Preview

It205 Capstone Question

Satisfactory Essays
Open Document
Open Document
633 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It205 Capstone Question
Capstone Assignment: Systems Security
Name
IT/205
December 16, 2012
Professor

Systems Security
In modern business, information and enterprise systems are becoming major backbones, relied upon for function, communication and longevity. Even smaller businesses have become dependent on computers for operations as well as management of information, from everything from billing, stock levels, to payroll. With the growing demand and need for computer systems and networks, issues begin to arise with systems security. Viruses, Trojan horses, worms, hackers, as well as internal security issues can plague a business. This paper will cover some of the basic concepts for system security, and possible threats.
Estimated losses from malicious programs and viruses have been estimated in the billions of dollars. The costs come not only from theft of funds or information, but also the manpower and resources that it takes to find, track, and remove malicious programs, as well as replace programs or files damaged or removed. If you add in trust issues and loss of business from consumers because of data loss, the effects can be long lasting and even devastating to a business.
Malicious software, referred to as malware, can contain a variety of threats, from data loss to system failures. There are several types of worms, viruses, Trojan horses and spyware, which can be delivered in a variety of ways. Computer viruses are a type of software or executable file that attaches itself to other programs to be uses. Viruses can cause system failures, rewrite hard drives, or destroy files and programs. Worms are similar to viruses, but are independent programs, rather that attaching to others. Viruses have a tendency to spread more rapidly over networks and through e-mail. Trojan horses are based off their namesake, in which they appear to benign types of programs, but when executed can introduce malware into your system. Spyware is programing that can track computer use. Forms of



References: Laudon, K. C., & Laudon, J. P. (2011). Essentials of MIS. Prentice Hall. Osborne, C. (2012, October 12). Anonymous declares war on Wikileaks. Retrieved Dec 13, 2012, from ZDNet.com: http://www.zdnet.com/anonymous-declares-war-on-wikileaks-7000005670/

You May Also Find These Documents Helpful

  • Good Essays

    Viruses, worms, and Trojans are malicious programs which enter to your computer without your permission and knowing that can cause damage, information losses, and privacies leak to your computer. They can also slow down the Internet connections, and they might even use your computer to spread themselves to your friends, family, co-workers, and the rest of the internet.…

    • 1274 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Danger of Malware

    • 839 Words
    • 4 Pages

    Viruses are computer programs or scripts that attempt to spread from one file to another on a single computer and/or from one computer to another, using a variety of methods, without the knowledge and consent of the computer user. A worm is a specific type of virus that propagates itself across many computers, usually by creating copies of itself in each computer's memory. Many users define viruses simply as trick programs designed to delete or move hard drive data, which, strictly speaking, is not correct. From a technical viewpoint, what makes a virus a virus is that it spreads itself. The damage it does is often incidental when making a diagnosis.…

    • 839 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Dictionary.com defines a computer virus as “a segment of self-replicating code planted illegally in a computer program, often to damage or shut down a system or network (“Virus,” 2012).” The term virus has become more generic over the years and has come to represent any type of malware, or malicious software. There are many types of malware that can be classified as viruses but it is the intention of this paper to examine 8 of the most common types. These types are virus, worms, trojans, adware/pop-up ads, spyware, keyloggers, rootkits, and scareware.…

    • 642 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Computer Virus Expository

    • 639 Words
    • 3 Pages

    The third kind is the malware; it is a malicious program that steals information from the computer and the user. Steal personal information like bank accounts, credit card numbers and other information that can be used against you. This information is being used by hackers to generate money and make fraud. The program also downloads other files and viruses into the computer.…

    • 639 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The online article, What is Hacking? (2012), warns that anyone can fall victim to hackers, whether a home user, student, blogger, or network administrator. There are more than 100,000 known viruses and that number is increasing daily. The damage caused by a virus can vary significantly, from a small inconvenience to having very serious consequences that can lead to a catastrophe, depending on the hacker 's intent. Viruses cause unanticipated behavior to occur in a computer 's operating system while multiplying within the computer.…

    • 360 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Malware includes computer viruses, worms, Trojan horses, spyware, adware, and other malicious programs. In law, malware is sometimes known as a computer contaminant, as in the legal codes of several U.S. states. Malware is not the same as defective software, which is software that has a legitimate purpose but contains harmful bugs that were not noticed before release. However, some malware is disguised as genuine software, and may come from an official company website. An example of this is software used for harmless purposes that is packed with additional tracking software that gathers marketing statistics.…

