We use cookies to enhance our website for you. Proceed if you agree to this policy or learn more about it.
- Essay Database >
- Essay Examples >
- Essays Topics >
- Essay on Software
Computer Virus And Its Prevention Essay Examples
Type of paper: Essay
Topic: Software , Technology , Viruses , Internet , Bible , Company , Security , Computers
Words: 2000
Published: 12/08/2019
ORDER PAPER LIKE THIS
Small and large businesses alike are rallying to keep up with the new trends in technology. A business that is up-to-date in the implementation and usage of the various technologies offered to businesses has been a way of measuring the economic position of the company. However, computer viruses are keeping up with the every new technology that arises. This paper provides a discussion of the different functions of a computer virus and the degree of damage these viruses are able to inflict in a company’s computer system. It also looks into some well-known viruses and what damage these were able to do to these organizations. This paper also examines types of computer viruses and its corresponding behavior, the types of files they usually infect and how they propagate. The relatively short life-cycle of a computer virus is also presented. Likewise, it also tries to study the different preventive mechanisms available in combating computer viruses in a company. To help a company determine the type of security they need, suggestions on what to consider are offered based on a study made by Jacobson. A system wide virus defense mechanism is suggested to be implemented in companies especially companies that have data networks and companies that relies on computers for their daily operations. Benefits of implementing such system wide defense mechanisms through a an anti-virus software company compared to hiring specialized people by the company to attend to these matters are also examined. Financial benefits and overall benefits of implementing such system are also presented.
Computer Virus and Its Prevention
Introduction Businesses are rallying to stay at par with the new trends in technology. Almost every second, a new technology is introduced claiming to help businesses either in their daily operations or in specialized fields. However, even with these updates, software that is meant to harm the implementation of these new technologies cannot be helped. Computer viruses almost coexist with each new software addition intended to make the lives of the costumers easier. Fred Cohen first used the term computer virus in 1964 (Bocij, 2006). It is a small software program that has the capability to multiply from one computer to another interfering with the computers normal operations. It behaves like a biological virus. The functions of a computer virus can either be self – replication, latency of destruction. A self-replicating is a behavior of a virus where it produces copies of itself into other programs. Latency of the other hand is when the virus infection is delayed due to some programmed constraints like the virus shall take effect within a time frame or only for a specific number of executions. Destruction is when the virus destroys data or systems to function differently from what it is intended to do. Most computer viruses are made only for the purpose of exasperating users and non-threatening but other viruses which are destructive which could leave your computer inoperable also exists. It could destroy, delete or corrupt your data and files in your hard drives (IPA Japan, 2011).
Types of Viruses and their Behavior
The yearly new inventions by technology developers surprise the world, however, what surprises the world more is the ability of virus writers to come up with new viruses to keep up with these newest technology trends. The following are the most common type of viruses written by virus writers: 1. Boot sector viruses This type of virus works by replacing the boot code of your master boot sector with an infected boot code. It moves the original boot sector information in another disk sector to be marked as a bad sector. It loads itself in boot sector before any execution occurs in your computer, thus making it very hard to detect. McAffee claims that 75% of virus infection are boot sector viruses (McAffee, 2011).
Boot sector viruses propagate by using external boot disks.
2. File infecting viruses Based from the name of this type of virus, it infects files. The most common type of files infected by this type of virus are executable and operating system files. This type of virus operates by replacing program instruction with its own instruction moving the original program instructions to other parts of the file. Effect of this virus usually increases file size making detection a bit easier ( McAffee, 2011 ). 3. Polymorphic viruses This type of virus is very hard to detect since its behavior includes changing its appearance each time a new infection is produced. Anti-virus software finds it difficult for this type of virus due to the encryption they used. This takes anti-virus producer s to a new level of computer virus detection ( McAffee, 2011 ). 4. Stealth viruses Stealth viruses are memory resident type of virus. It uses several ways to avoid detection by antivirus software. This virus is good at hiding from detection as it also hides the changes it has made. When accessing an infected file, it redirects you to the original, transferred file( McAffee, 2011 ). 5. Multi-partite viruses The most destructive virus is the multi-partite type of virus because of its ability to infect both executable and boot sectors. It is also the hardest to detect because of its ability to combine with other types of viruses ( McAffee, 2011 ).
