Preview

Computer Viruses of Today

Better Essays
Open Document
Open Document
3397 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Viruses of Today
LOMONOSOV MOSCOW STATE UNIVERSITY

Research paper for the Course of English

Computer viruses of today

Student:
Submission date:
Instructor:

The Faculty of Computational Mathematics and Cybernetics

The English Department

Moscow 2010
CONTENTS
INTRODUCTION 3
1 Essence of computer viruses 4
2 TYPES OF VIRUSES. 6
3 Antivirus software 11 CONCLUSION 13
References 14

Introduction For last decades the technology of the software has strongly changed. In this time, the software has made very much to help mankind, and now we use various software every day of our life. Some people may say they’re completely dependent on it. Every year, every month, new software comes with new ways to aid us, so in any time if a new need arises, we can count on new software being released for that specific purpose. While the software is created to make our daily life and career easier, there also exits software, which sole purpose is to do harm and hinder the daily routine of ordinary users. Such programs are commonly referred to as viruses. Malicious programmers write computer viruses for various reasons. Some of virus-makers do it just for fun, others write viruses for personal gain, many do it for fame. Computer viruses are a big problem not only for those people who works with computers, but also for those people who depends on the companies which use computers as well. A well-written malicious virus could halt production in companies. It could also make the stock market crashing in the course of an hour, or could make to make millions of innocent internet users be helpless as their Internet providers struggle with intensive system overloads from cleverly created viruses. Now in information press appears a lot of various reports about the emergence of new species of viral infection. But usually, there is an advertizing of means of active and

You May Also Find These Documents Helpful

  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    In modern business, information and enterprise systems are becoming major backbones, relied upon for function, communication and longevity. Even smaller businesses have become dependent on computers for operations as well as management of information, from everything from billing, stock levels, to payroll. With the growing demand and need for computer systems and networks, issues begin to arise with systems security. Viruses, Trojan horses, worms, hackers, as well as internal security issues can plague a business. This paper will cover some of the basic concepts for system security, and possible threats.…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    BUS 520 Case 1 1

    • 1885 Words
    • 6 Pages

    The computer virus employees of Symantec Corp. are never able to enjoy a finished product. They are constantly collecting viruses and suspicious codes to analyze the way they work and to find a solution to prevent these viruses form damaging the public’s computers. They are determined to provide their consumers with updated versions of anti-viruses for their computers. At the Symantec lab, they have a box, which has all dangerous types of viruses that needs or be disposed of. Vincent Weafer has been a part of Symantec since 1999. In 1999, there were only a few employees at Symantec and that there were only a few viruses spread out through months compared to how it is now. Nowadays there are about 20,000 viruses monthly spread out, so more talented employees around the world work for Symantec. Vincent Weafer said that colleges are not creating computer security experts everyday so as soon as they find someone who does, that no matter in what country they hire him or her. The Blaster-B worm made Symantec employees work really hard and this proved that they needed more employees would be more talented towards fixing these problems. Each employee has their own job; some people are managers who are responsible for responding to new security threats, some write research papers, some develop tools that will be used to fight the viruses and even some who find out about the new viruses. Symantec never stops meaning that the labs switch when they are done for the day. Vincent Weafer wants to have a well-defined process for dealing with the viruses that are found every day.…

    • 1885 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    The CNC Machinist: Quiz

    • 7255 Words
    • 53 Pages

    A virus is software that is written with malicious intent to cause annoyance or damage. Question options:…

    • 7255 Words
    • 53 Pages
    Powerful Essays
  • Satisfactory Essays

    Viruses have been around for a long time, and can render a system useless if not dealt with. New, more destructive viruses and worms are being unleashed exponentially. Reports indicate that 50 percent more virus attacks were launched in 2003 than the prior year. The January-March 2004 Mydoom virus outbreaks were the biggest the Internet has encountered to date.…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Virus Quiz

