Preview

Computer Viruses: Past, Present and Future

Better Essays
Open Document
Open Document
4808 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Viruses: Past, Present and Future
Computer Viruses: Past, Present And Future

In our health-conscious society, viruses of any type are an enemy. Computer viruses are especially pernicious. They can and do strike any unprotected computer system, with results that range from merely annoying to the disastrous, time-consuming and expensive loss of software and data. And with corporations increasingly using computers for enterprise-wide, business-critical computing, the costs of virus-induced down-time are growing along with the threat from viruses themselves. Concern is justified - but unbridled paranoia is not. Just as proper diet, exercise and preventative health care can add years to your life, prudent and cost-effective anti-virus strategies can minimize your exposure to computer viruses.

· A history of computer viruses
· Who writes viruses - and how they can reach you
· The early warning symptoms of virus infection
· The real numbers behind the growth of viruses and their costs
· How viruses work - and how virus protection can stop them

What, Exactly, Is A Computer Virus?

A computer virus is a program designed to replicate and spread, generally with the victim being oblivious to its existence. Computer viruses spread by attaching themselves to other programs (e.g., word processors or spreadsheets application files) or to the boot sector of a disk. When an infected file is activated - or executed - or when the computer is started from an infected disk, the virus itself is also executed. Often, it lurks in computer memory, waiting to infect the next program that is activated, or the next disk that is accessed.

What makes viruses dangerous is their ability to perform an event. While some events are harmless (e.g. displaying a message on a certain date) and others annoying (e.g., slowing performance or altering the screen display), some viruses can be catastrophic by damaging files, destroying data and crashing systems. How Do Infections Spread?

Viruses come from a variety of sources. Because a

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 3

    • 3151 Words
    • 13 Pages

    system. That is why one may have problems when booting from a floppy when a…

    • 3151 Words
    • 13 Pages
    Good Essays
  • Satisfactory Essays

    Cis 207 Week 2/3 Quiz

    • 383 Words
    • 2 Pages

    4. The computer operating system starts the “boot sequence” using information retrieved from the boot sector of a drive(this can be a HDD, USB stick, etc) True…

    • 383 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is3440

    • 534 Words
    • 3 Pages

    system or kernel to load when the computer starts. It is very important to lock this down because of the high access…

    • 534 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 1

    • 345 Words
    • 2 Pages

    It is important to learn the various ways how the malwares, malicious files like the ones in context enters an unprotected PC system.…

    • 345 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    Malicious software, referred to as malware, can contain a variety of threats, from data loss to system failures. There are several types of worms, viruses, Trojan horses and spyware, which can be delivered in a variety of ways. Computer viruses are a type of software or executable file that attaches itself to other programs to be uses. Viruses can cause system failures, rewrite hard drives, or destroy files and programs. Worms are similar to viruses, but are independent programs, rather that attaching to others. Viruses have a tendency to spread more rapidly over networks and through e-mail. Trojan horses are based off their namesake, in which they appear to benign types of programs, but when executed can introduce malware into your system. Spyware is programing that can track computer use. Forms of…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lab 2

    • 639 Words
    • 2 Pages

    with varying amounts of data. In order for scanners to detect this type of virus,…

    • 639 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Virus Quiz

    • 602 Words
    • 3 Pages

    A virus may not kill a host cell but may become inactive for a period…

    • 602 Words
    • 3 Pages
    Good Essays
  • Better Essays

    A piece of unwanted computer software or code introduced into another program, attached to a document or exists on its own, for malicious purposes.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Good Essays

    * A boot sector virus will corrupt the boot sector to make the computer inoperable, or it can do as little as change the name of your hard drive.…

    • 669 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Ais Ch. 11

    • 910 Words
    • 4 Pages

    5. Relatively small programs that infect other application software by attaching to it and disturbing application functioning…

    • 910 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    A general term for software that is designed to destroy or disrupt data or do other unwanted actions in a computer system.…

    • 1399 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    A major university opened a new computer lab for their Business School students. Due to the large number of students enrolled in the business school the computer lab had an overwhelming demand. The business school computer was unable to meet the overwhelming demand s the students needed to the computer lab. Therefore, Rod Stevenson, the director of the Student Computer Center decided to hold focus groups. The objective of the focus group was to determine overall student satisfaction with the lab, identify current problem areas and collect student recommendations for improvements.…

    • 544 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    3. Which of the following is a stand-alone malicious software program that actively transmits itself, generally over networks, to infect other computers?…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    ms dos

    • 2589 Words
    • 11 Pages

    It searches for the operating system and, when located, loads it into the main memory.…

    • 2589 Words
    • 11 Pages
    Good Essays

Related Topics