Preview

What Are Some of the Motivations for Virus Programmers?

Better Essays
Open Document
Open Document
961 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
What Are Some of the Motivations for Virus Programmers?
What are some of the motivations for virus programmers?
1: Anger issues
There are those who, for whatever reason, just do destructive things for the sake of their destructiveness. They may be malicious narcissists, psychopaths, or just so self-centered in their impression that the whole world is against them that they will blindly lash out at anyone and everyone when they get the chance. They might think they're misunderstood and want to communicate with the world by harming it in some way

2: Do it for the Fun
Some still do it for the "fun" of destruction. They may get a thrill out of reading news items about their work causing people trouble, or they may just take a fire-and-forget approach, creating destructive, self-replicating programs for the joy of it without much caring whether they ever see the consequences themselves.
3: Espionage
I'm not talking about sabotage here; I'll address that later. By "espionage," I mean attempts to gather information through underhanded means for reasons other than identity fraud and other directly, criminally profitable purposes.
5: The hacker instinct
Keep in mind the difference between a hacker and a security cracker. People with a hacker mindset usually find themselves eventually drawn to specific fields of interest. In some cases, that interest might revolve around understanding self-replicating mobile malicious code.
6: Romance and drama
Because of the character of certain online communities, it can be much easier sometimes to feed one's own delusions of the romance and drama of being a "Computer Hacker" for a longer time than in most other criminal enterprises where the physically gritty, and petty, reality of what they do becomes quickly inescapable.

How are computer viruses spread? 1. Email attachments.
The world became familiar with the phenomena of email attachments carrying viruses thanks to Microsoft’s Outlook Express automatically opening every attachment to every email you received a few years

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Email worms – A worm that can attach itself to a computer system when a user open’s an unknown attachment in an email.…

    • 437 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking in 1960’s up to 1970’s – an individual working with computers who were technically gifted and skilled it was defined by computer ethicist Duncan Langford (1995).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the television program “American Greed - Hackers : Operation Get Rich or Die Tryin’ “they explain the the reason most folks get into criminal hacking is because of credit and attention and not well thought out long term plans. The program also show how the team adapted to evade law enforcement measures by not being flashy and making spaced out recreational purchases such as cars and using cash when need be.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Spies usually have one of two objectives. The first objective is Espionage, espionage is the tactic that focuses on topics not available to the public, with most of the information gotten through this method is gotten through covert means. Espionage has dated all the way back to Ancient Indian times, during Chandra Gupta’s reign. In Chanakya’s Arthashastra, he describes how he used methods of assassination and espionage to gain and preserve Chandra Gupta’s reign. The U.S. itself has used espionage very heavily, especially during the Cold…

    • 1852 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    History of Spies in the Civil War Espionage, a term commonly seen in today’s military and sometimes even in the news. It is the act of spying or using a spy or spies, usually by governments, to gather or obtain military or political information. This is an effective way to gather many kinds of intel in secret. I’ve found from some research that I’ve done that it was used in the Civil War.…

    • 1067 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Until 1884, the United States differed from most civilized nations in that it had no organized espionage agency. Any attempts at espionage development until this point can be described as “unorganized, event-driven, and sporadic at best.” Spying activities were implemented, in a limited extent, in the Revolutionary and Mexican Wars, but were virtually nonexistent from the end of the Mexican War until the Civil War began.…

    • 5565 Words
    • 23 Pages
    Powerful Essays
  • Good Essays

    Stereotypical cybercriminals range from unsophisticated “script kiddies,” who lack programming skills, to expert criminals who create custom exploits and attack tools. Many cybercriminals disregard computer crime laws and often rationalize why those laws are invalid or inapplicable, especially when espousing political agendas against corporate practices or national policies.…

    • 413 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cask of Amontillado

    • 1047 Words
    • 5 Pages

    lives, feel the need to seek vengeance upon someone. And although it is wrong to to…

    • 1047 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Organized Crime

    • 375 Words
    • 2 Pages

    One new trend in organized crime is cybercrime. The key to it is social engineering. Hackers can easily persuade someone now a days to do things on their computer that is not in their best interest and the internet is assisting them.…

    • 375 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Yet, many fail to fully understand the threat landscape that lies behind the lucrative business of hacking and why the number of hackers is increasing every day.…

    • 720 Words
    • 3 Pages
    Good Essays
  • Good Essays

    What is virus? A computer virus, according to Webster 's Collegiate Dictionary, is "a computer program usually hidden within another seemingly innocuous program that produces copies of itself and inserts them into other programs or files, and that usually performs a malicious action (such as destroying data)". Two categories of viruses, macro viruses and worms, are especially common today. Computer viruses are never naturally occurring; they are always man-made. Once created and released, however, their spread is not directly under human control. One example of a virus is the Anna Kournikova virus, which comes in the form of a picture sent through email.…

    • 1103 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Computer Viruses of Today

    • 3397 Words
    • 14 Pages

    While the software is created to make our daily life and career easier, there also exits software, which sole purpose is to do harm and hinder the daily routine of ordinary users. Such programs are commonly referred to as viruses. Malicious programmers write computer viruses for various reasons. Some of virus-makers do it just for fun, others write viruses for personal gain, many do it for fame. Computer viruses are a big problem not only for those people who works with computers, but also for those people who depends on the companies which use computers as well.…

    • 3397 Words
    • 14 Pages
    Better Essays
  • Good Essays

    We live in the time of the World Wide Web and it brings the biggest changes ever. The effects from this powerful invention, the Internet, has made the world flat and the opportunities huge. Every big change can have an affect on people, it could be positive or negative. In early 2002, researchers evaluated the presence and role of hackers and their role in technological innovations. “A decade ago, people in the tech field were angry that hackers had been labeled the dangerous villains who threatened national security” (Nissenbaum, 2015). This negative association contrasts with the beginning days of the 1970’s when hackers “were seen as ardent if quirky programmers, capable of near-miraculous,…

    • 1234 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Computer viruses are very risky and can damage all the data files that you have on your pc and the pc itself. There are many types of them. It injects copies of itself into other programs on your computer system. They do damage the executable programs and the system files! Or display annoying messages and popups on your screen and send infected junk emails to people from your email address.…

    • 556 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    English 1

    • 575 Words
    • 3 Pages

    Why do you think they do this? What is their motive by doing these ridiculous things? Some might say, “How fool that person is…if he has a problem killing one’s self is not the solution at all…”…

    • 575 Words
    • 3 Pages
    Satisfactory Essays