It255 Iloveyou Virus

Good Essays
Topics: ILOVEYOU, Computer
EYOUILOVEYOU, sometime referred to as Love Letter, was a computer worm that attacked tens of millions of windows personal computers on and after May 5th 2000. It started in Philippines, spreading as an email message with the subject line “ILOVEYOU” and the attachment “LOVE-LETTER-FOR-YOU.txt.vbs”. the latter file extension in this case is .vbs but by default it don’t show up in the windows files it will comes up as the normal text file to end user, .vbs is interpreted file that when they click the text file thinking it was love letter form one of their ex-boyfriend(s), they activate Visual Basic script which was the virus and once it activated it will send first 50 addresses in the Windows Address Book used by Microsoft Outlook. It damaged local machine, overwriting image files. Virus stared in Manila, Philippines on May 5th 2000, it moved to Hong Kong then Europe and then finally the US. As employees began their workday that Friday morning virus have already caused US $5.5 to 8.7 Billion in damages worldwide and estimated to cost US $15 billion to remove the worm within ten days. Over fifty million infection had been reported, it was reported that 10% of internet-connected computers in the world. Damaged cited was mostly the time and effort spent getting rid of the infection and recovering files form back up. To protect them, The Pentagon, CIA, The British Parliament and most large corporation decided to completely shut down their mail system. On 5 May 2000, two young Filipino computer programmers named Reomel Ramores and Onel de Guzman became targets of a criminal investigation by agents of the Philippines ' National Bureau of Investigation (NBI). Local Internet service provider Sky Internet had reported receiving numerous contacts from European computer users alleging that malware (in the form of the "ILOVEYOU" worm) had been sent via the ISP 's servers. After surveillance and investigation by Darwin Bawasanta of Sky Internet, the NBI traced a frequently


Cited: Rouse, Margaret. "ILOVEYOU Virus." What Is ? Search Security, Feb. 2006. Web. 02 Mar. 2013.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    iloveyou

    • 336 Words
    • 2 Pages

    Memorandum To: Mr. Emilio Chavez, President of PESCO Mexico From: Aaron T. De Leon, Consultant Date: December 20, 2013 Subject: Strategic Planning for Information Resources (SPIR) Implementation This is the right moment to have a Strategic Planning for Information Resources (SPIR) for PESCO Mexico because the firm will received benefits. Having SPIR in the firm, the firm will have a good decision making in having resources and the firm will determine what they are will be after a year and…

    • 336 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    it255

    • 721 Words
    • 3 Pages

    Encryption a Means of Security Seminar Presentation On Application of encrypting techniques In Database Security By Uweh SKelvin ABSTRACT Security in today’s world is one of the important challenges that people are facing all over the world in every aspect of their lives. Similarly security in electronic world has a great significance. In this seminar work, we discuss the applications of encryption techniques in database security…

    • 721 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Virus

    • 515 Words
    • 3 Pages

    A virus is a small infectious agent that can replicate only inside the living cells of an organism. Viruses can infect all types of organisms, from animals and plants to bacteria and archaea.[1] Since Dmitri Ivanovsky's 1892 article describing a non-bacterial pathogen infecting tobacco plants, and the discovery of the tobacco mosaic virus by Martinus Beijerinck in 1898,[2] about 5,000 viruses have been described in detail,[3] although there are millions of different types.[4] Viruses are found in…

    • 515 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Computer Virus

    • 869 Words
    • 4 Pages

    COMPUTER VIRUS Good afternoon everyone. Hoping all of you are well. This is the time to present my informative speech. For making a Digital Bangladesh, every citizen has to expert user of computer and our authority has to computerize all sections of this country. But the major threat for using a computer is “virus”. That’s why I have prepared my speech to inform my audience about it. Today I have prepared Four special points for illustrate a virus. a) What is a Virus? b) What Viruses…

    • 869 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    it255 study guide

    • 659 Words
    • 3 Pages

    FINAL EXAM: Study Guide 1. Which of the following is an action that could damage an asset? 2. Which law requires all types of financial institutions to protect customers’ private financial information? 3. An AUP is part of a layered approach to security, and it supports confidentiality. What else supports confidentiality? 4. Which of the following is a detailed written definition of how software and hardware are to be used? 5. Which of the following is not a common…

    • 659 Words
    • 3 Pages
    Powerful Essays
  • Better Essays

    Virus

    • 1318 Words
    • 6 Pages

    Amy Rogers Office Hours: MW 9-10 AM • Viruses are on the border between living & nonliving things • Have either DNA or RNA, never both • Often cause death of the host cell • Genus/species names not used in viral classification Compenents of a virus (lipid bilayer) Viral components: Nucleic Acid • Viral genomes can be either DNA or RNA • This genome, once inside a host cell, directs synthesis of new viral proteins, and also replication of new viral genomes • Viral genomes come in all kinds:…

    • 1318 Words
    • 6 Pages
    Better Essays
  • Good Essays

    IT255 Practice Exam Questions

    • 11382 Words
    • 46 Pages

    Practice Questions with Solutions Chapter 1 1. What is the correct approach for addressing security and organization objectives? a. Security and organization objectives should be developed separately. b. Security should drive organization objectives. c. Security should support organization objectives. d. The site security officer should approve or reject organization objectives. 2. The statement, “Promote professionalism among information system security practitioners through the provisioning…

    • 11382 Words
    • 46 Pages
    Good Essays
  • Good Essays

    Virus

    • 508 Words
    • 3 Pages

    eat brains...although there are some....later! Another argument is that viruses should not be added to the tree of life...even the big viruses...but then the concept of a tree of life may be outdated as well2,3. So, back to some virology. A virus can not make more of itself, or multiply, without help from the contents of living cells (lets leave…

    • 508 Words
    • 3 Pages
    Good Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    IT255 Project Part 1 Richman Investments Security Plan Outline User Domain: • Restrict access to data and applications to the required users and groups. • Review and Revise user conduct and security polices every six months. • Conduct annual security training seminars with system users and staff. • Track and monitor employee behaviors. Conducting annual security training for the user in the user domain will cover the Acceptable Use Policy (AUP). Informing the users will be of what is acceptable…

    • 634 Words
    • 3 Pages
    Better Essays
  • Good Essays

    It255 Assignment 8

    • 309 Words
    • 2 Pages

    The Internet is vulnerable to myriads kinds of attacks, due to vulnerabilities in the TCP-IP protocol, and no global flow control mechanisms. The two problems lead to many TCP exploits and the horrible DDoS attacks. We have devised a method of incrementally upgrading the network infrastructure at the transport level that solves the above problems and makes the network significantly more resilient to attacks, particularly the DDoS attack. The approach uses "hardened routers", routers that can do simple…

    • 309 Words
    • 2 Pages
    Good Essays