    • 602 Words
    • 3 Pages

    A virus may not kill a host cell but may become inactive for a period…

    • 602 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Kizza Chapter *

    • 528 Words
    • 3 Pages

    1. Briefly state the main idea of this chapter. Since software in one form or another controls every computer or computer component, it becomes a more important and fundamental part of our life. Even though we may not understand the languages that make up the software, we must be aware of the elements of software that affect its use. Verification and Validation, reliability, security, safety, and quality are some of the major points examined and brought to light. It delves into the various reasons of why software fails and who is responsible. More importantly, it covers what consumer protection exists and the rights of software buyer's.…

    • 528 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Statistics Lab week 6

    • 3844 Words
    • 14 Pages

    Attacks by famous malicious code such as the Melissa or Lovebug viruses highlight the threat of “hackers”, outsiders with intent to harm…

    • 3844 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Chipopo Research Paper

    • 343 Words
    • 2 Pages

    When a computer get infected with this virus, the computer screen will be flooded with various unexpected advertisements which can prevent a user from surfing on the Internet normally.The group of hackers created this adware to earn quick money by creating online traffic through which they can generate pay-per-click and marketing revenue.…

    • 343 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    When it comes to viruses and the types that get put onto your computer there are many of them. For example: the Trojan Horse, it is put into your computer by saying it is good for file converting or cleaning a system out, when it is really putting bad programs into your computer along with spyware and other potentially harmful programs. Just like when you go into your email and you see an…

    • 783 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Mr Ramos ITSC 1405 CHAP 1

    • 1157 Words
    • 4 Pages

    3. The impact of the evolution of computer hardware and the accompanying evolution of operating system software is as follow: As experience with a combination of hardware and software matures; users and engineers gain new visions of what they would like to do next. New hardware is usually paralleled by operating system and system software development. The fielding of new systems results in user and operator feedback that leads to operating system and system software improvement. Innovative users try equipment and software for applications not envisioned by the hardware and software vendors. Successes lead to additional sales and use, which leads to further supporting software development. If there is perceived economic benefit, the hardware vendor will seek ways to adapt to the new needs without necessarily sacrificing basic capabilities. Often this consists of creating a more efficient interface.…

    • 1157 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    From the year 2000 to 2010, the users’ on the Internet has escalated to approximately five times its original users. The Internet provides a variety of services in which its users transmits large amounts of proprietary and personal data. The increase in Internet users and the vital data transmitted has enticed criminals to use the internet to obtain vital information. This is done through the use of malicious traffic. Malicious traffic can be defined as Internet traffic used to compromise a system and/or to conceivably impair the privacy of consumers data stored on the system or the person working on the system itself. Security experts has documented "67,000 new malware threats on the Internet daily in the first quarter of 2011, resulting from more than 45 new viruses, worms, spyware and other threats" (Department of Commerce (DOC), 2011). Malicious traffic plays a key role in the challenges faced in the economics of information security. Economically speaking, malicious traffic…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    References: Last, F.M., Last, F.M., & Last, F.M. (YEAR). The article title: And the article subtitle. The Journal Title, vol#, page–page…

    • 944 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Personal Career Goals

    • 783 Words
    • 4 Pages

    Computer technology has gone from being undiscovered to being used globally. We live in an exciting time technologically. Over relatively short spans of time, technology has improved our lives in many ways. Advances in computing and technology save lives, make day-to-day living easier, and have improved quality of life for billions of people. The impact that computing has on the world is fascinating to me. I have spent the last few years studying programming, software development, and computer programming and have felt great satisfaction in learning about what makes up this computing technology.…

    • 783 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    virus hunters

    • 358 Words
    • 2 Pages

    1. Keeping professionals excited about work that is routine and standardized and chaotic is a major challenge for Vincent Weafer. How could he use technical, human, and conceptual skills to maintain an environment that encourages innovation and professionalism among the virus hunters?…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Q1. Keeping professional’s excited about work that is routine and standardized and chaotic is a major challenge for Vincent Weafer. How could he use technical, human, and conceptual skills to maintain an environment that encourages innovation and professionalism among the virus hunters?…

    • 688 Words
    • 3 Pages
    Good Essays