Premium Essay

Summary of the Effects of Virus and Malicious Software

In:

Submitted By buragash
Words 902
Pages 4
Executive Summary on the effects of computer Virus and Malicious software
Introduction
This paper is intended to outline the effects of computer viruses and malicious software. The paper will start by describing what a virus is and what malicious software is. it will then outline some of the common types of viruses and malicious software; the effects both threats could potentially have on ABC’s computer networks and finally suggest ways in which ABC estate agency may protect itself from such threats.
Definitions
Malicious software often referred to as Malware is as its name implies malicious software that is intended to cause some type of damage or do some unwanted action to a computer system often without the user’s knowledge or consent. Some types of malware are disguised as honest piece of software which does what it is intended to do, however malicious code has been embedded which tracks a user’s activity for marketing purposes
A virus is a type of malicious software. A virus is a computer program capable of attaching itself to hard disks or other files and replicating itself repeatedly, typically without the user’s knowledge or permission (Stair, Reynolds and Chesney 2012). The virus often hides itself in memory or attaches itself to another program waiting to be executed. Once executed it performs some type of harmful action on the infected system, such as freezing up the CPU, eating up disk space, accessing personal information, corrupting important files and data. In a network environment the virus is able to replicate itself and spread to other computers on the network. Viruses may cause a computer or network to completely stop functioning for days until it is found and repaired. Viruses typically infect a user’s computer through email attachments, instant messaging, Illegal or borrowed software, not running latest updates and downloading infected

Similar Documents

Free Essay

Developer

...accelerate their spread. In response to this threat, some contemporary research efforts are aimed at creating computer virus immune systems. This paper analyses the computer viruses and attacks and also some countermeasures to prevent them. In particular, we discuss Intrusion Detection and Prevention techniques for handling web based attacks and to patch up different kinds of vulnerabilities in computer system. I. INTRODUCTION Web based system makes the next way of computing. Global prosperity and even faster pace of business are driving the desire for employees, partners and customers to able to communicate from different location in this world. With this phenomenal growth of computing devices, the threat of viruses is likewise growing. New platforms such as MAC OS of Apple and Microsoft Windows are highly attractive targets to virus and Trojan writers. As technology in the world of networking industries advances, virus writers have plenty of room for growth. Worse thing is security measures such as firewalls and virus scanners i.e. antivirus softwares are not widely used. The future may be even worse. With distributed programming platforms such as .NET, combine with Microsoft’s Windows platform the potential for viruses is even greater. II. OVERVIEW OF THREATS AND POTENTIAL DAMAGE On the surface, the vulnerability of wireless devices to viruses and malicious code threats appears to follow the same patterns of vulnerabilities that the wired world has experienced. Yet, upon...

Words: 4071 - Pages: 17

Premium Essay

Malicious Code Attack

...Karen Barber ITM – 5600 – Information and Communications Security Assignment: Summary Report on a Malicious Code Attack Malicious code is the term used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a computer or system without the owner’s knowledge or consent. Upon entering the system, there are much exploitation of vulnerabilities, like viruses, worms, Trojan horses, spyware, adware, and rootkits. Malicious code is an application security threat that cannot be efficiently controlled by conventional antivirus software alone. Malicious code can either activate itself or activate after a user perform an action, such as clicking on something or opening an email attachment. Malicious code describes a broad category of system security terms that includes attack scripts, viruses, worms, Trojan horses, backdoors, and malicious active content. The Spamhaus Project is a cyber attack that is described as the largest in history apparently starting over an argument over spam. The prolonged denial-of-service assault is targeting The Spamhaus Project; a nonprofit European filtering service that helps organizations to fight spam by weeding out unwanted emails has gone after CyberBunker, a Dutch data-storage company that offers hosting to any websites/content "except child porn and anything related to terrorism." On March 18, 2013, Spamhaus added CyberBunker (whose servers shows “cb3rob...

Words: 728 - Pages: 3

Free Essay

An Overview of Computer Viruses in a Research Environment

...reality a very small part of a much more general threat, specifically attacks aimed at subverting computer security. This paper examines computer viruses as malicious logic in a research and development environment, relates them to various models of security and integrity, and examines current research techniques aimed at controlling the threats viruses in particular, and malicious logic in general, pose to computer systems. Finally, a brief examination of the vulnerabilities of research and development systems that malicious logic and computer viruses may exploit is undertaken. 1. Introduction A computer virus is a sequence of instructions that copies itself into other programs in such a way that executing the program also executes that sequence of instructions. Rarely has something seemingly so esoteric captured the imagination of so many people; magazines from Business Week to the New England Journal of Medicine [39][48][60][72][135], books [20][22][31][40][50][67][83][90][108][124], and newspaper articles [85][91][92][94][114][128] have discussed viruses, applying the name to various types of malicious programs. As a result, the term “computer virus” is often misunderstood. Worse, many who do understand it do not understand protection in computer systems, for example believing that conventional security mechanisms can prevent virus infections, or are flawed because they cannot. But computer viruses use a number of well-known techniques in an unusual order; they do not employ previously-unknown...