    • 10251 Words
    • 42 Pages
    Good Essays
  • Good Essays

    Love Bug Essay

    • 438 Words
    • 2 Pages

    A virus consists of self-propagating program code that’s triggered by a specified time or event. When the program or operating system that contains the virus is used, the virus attaches itself to other files and that’s why it’s a never ending cycle. A worm travels from computer to computer in a network that doesn’t generally erase data. A worm is an independent program that can spread itself without having to be attached to a host program unlike a work which needs a host to continue its cycle. A worm may corrupt data but usually replicates itself into a full blown version that eats up the computers resources ultimately bring the computer or network to a halt. Viruses and worms are the 2 top security threats as they are the most common and effective at getting there desired results.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    A virus is a self-replicating program that copies itself from machine to machine, usually over a network. Viruses spread by attaching themselves to other programs. They have various effects, from displaying harmless messages to erasing hard disks. Unlike worms, viruses focus on damaging local data (Oz, 19). A virus can be embedded in a Trojan horse. A Trojan horse is a useful program, like a game, that has malicious software deliberately embedded within it. There are other poorly written software which are vulnerable to an SQL injection attack.…

    • 1128 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    In today’s society, technology plays an important role in our everyday lives. Technology has made many lives easier, but with this ease, comes with many risks. People are becoming savvier about how to break into computer systems and access personal information. For many people, this is considered a breach of security. According to wisegeek.com, a security breach is “an incursion into a computer or network of computers, usually by hackers or malicious software that compromises sensitive data or causes damage to computers or network function.”1 Most of the time these so-called “computer hackers” find ways to evade security systems to steal important personal information such as social security numbers, home addresses and banking information. These hackers can be either a young person experimenting with information technology or an advanced computer programmer. Some will take this information and engage in illegal behavior such as leasing a car or opening a credit card or applying for a home loan. Many times this violation of security can lead to devastating consequences for the victim. On occasion, a computer security breach can be caused by only one person or a group of people. Other times, it can be caused by “malicious software, viruses, or other programs [which] are inserted into a system with the aim of destroying data or damaging the ability of a computer or network to operate.” 1 There are several types of security breach, all of which can be detrimental. “In a network-based breach, a malicious user gains access to a computer through any open network connections the computer may be using, such as a LAN connection or a wireless network connection.” 2 Another form of security breach is called malware. It is a type of “malicious software that can compromise a computer 's security…a user may unknowingly install malware by downloading a file off of the Internet or by visiting a website that automatically downloads software via the Internet…

    • 814 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Viruses and Anti-Virus

    • 3458 Words
    • 14 Pages

    A virus causes several deleterious effects in a computer. A virus might delete or corrupt…

    • 3458 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    first aid

    • 622 Words
    • 2 Pages

    Malware-software that is intended to damage or disable computers and computer systems. Sometimes I think what does this mean until I joined web design. Some people don’t care what they open on their computer but when it crashes they get mad and go out and spend hundreds of dollars to fix it. Little do they know it is free to get rid of all they have to do is wipe their computer clean. I don’t mean with a clean rag and Windex for those who want to be a smarty pants about it.…

    • 622 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Malware Lifecycle

    • 463 Words
    • 2 Pages

    Next we will discuss malware what it is and how it affects us. Malware is any kind of unwanted software that is installed without your adequate consent. Viruses, worms, and Trojan horses are examples of malicious software that are often grouped together and referred to as malware. Cybercriminals sometimes try to trick you into downloading rogue (fake) security software that claims to protect you against malware. This rogue security software might ask you to pay for a fake product, install malware on your computer, or steal your personal information. To protect yourself from Malware it is important to do some of the following: make sure automatic updating is turned on to get all the latest security updates. Keep your firewall turned on. Don't open spam email messages or click links on suspicious…

    • 463 Words
    • 2 Pages
    Good Essays
  • Good Essays

    computer virus

    • 489 Words
    • 2 Pages

    Computer viruses are man-made program or a piece of code which can load onto your computer without your knowledge and cause damage to your computer system. The dangerous part of the computer viruses is they are attached to a file or program, which means the computer viruses will not running until you click the file or program, and even more dangerous type of viruses is one capable of transmitting itself across networks and bypassing security system.…

    • 489 Words
    • 2 Pages
    Good Essays
  • Good Essays

    It 244 Week 1 Checkpoint

    • 721 Words
    • 3 Pages

    Mark S Merkow, Jim Breithaupt. (2006). Information Security. Principles and Practices- Chapter 2. Retrieved from Mark S. Merkow, Jim Breithaupt, IT244- Intro to IT Security.…

    • 721 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In computer technology, viruses are vicious software programs, a form of malware. Viruses exist on local disk drives and spread from one computer to another through the sharing of the infected files. Regular methods for spreading viruses include floppy disks, FTP file transfers, and copying files between shared network drives. Once installed on a computer, a virus may change or remove application and system files. Some viruses can leave a computer inoperable; others just display startling screen messages to innocent users.…

    • 430 Words
    • 2 Pages
    Good Essays