that have evolved on the internet in last couple of decades. Malware is one such tool that has emerged as a widely preferred choice to consummate criminal activities on the Internet.…

    • 2084 Words
    • 9 Pages
    Better Essays
  • Good Essays

    Norwalk Virus

    • 742 Words
    • 3 Pages

    As the summer season is in full gear now a particular virus is looming in the…

    • 742 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Malicious code is the term used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a computer or system without the owner’s knowledge or consent. There are much exploitation of vulnerabilities, like viruses, worms, Trojan horses, spyware, adware, and rootkits. Malicious code describes a broad category of system security terms that includes attack scripts, viruses, worms, Trojan horses, backdoors, and malicious active content. Malicious code is an application security threat that cannot be efficiently controlled by conventional antivirus software alone. Malicious code can either activate itself or activate after a user perform an action, such as clicking on something or opening an email attachment.…

    • 735 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It is the one who creates and modifies the program. This term has become became negative meaningful known as the person who benefit from the system by obtaining unauthorized access to systems and implementation of an unwanted and illegal. However, this term (hacker) can be called on the person who uses his skills to develop computer software and managing computer systems and the security of your computer. Viruses are programs that are able to replicate their structure or effect by integrating themselves or references to themselves, to the files or computer-based structures, which cannot be…

    • 898 Words
    • 4 Pages
    Good Essays
  • Better Essays

    a. A virus is a simple program that spreads by infecting files in areas of a computer or a router’s hard drive and then making copies of itself. Some viruses will do no damage but just spread form computer to computer and there are others that will destroy files. Viruses spread primarily through email messages and when people share portable media device, for example USB drives and floppy disks. (Virus 1)…

    • 1358 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    virus hunters

    • 358 Words
    • 2 Pages

    1. Keeping professionals excited about work that is routine and standardized and chaotic is a major challenge for Vincent Weafer. How could he use technical, human, and conceptual skills to maintain an environment that encourages innovation and professionalism among the virus hunters?…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Q1. Keeping professional’s excited about work that is routine and standardized and chaotic is a major challenge for Vincent Weafer. How could he use technical, human, and conceptual skills to maintain an environment that encourages innovation and professionalism among the virus hunters?…

    • 688 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Ict Computer Virus

    • 8423 Words
    • 34 Pages

    Account Name / Nama Akaun : ROZZANA CHUNG BINTI ABDULLAH Account No. No. Akaun Phone Number No.Telefon Reference No. No.Rujukan Statement Date Tarikh Penyata Billing Period Tempoh Bil Deposit Paid Cagaran Credit Limit Had Kredit : 1427453053 (new) : (017)2343026 : 352263813 : 17/08/2013 : 17/07/2013 - 16/08/2013 : RM0.00 : RM300.00…

    • 8423 Words
    • 34 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Beside, the whole society seem to be running in a strict mechanism which is facilitated by the computer system. If there appear a problem, this system will collapse rapidly. It can be easily seen many cases of computer hacking which cause great damage to the society and business, for example the virus " love" , originated in the Philippines caused great damage on the global scale in the United States and in south east Asia. The power of the damage is very strong.…

    • 366 Words
    • 2 Pages
    Satisfactory Essays