Words: 12539 - Pages: 51

Premium Essay

Computer

...Computer crime Computer Crime Definition A computer crime is any illegal action where the data on a computer is accessed without permission. This access doesn't have to result in loss of data or even data modifications. Arguably the worst computer crime occurs when there are no indications that data was accessed. Computer crime is often attributed to rogue hackers and crackers, but increasingly organized crime groups have realized the relative ease of stealing data with relative low-level of risk. Government organizations are also rumored to be involved with hacking in to computer systems, but the legality of such actions is far too grey an area to be discussed here. Computer crime, or cybercrime, refers to any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of a crime.[1] Netcrime refers, more precisely, to criminal exploitation of the Internet.[2] Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise. On the global level, both governments and non-state actors continue to grow in importance, with the ability to engage in such activities as espionage, financial theft, and other cross-border crimes sometimes referred to as cyber warfare. The international legal system is...

Words: 7299 - Pages: 30

Premium Essay

General

...SE571 Principles of Information Security and Privacy Table of Contents Executive Summary 1 Company Overview 2 Security Vulnerabilities 3 Hardware Vulnerability 3 Software Vulnerability 4 Policy………………………………………………………………………………...…5 Recommended Solutions 9 Hardware Solution……………………………………………………………………10 Software / policy Solution 10 Budget…...…………………………………………………………………………….11 Summary………………………………………………………………………………...11 References……………………………………………………………………………….12 Executive Summary Over the past 50 years, Boeing Aerospace Consulting (BAC) has dominated the Aerospace industry. Focusing more on client’s solution compromised BAC technology infrastructure. New technology inventions are frequently in the process of being developed, hackers formulate new ways to perform malicious attacks and fraud to take advantage of small and large companies. Today society has evolved in many ways, from the Roman Empire with modern electronic communication. Technologies, from those who discover the handiness, influence our lives with convenience, life, and many time horrible unforgiving acts. Maintaining security should always be the scope of a company priority. With those mental imperative in mind Boeing Aerospace Consulting (BAC) will focus to formulate solution for the growing Cyber, and other vulnerability attacks security policies have lacked within the company. ...

Words: 1288 - Pages: 6

Free Essay

Virus

...Business problem to be sold is how to prevent viruses from infection the networked computers, education the staff on what a virus is and why it is important to know what harm it can do to you network. How to prevent getting a virus, and why you should use encryption software when sending important data to others in your business. This will provide instie for the company and help them keep cost down as they will not have to keep hiring or paying for an IT technician to fix and repair their systems, and also why the use of encryption usage will keep their confidential information from getting in to the wrong hands or the hands of a competitor. Company Background Wing Warehouse is a sport bar and grill, famous for their wings and such. It is not just a bar it is a family fun and dining area also. The company is growing quickly in the last month 2 new locations in the Ohio area have opened. At the 17 locations just in Ohio 7 of those are run by one single manager, in saying so he must you a main office and network and share files and such for easy access with the other stores. The total numbers of employees that use the computer networked systems are around 3,000. In saying this even managers do not have all the computer knowledge they need to run a business successfully and without having any computer issues. Recently they were affected by a huge computer virus that shut down 7 of the stores for two days. Being that this is a very popular place for family and fun it took a huge toll...

Words: 2674 - Pages: 11

Premium Essay

Crm and Impact

...Executive summary The organization information system is backbone of organizational operational and functional units, the malware can produce potential threat to organization image, the establishment of an effective security measures and reassessment of organizational risk management approaches in order to cater with latest implication trend in network security. This report is based on literature review, analytical analysis of case studies, news articles magazines to highlight vulnerability and implication of malware attack to an organization, highlights the salient features of malware attack, malware attacks that can significantly hurt an enterprise information system, leading to serious functional commotions, can result into destructing the basic IT security up to identity theft, leakage of data, stealing private information, corporate information system blue prints, industrial white papers and networks break down. The only constant in the world of technology is a change, report highlights the latest trends, dimension and implication of malware attack and new critical source of threats, within the perspective of constantly changing IT world (e.g. cloud services-integration) Enterprise may not effectively device and manage malware threat and 'risk assessment processes. This report highlight the malware propagation process, malware vulnerability, the types of malware, optimistic cost effective solution in order to minimize security risk for an Enterprise information...

Words: 3648 - Pages: 15

Premium Essay

Brief for the New Cso, Which Will Provide Her with the Basics of Cyber Security, Acquaints Her with the Current Threats Facing Your Organization's Data Infrastructure, and the Legal Issues Related to Protecting the Enterprise.

