Preview

Danger of Malware

Good Essays
Open Document
Open Document
839 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Danger of Malware
Computer worms and viruses pose a clear and present danger for corporate and public information security in that as time and technology progress, the damaging effects this "malware" has on the network increases. Throughout this paper the term "malware" is used to define software that damages your system, causes instability, or exhibits antisocial behavior such as changing settings or interfering with a computer's registry and security settings. Typical examples include computer viruses or worms. Viruses are computer programs or scripts that attempt to spread from one file to another on a single computer and/or from one computer to another, using a variety of methods, without the knowledge and consent of the computer user. A worm is a specific type of virus that propagates itself across many computers, usually by creating copies of itself in each computer's memory. Many users define viruses simply as trick programs designed to delete or move hard drive data, which, strictly speaking, is not correct. From a technical viewpoint, what makes a virus a virus is that it spreads itself. The damage it does is often incidental when making a diagnosis.
The most common method used for spreading a virus is through e-mail attachments. The most common tool used to mitigate the risk and danger of this threat is using a virus scanner which attempts to scan a computer program before it runs. Another tool against viruses is common sense. Don't open an e-mail from an unknown or suspicious source unless you know the risk of opening the attachment. Avoid the risk of malware with the following:
• Keep your computer software current. Both the operating system and the anti-virus application must be updated on a regular basis.
• Only download updates from a reputable source.
• Always weigh the risks of installing something on your computer. This includes reading the fine-print license!
• Install and use a firewall.
• "Prevention is always better than cure." Businesses

You May Also Find These Documents Helpful

  • Powerful Essays

    Unit 7 P3 Research Paper

    • 1234 Words
    • 5 Pages

    Virus protection – virus protection protects a computer system from malicious viruses and Trojans and worms which you can be infected by through the internet or email or downloading files or through a USB flash drive etc. virus protection usually consists of a firewall, virus scanner, virus remover and spyware. With virus protection you can perform a scan on your computer to check if you have been infected by any viruses or Trojans or worms. With some virus protections software’s you can scan your computer then it will ask you if you want the viruses removed, also if any programs have been infected the virus protection will ask you if you want the infected program deleted, most virus…

    • 1234 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    In modern business, information and enterprise systems are becoming major backbones, relied upon for function, communication and longevity. Even smaller businesses have become dependent on computers for operations as well as management of information, from everything from billing, stock levels, to payroll. With the growing demand and need for computer systems and networks, issues begin to arise with systems security. Viruses, Trojan horses, worms, hackers, as well as internal security issues can plague a business. This paper will cover some of the basic concepts for system security, and possible threats.…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt280 Week 1 Homework

    • 359 Words
    • 2 Pages

    A. Enable content filtering and antivirus scanning at the entry and exit points of the internet. Enable workstation auto-scans and auto-quarantine for unknown file types.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Don’t run executable (.exe) files from unknown sources, including thoseattached to e-mail or downloaded from Web sites.…

    • 546 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab 2

    • 639 Words
    • 2 Pages

    1. What are the various types of malware? How do worms differ from viruses? Do Trojan…

    • 639 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Viruses have been around for a long time, and can render a system useless if not dealt with. New, more destructive viruses and worms are being unleashed exponentially. Reports indicate that 50 percent more virus attacks were launched in 2003 than the prior year. The January-March 2004 Mydoom virus outbreaks were the biggest the Internet has encountered to date.…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A virus is a small infectious agent that replicates only inside the living cells of other organisms. A virus is a small parasite that cannot reproduce by itself. Once it infects a susceptible cell, however, a virus can direct the cell to produce many more viruses. Viruses can infect all types of life forms, such as animals and plants to microorganisms, including bacteria and archaea.…

    • 1508 Words
    • 7 Pages
    Good Essays
  • Good Essays

    P3 and D1 Assignment 1

    • 1224 Words
    • 3 Pages

    The use of anti-virus is paramount and having the most up to date anti-virus software with a virus information file, a database with all the known viruses that could attack your computer and having the software regularly scans the computer system is very important. It keeps you up to date with your systems status and if a virus is detected, it will alert you straight away with it offering an option to quarantine the file, to repair a file, or to delete it.…

    • 1224 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Ais Ch. 11

    • 910 Words
    • 4 Pages

    2. Malware sent by email that can be a virus, Trojan horse, worms, logic bombs, or bots…

    • 910 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Unit5Dis1

    • 314 Words
    • 2 Pages

    4. Config file is available remotely therefore someone could use this file to change configuration and gain access to the system.…

    • 314 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Love Bug Research Paper

    • 1326 Words
    • 6 Pages

    They don’t know the half of it. The worm is where crap really hits the fan if you will. Going back to our best friend the love bug, that was actually a worm and not a virus. The biggest difference between the two,“A worm is a standalone program that doesn’t require user intervention to spread. Worms don’t infect existing files – they spread copies of themselves instead.” (Hoffman, 2012.) Meaning it does not need a host to leach onto spread. Also worms can be remotely accessed and used, viruses cannot. Worms typically use holes in the operating systems and back doors. Viruses need human interaction to be spread across computers whether it be sending a file by way of email or putting a file on a thumb drive. Though it does need to be physically transferred. In terms of how bad they are to a system and or network though it does differ. “Worms that spread over the network can generate a large amount of traffic, slowing down the network.” (Hoffman, 2012) A worm will make things run very slow may even make your computer restart multiple times. A virus can do similar things but a virus will corrupt files on your hard drive even possibly erase the entire thing. From what I’ve read granted the worm effects a lot more computers which for networked computers it would be a nightmare. I will have to say the virus sounds more dangerous. If your computer isn’t backed up or the important files are saved…

    • 1326 Words
    • 6 Pages
    Better Essays
  • Good Essays

    The most recent cyberattacks were laid against the Canadian government by Chinese hackers, who penetrated the computer systems of two key agencies, the Finance Department and the Treasury Board, forcing them offline. With advances in network collaboration tools, from email toSharePoint 2010, there is incredible potential for sharing and collaborating ideas and information. Unfortunately, malware can spread just as easily.…

    • 735 Words
    • 3 Pages
    Good Essays
  • Better Essays

    1. Viruses. "A Virus is a program that is activated by attaching copies of itself to executable objects. Viruses can reach your computer from other infected computers, via data medium (CD, DVD, etc.) or through a network (local or Internet)." (Symantec, 2013). Due to the shear frequency of virus attacks, we shall list them number one. According to a Department of Trade and Industry (DTI) survey, 72% of all companies received infected e-mails or files last year and for larger companies this rose to 83% (Vernon, 2004). The potential impact of the network becoming infected with a virus could be devastating. File destruction, file corruption, disabling user programs, loss of critical data and overloading the network are just a few of the potential impacts of a virus. Viruses can be introduced in to the network in many ways. Employees downloading /using unauthorized programs, opening and executing infected email attachments, bringing infected files from home on a thumb drive or CD, accessing the network with their smart phone,…

    • 1430 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Viruses: A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability. Viruses can damage and/or decrease the performance of the machine they “infect”.…

    • 555 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 7 Ethical Hacking

    • 293 Words
    • 2 Pages

    Updating the antivirus software with the latest virus definitions ensures the software has the latest information to…

    • 293 Words
    • 2 Pages
    Satisfactory Essays