Computer Virus Life-Cycle
Most computer viruses pop out, do some damage and disappear. The life-cycle of computer viruses is typically short. Listed below is the typical life cycle of a virus (McAfee, 2011). 1. Creation
A virus writer creates a computer virus program.
2. Replication
The virus program transferred from one computer to another.
3. Activation
The virus does the destruction it is intended to do.
4. Discovery
Computer scientists discover the virus and study their behavior.
5. Assimilation
Anti-virus software is updated by anti-virus companies to include the new virus detected.
6. Eradication
Users make use of updated anti-virus software of companies to eradicate the virus.
Virus Prevention Damages to businesses caused by viruses are inevitable when businesses take precautions in protecting their computer systems. The Iloveyou virus, a worm (file-infecting) type of virus the spread in May 2000, has proven to be a destructive type of virus which affected both big and small organizations. Damage done by this specific type of virus includes overwriting image files and damages on local machine. It replicates itself by copying and sending itself to addresses in Windows Address Book which proved to have caused millions of loses in infected companies. In October 10, 2011, Cable News Network (CNN) reported that US Military drones are infected with a certain type of virus, which can affect the security of the country and its operations. It also reported that cyber thieves were also able to get specification of some parts of US Military submarines and tanks (Cable News Network, 2011). During this time, when almost everything important to world like security of people relies on the computer technology, it is a must that utmost computer virus prevention should be made. As they say, prevention is better than cure. Viruses can infect your computers in several ways. The most common of which is through file sharing and through the internet. There are several ways of preventing computer viruses to infect your computers system. Traditional ways of preventing your computers from getting infected by viruses is to provide rules on the use of computers especially when you are connected to the internet. Such rules could include examining filed before opening them, anti-virus software installations, keeping programs up-to-date and scheduling weekly scans (Jin, 2012). In order to minimize computer virus infections in your workplace, Jacobson suggests the following to considerations on what type of security fits your company: 1) if the most of your employees works with computers, then one should set an extensive security, 2) if there is constant data sharing (either manually or through a network), then extensive security of data is a must, 3) what is the physical distance of your computers with one another? 4) Is your operation fast paced? This can affect the way the computer network a company is set-up (Jacobson, 1992). An excellent virus defense system must be present in companies especially those companies heavily relying on computer systems for their daily operations. Computer users must be kept up-to-date and educated of the ways the system can be protected from being attacked by viruses. The most susceptible part of a company’s security efforts are its human factor .They must be well educated with the policies and company guidelines and end-user must knows. If the company is not capable of conducting the continuous updating of its human resources, they can partner with different organizations that specialize in this field. Aside from placing virus defenses in the server and network, each individual computer must also be installed with anti-virus software that is regularly updated. Likewise, a centrally manage virus-defense system must also be implemented.
While implementing this security system, identified weak points must be well documented to be able to address these properly.
Computer virus companies specializing in computer security can do all the planning and installation of the needed equipment to provide these security measures. These companies also provide the necessary trainings needed by the users. Tapping these companies cost less than having the company hire skilled workers to do this. Aside from this, the anti-virus company would be responsible in updating the antivirus software installed and keeping the users updated. In this way, the burden of constantly updating both the software and users will be removed from the company. These companies would also be responsible in creating and maintaining a virus control policy and procedures manual of the company. Due to the importance of a company security system, a company must implement one immediately, before it will be attacked by viruses.
Financial Cost
Companies tapping anti-virus software company specialist will realize lesser financial cost compared to hiring their own anti-virus technicians. These anti-virus companies give the whole package including trainings/ staff development needed for the company’s employees. With this cost for trainings and virus updates will be eliminated.