...December 9, 2010 Congressional Research Service 7-5700 www.crs.gov R41524 CRS Report for Congress Prepared for Members and Committees of Congress The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability Summary In September 2010, media reports emerged about a new form of cyber attack that appeared to target Iran, although the actual target, if any, is unknown. Through the use of thumb drives in computers that were not connected to the Internet, a malicious software program known as Stuxnet infected computer systems that were used to control the functioning of a nuclear power plant. Once inside the system, Stuxnet had the ability to degrade or destroy the software on which it operated. Although early reports focused on the impact on facilities in Iran, researchers discovered that the program had spread throughout multiple countries worldwide. From the perspective of many national security and technology observers, the emergence of the Stuxnet worm is the type of risk that threatens to cause harm to many activities deemed critical to the basic functioning of modern society. The Stuxnet worm covertly attempts to identify and exploit equipment that controls a nation’s critical infrastructure. A successful attack by a software application such as the Stuxnet worm could result in manipulation of control system code to the point of inoperability or long-term damage. Should such an incident occur, recovery from the damage to the computer systems programmed...

Words: 5499 - Pages: 22

Premium Essay

Social Media

...society is communicating through social networking sites. News spreads faster through these sites but can also give false information just as fast. There are problems that have become a social issue such as cyberbullying and security attacks. “49.5% of students reported being the victims of bullying online and 33.7% reported committing bullying behavior online. 800,000 minors were harassed or cyberbullied on Facebook according to a June 2012 Consumer Reports survey (PR, N., 2012)”. Adults are also victims of cyberbullying, and the problem with that is adults are supposed to be examples. If children see their parent’s bad behavior, then they are being shown its okay to bully one another. In 2012, Facebook’s chat window infected with a virus called Steckt.evl attacked users. The chat box would show up as you scroll down your Facebook page, looking like a link from a friend. When you click on the...

Words: 901 - Pages: 4

Premium Essay

Computer Virus

...Summary The project introduces the readers to the basic concept of virus and provides an insight of the history of virus. The report also analyses the spread of viruses and defines certain measures that computer users may take into account to avoid viruses. Overall ,it was learnt from the report that it is important to keep us updated about computer viruses to be able to successfully safeguard us from computer virus attacks Introduction to Computer Virus: Viruses are mischievous programs, the purpose of which is to disrupt the sensible use of computers. It is a type of a mal-ware and do little more than display a message( Usually insulting!!!) on the screen , but some are designed to act after a certain period of time and do such things as make the letters start to drop off the screen or even erase the entire contents of your hard disk. As their name suggests, viruses are able to spread by infecting other disks and they do this by copying themselves onto other disks which are being used by the computer. Viruses are little programs or scripts that can create files, move files, erase files, consume your computer's memory, and cause your computer not to function correctly or to crash completely. Some viruses can duplicate themselves, attach themselves to programs, and travel across networks. They can self-modify or change over time as they copy themselves.  Viruses only spread across multiple computers if an uninfected computer is connected...

Words: 2136 - Pages: 9

Premium Essay

Security Assessment for Aircraft Solutions

...Security Assessment for Aircraft Solutions Table of Contents Executive Summary 3 Company Overview 3 Security Vulnerabilities 4 Hardware Vulnerability – Absence of a Firewall 4 Policy Vulnerability – Lack of Timely Updates 5 Recommended Solutions 6 A Hardware Solution 6 Impact on Business Processes 9 A Policy Solution 9 Impact on Business Processes 10 Summary 10 References 12 Executive Summary This report will seek to evaluate and address security weaknesses with the Aircraft Solutions company. As security weaknesses are pointed out relating to hardware and policy weaknesses, recommendations will be made to Aircraft Solutions to be examined and hopefully implemented to improve IT security operations. Aircraft Solutions, located in Southern California, recognized leader in the design and fabrication of component products and services for companies in the electronics, commercial, defense, and aerospace industry. In reviewing Aircraft Solutions and its operations, uncovered were security vulnerabilities. Two vulnerabilities that were evident were issues with a lack of firewalls and the current security policy in place that is reviewed only every two years. Recommendations have been made that made help to remedy these vulnerabilities through the use of virtualization and by changing the security policy to be evaluated semi-annually instead of every two...

