A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going.
A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer. Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.
2. A virus or malware can impact which of the three tenets of information systems security (confidentiality, integrity, or availability)? In what way?
Viruses can send files to other people that don't allow them to read these files, which affects confidentiality. Some viruses can break programs, affecting availability. Some viruses will change files in a program, which impacts integrity.
3. Why is it recommended to do an anti-virus signature file update before performing an anti-virus scan on your computer?
Signature files contain the latest list and behavior of known viruses. Anti-virus programs release signature file updates regularly sometimes daily, sometimes more often because new viruses are being identified on a daily basis. It is best to configure your anti-virus program to automatically check for updates these updates.
4. Why might your co-worker suggest encrypting an archive file before e-mailing it?
Any computer that handles any sensitive information should require encryption.
5. What kind of network traffic can you filter with the Windows Firewall with Advanced Security?
Inbound rules – they apply to traffic that is coming from the network or the Internet to your Windows computer or device. For example, if you are downloading a file through BitTorrent, the download of that file is filtered through an inbound rule.
Outbound rules – these rules apply to traffic that is originating from your computer and going to the network and the Internet. For example, your request to load the How-To Geek website in your web browser is outbound traffic and it is filtered through an outbound rule. When the website is downloaded and loaded by your browser, this is inbound traffic.
Connection security rules –less common rules that are used to secure the traffic between two specific computers while it crosses the network. This type of rule is used in very controlled environments with special security requirements. Unlike inbound and outbound rules, which are applied only to your computer or device, connection security rules require both computers involved in the communication to have the same rules applied.
6. What are typical indicators that your computer system is compromised?
When you start your computer, or when your computer has been idle for many minutes, your Internet browser opens to display Web site advertisements.
When you use your browser to view Web sites, other instances of your browser open to display Web site advertisements.
Your Web browser’s home page unexpectedly changes.
Web pages are unexpectedly added to your Favorites folder.
New toolbars are unexpectedly added to your Web browser.
You cannot start a program.
When you click a link in a program, the link does not work.
Your Web browser suddenly closes or stops responding.
It takes a much longer time to start or to resume your computer.
Components of Windows or other programs no longer work.
7. What elements are needed in a workstation domain policy regarding use of anti-virus and malicious software prevention tools?
Policies for workstation antivirus and malicious software prevention tools must be consistent. They have to be the same for all computers in the network or it won't do any good.
You May Also Find These Documents Helpful
-
Malware - Can take many forms, but as the name implies, it is malicious software. It can take the form of viruses, bots, spyware, worms, trojans, rootkits, and any other software intended to cause harm. Having proper firewall and security software protection can usually prevent malware from spreading.…
- 624 Words
- 3 Pages
Satisfactory Essays -
|Trojan horse - A virus that allows a backdoor into a computer affecting the computer without the users knowledge and allows the information stored |…
- 829 Words
- 4 Pages
Satisfactory Essays -
And once malwares, Trojans, viruses gain entry into the computer system then these software programs destabilize the operating system, cause damage to it. It is recommended to install and use effective PWS: Win32/QQpass.GR removal software like VSKsoft antivirus software to get rid of all malware related issues.…
- 345 Words
- 2 Pages
Satisfactory Essays -
8. Identify the five components of an information system. Which are most directly impacted by the study of computer security? Which are most commonly associated with its…
- 764 Words
- 4 Pages
Good Essays -
Malicious software, referred to as malware, can contain a variety of threats, from data loss to system failures. There are several types of worms, viruses, Trojan horses and spyware, which can be delivered in a variety of ways. Computer viruses are a type of software or executable file that attaches itself to other programs to be uses. Viruses can cause system failures, rewrite hard drives, or destroy files and programs. Worms are similar to viruses, but are independent programs, rather that attaching to others. Viruses have a tendency to spread more rapidly over networks and through e-mail. Trojan horses are based off their namesake, in which they appear to benign types of programs, but when executed can introduce malware into your system. Spyware is programing that can track computer use. Forms of…
- 633 Words
- 3 Pages
Satisfactory Essays -
A virus or malware can impact which of the three tenets of information systems security (confidentiality,…
- 1020 Words
- 6 Pages
Satisfactory Essays -
Threats to the system and information security can be things such as accidentally deleting a file and unauthorised access which may lead to theft of private details. Hackers and viruses also prove a huge threat to a system.…
- 658 Words
- 3 Pages
Satisfactory Essays -
A virus is software that is written with malicious intent to cause annoyance or damage. Question options:…
- 7255 Words
- 53 Pages
Powerful Essays -
Computer program that can copy itself and infect a computer. The term ‘computer virus’ is sometimes used as a catch-all phrase to include all types of malware, including true viruses.…
- 932 Words
- 4 Pages
Better Essays -
Viruses can vary with respect to all of the following characteristics except _____. ( Overview)…
- 1693 Words
- 7 Pages
Powerful Essays -
5. Relatively small programs that infect other application software by attaching to it and disturbing application functioning…
- 910 Words
- 4 Pages
Powerful Essays -
A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…
- 711 Words
- 3 Pages
Satisfactory Essays -
Virus is a toxin or poison. It is a microscopic organism consisting of genetic material. They cannot reproduce without a host cell. When it gets this host cell, it takes over its functions. The cells then continue to reproduce, and reproduces more viral protein. Several human diseases are caused by viruses which include:- smallpox, measles, the common cold, chickenpox, hepatitis, HIV, cold sores, shingles to name but a few. Viruses can spread from person to person, and by exchange of salvia, coughing, sneezing.…
- 883 Words
- 4 Pages
Satisfactory Essays -
Virus is a kind of code created by human that can damage the whole system once it is been opened, and the trick that hackers use is that they send the virus in different way such as “junk email, pop-ups web pages or games. As soon as the user clicks on that particular email or pop-up the virus codes starts doing their job which is to damage the system by destroying files and other objects.…
- 646 Words
- 3 Pages
Good Essays -
Next we will discuss malware what it is and how it affects us. Malware is any kind of unwanted software that is installed without your adequate consent. Viruses, worms, and Trojan horses are examples of malicious software that are often grouped together and referred to as malware. Cybercriminals sometimes try to trick you into downloading rogue (fake) security software that claims to protect you against malware. This rogue security software might ask you to pay for a fake product, install malware on your computer, or steal your personal information. To protect yourself from Malware it is important to do some of the following: make sure automatic updating is turned on to get all the latest security updates. Keep your firewall turned on. Don't open spam email messages or click links on suspicious…
- 463 Words
- 2 Pages
Good Essays