Benefits of a Virus-Defense System
Using the virus-defense system provided by a specialized anti-virus company will not only give you less burden with regards to its maintenance but will also provide the computer security that your company needs. It will ensure that the company data is protected, secrets of the company are secured and you network is protected from intrusions. This will also prevent the installation of programs that are not authorized by the company.
Ahmad, W. (2008). Computer Viruses as a Threat to Home Users. International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 10 No: 03. Retrieved from http://www.ijens.org/100403-5959%20IJECS-IJENS.pdf Cable News Network. (October 10, 2011). Virus Infects US Military Drones. CNN International. Retrieved from http://edition.cnn.com/video/#/video/bestoftv/2011/10/10/lawrence-drone-virus.cnn?iref=allsearch IPA Japan. (2011). Computer Virus Prevention Guidelines. Information-Technology Promotion Agency Japan. Retrieved 9 January 2012 from http://www.ipa.go.jp/security/english/virus/virus-guidelin-e.html Jacobson, Robert. (1992). Using McAfee Associates Software for Safe Computing, ISBN 0-9627374-1-0. New York: International Security Technology, Inc. Jin, Weiguio. Applying Epidemiology in Computer Virus Prevention: Prospects and Limitations. The University of Auckland Website. Retrieved from http://www.cs.auckland.ac.nz/courses/compsci725s2c/archive/termpapers/wjin.pdf McAffee. (2011). Introduction to Computer Viruses (and Other Destructive Programs). HackerzVoice. Retrieved from http://www.thehackademy.net/madchat/vxdevl/library/An%20Introduction%20to%20Computer%20Viruses%20(and%20other%20Destructive%20Programs).pdf Microsoft. (2012). What is a Computer Virus? Microsoft Support. Retrieved from http://support.microsoft.com/kb/129972 Miller, Michael. (2002). Understanding Computer Viruses. In Absolute Computer Security and Privacy (Chapter 1). Retrieved from http://media.wiley.com/product_data/excerpt/77/07821412/0782141277-2.pdf
Cite this page
Share with friends using:
Removal Request
Finished papers: 2049
This paper is created by writer with
ID 287174183
If you want your paper to be:
Well-researched, fact-checked, and accurate
Original, fresh, based on current data
Eloquently written and immaculately formatted
275 words = 1 page double-spaced
Get your papers done by pros!
Other Pages
Manifestation theses, cap business plans, example of hong kong film study essay, education and political participation research paper, essay on twiggy in 1960s the supermodel influence, human resource management business plan example, paper review of articles article review, free article review about partnership strategy, free essay about campbell, the affordable care act course works examples, hr managers power case study sample, photographs article review example, good sap talk at uhd by jeff word essay example, free essay on dove campaign for real beauty, good essay about how memory and representation work together, good essay about the three branches of the criminal justice system, good term paper on property rights, essay on thoughtful questions, the gilded age and the economic integration of the american west essay examples, free essay about young women in juvenile justice, example of essay on ethical dilemmas in auditing process unintentional bias or dishonesty, boundary permeability essay sample, patellofemoral essays, tsutsugamushi essays, phen essays, poverty in canada essays, cursus essays, topaz essays, medical research essays, female characters essays, harpo essays, mammy essays, all talk essays, fiore essays, service industry essays, bent essays, dimples essays, chuckle essays, lyricism essays, naughton essays, physical characteristics essays, indole essays, catalase essays.
Password recovery email has been sent to [email protected]
Use your new password to log in
You are not register!
By clicking Register, you agree to our Terms of Service and that you have read our Privacy Policy .
Now you can download documents directly to your device!
Check your email! An email with your password has already been sent to you! Now you can download documents directly to your device.
or Use the QR code to Save this Paper to Your Phone
The sample is NOT original!
Short on a deadline?
Don't waste time. Get help with 11% off using code - GETWOWED
No, thanks! I'm fine with missing my deadline
IMAGES
VIDEO