Words: 2450 - Pages: 10

Free Essay

Paul

...COMPUTER CRIMES A Case Study submitted in partial fulfilment of the requirements for the completion of the course in CIS401M: IT ETHICS AND LEADERSHIP Term 3, Academic Year 2014-2015 by LORETO V. SIBAYAN PAUL MATTHEW G. AVILA Master of Science in Information Technology College of Computer Studies April 2014 TABLE OF CONTENTS ABSTRACT 5 CHAPTER 1 1.0 INTRODUCTION 6 CHAPTER 2 2.0 OVERVIEW OF LITERATURE 8 2.1 CYBERCRIME 9 2.2 THEORIES OF CRIME 2.2.1 CRIMINOLOGICAL THEORIES 10 2.2.2 PSYCHOLOGICAL THEORIES 12 2.3 TYPES OF CRIME 14 2.3 CAUSES CYBERCRIME 19 2.4 CYBERCRIME PREVENTION 22 CHAPTER 3 3.0 ANALYSIS CYBERCRIME CASES 26 SUMMARY OF CYBERCRIME CASES 38 CONCLUSION AND RECOMMENDATION 43 REFERENCES 44 ABSTRACT The 21st century has brought about certain influences in the lives of everyone including the way we do business transactions, the way we gain education and the way we communicate; these influences are mostly revolutionized through the use of modern day technology and though these technologies have been proven to be beneficial to the entire society, it also carries with it aspects that can be worrying for everyone. Certain professionals in the said field use their expertise to illegally develop ways on how to take advantage of others with of course the use of technology hence cybercrime...

Words: 7997 - Pages: 32

Premium Essay

Case Study Rbs Computer Failure ‘Caused by Inexperienced Operative in India’

...1.0 INTRODUCTION The information system is the impact on society. It is important to understand that information technology has had beneficial result, as well as detrimental effects on society and people in each areas. For example, computerizing a manufacturing process may have the beneficial result of improving working conditions and producing product of higher quality at lower cost, but it also has the adverse effect of eliminating people’s job. The person that in charge as a manager should involve in managing and minimize the detrimental effect of business applications information technology and optimize their beneficial effects. Other than that, the information system have as more than a set of technology that support efficient business operations, work group and enterprise collaboration, or effective business decision making. Information system technology can change the way business compete. Furthermore, information system application it’s also provide effective support of a company’s strategy for gaining competitive advantage. The information system also involve using information technology to develop products, services and capabilities that gives a company strategy to improve and to enter the market place. The information technology to help an organization gain competitive advantage. Besides that, the outsourcing also have to take care. These because, outsourcing this work will help shall cut cost and focus on systems that improves the competitive advantages...

Words: 2968 - Pages: 12

Premium Essay

Computer Security

...CHAPTER 3 CO M P U TE R A N D I NT E R N E T C R IME QUOTE In view of all the deadly computer viruses that have been spreading lately, Weekend Update would like to remind you: when you link up to another computer, you’re linking up to every computer that that computer has ever linked up to. —Dennis Miller, Saturday Night Live, U.S. television show VIGNETTE Treatment of Sasser Worm Author Sends Wrong Message Unleashed in April 2004, the Sasser worm hit IT systems around the world hard and fast. Unlike most computer viruses before it, the Sasser worm didn’t spread through e-mail, but moved undetected across the Internet from computer to computer. It exploited a weakness in Microsoft Windows XP and Windows 2000 operating systems. By the first weekend in May, American Express, the Associated Press, the British Coast Guard, universities, and hospitals reported that the Sasser worm had swamped their systems. Computer troubles led Delta Airlines to cancel 40 flights and delay many others. Microsoft quickly posted a $250,000 reward, and by mid-May, authorities apprehended Sven Jaschen, a German teenager. Jaschen confessed and was convicted after a three-day trial. Jaschen could have received up to five years in prison, but because he was tried as a minor, the court suspended his 21-month sentence, leaving him with only 30 hours of community service. Copyright © 2007 by Thomson Course Technology. All rights reserved. This publication is protected by federal copyright...

Words: 18526 - Pages: 75

Premium Essay

Compethicsass1

...1. Thou shall not use a computer in ways that may harm people. The commandment of Computer Ethics states that it is dishonest to use a computer or other smart devices in practices like hacking, spamming, phishing, piracy or cyber bullying. It is unethical to use computer for accessing private files in order to steal information and use it in harmful matters. Similarly, it is unethical to design programs or applications that lead to unsolicited and unauthorized access to personal data. Designing harmful programs and using applications to manipulate and destroy information is wrong and, in many cases, illegal. Nowadays, almost everyone is accessible online, constantly inputting and downloading information. Facebook, Tweeter and Instagram are perfect examples of people sharing everyday data about their lives and exposing themselves to others. With ease of finding information, we are all widely exposed to fraud, cyber-stocking and cyber-bulling. Unfortunately, such exposure may lead not only to mental, but also physical pain, resulting in suicidal or bullied teenagers, silly prank makers and sexual criminal charges of a promising Texas college student. In my opinion, people should get educated on how to use a computer and protect themselves online. Just like it is not a common practice to leave an unlocked car parked on a busy street with a ”key inside” note on a window, it shouldn’t be that easy to record personal information online for everyone to see, share, misuse or judge...

Words: 1524 - Pages: 7