Computer Viruses Research

Improved Essays
According to website cloud tweaks, about $4.55 Billion U.S. dollars are spend in a U.S. house-holds per year from viruses, spyware and other malware ("Cloud Infographic”, 2014). All of money is wasted due to the lack of security. When thinking about security, the first thing that comes to mind is passwords. Many things today are password protected in order to keep protection for personal belongings. This can range from protecting Facebook conversation chats to protecting online bank account information. Even with things that are password protected hackers still seem to gain access to personal information. Hackers use different kinds of malware to cause damage to their victims. There are many kinds of malware in this world. However, there are …show more content…
The most used malware is a virus. 57% of things that infect us are viruses. Viruses, as explained by Microsoft, are software programs that are designed to spread to computers and meddle with computer operation ("What Is a Computer Virus?"). Fred Cohen correctly coined the term computer virus in 1985. Viruses secretly attach themselves to a document or another program and they execute when that document or program is opened. Viruses require user action to execute. This means that the user must do something to trigger the virus. However, once it is triggered it replicates itself by spreading to other computers. As mentioned on Wikipedia, most of viruses target systems that run Microsoft Windows. There are 4 phases that a virus goes through. The first phase known as the dormant phase is when the virus is idle. The dormant phase is when the virus is triggered. The second phase, known as propagation phase, is when the virus starts multiplying itself. The third phase, known as triggering phase, is when the dormant virus gets triggered it comes to this phase. The last phase is known as execution phase and this is where the virus actually does what it was intended to do ("Computer Virus"). There are many reasons why people create virus. For example, people may gain profit from a virus; they may want to gain access to …show more content…
As defined by Wikipedia, Phising is used to get information like usernames, passwords and credit card information and they are disguised as trustworthy. Phishing is a homophone of fishing because it is similar to fishing in the way that the scammers are using a bait to catch the victim. Phishing is an example of social engineering ("Phishing"). Phishing starts with scammers sending an email to the victim asking them to confirm their password or their payment information and the email is usually a link to a website. The fake website looks exactly like the real one. On the website the victim is asked to confirm their password or payment information. The scammers usually get access to all the victims’ information through phishing. In addition phishing emails can also have links that lead to websites that have malware. The way to prevent phishing is not to open any spam mails unless you are hundred percent sure it is not a junk mail. Also, when you get an email on confirming any information, do not use the link in the email. Type it on Google and go to the official website and then confirm the information if

Related Documents

  • Improved Essays

    Nt1310 Unit 5 Paper

    • 415 Words
    • 2 Pages

    "If you're looking for malware you won't see breaches using legitimate credentials," Kurtz explained. Simply put, hackers are stealing login information and using those credentials to access applications and sensitive data. As a result, it's hard to identify when organizations are breached, and many have lost data, only to discover those intrusions months and years later. 2.5.2 Lateral hacker movement/breach containment: Once cybercriminals find their way inside corporate networks, they're moving laterally between applications until they find the most sensitive and valuable data. " Cryptographic isolation and end-to-end encryption prevents lateral movement.…

    • 415 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Threat Assessment of ‘Important Security Alert From Windows’ Pop-Ups: ‘Important Security Alert From Windows’ Pop-Ups has created havoc among computer users that does not allow them to usually work in the computer. Where this adware has found its own method to attack the targeted system and to make the infected computer almost useless. In order to trouble computer user, it performs several malicious activities to use the security gaps in the system and it leads to freeze the entire running programs of the computer. Firstly, this malware program affect the processing speed of the infected computer to stop the basic functions of the system so that the computer will respond very slowly when user give any instructions.…

    • 425 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Please research one virus and one worm, and write a maximum 2-page single-spaced paper explaining what each of them is, what they do, what their impact was, what the mechanics of how they work are (the technical aspect), and how were they stopped. Computer virus: It is a piece of code which is loaded onto the computer without the user knowledge and runs itself. When this code is executed, it makes a copy of itself and inserts this copy into another computer programs, data files of the hard drive. Such small virus also steals hard disk space and CPU time , corrupts data.…

    • 1405 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Nt1330 Unit 7

    • 1149 Words
    • 5 Pages

    Rootkits allow viruses and malware to “hide in plain sight” by disguising as necessary files that your antivirus software will overlook (What is a Rootkit Virus?). Owners are able to implement files, monitor what’s being down on the computer and change the systems on the…

    • 1149 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3 Term Paper

    • 621 Words
    • 3 Pages

    Security Ecommerce site Phishing, “brand spoofing” or “carding”, is not a “pass-time” process but is a business-like on which organized crime groups extensively use and make a big deal of money. Phishing, being one of the most security challenges, is a hacking technique of malicious and fraudulent mass mailing, masquerade as emails from government agencies, business partners or even company executives using modern way such as social media, phone calls and any other communications to get access to usernames and passwords, credit cards or other sensitive information to steal valuable data. According to Anti-Phishing Working Group (APWG), an increase of 86% of phishing attacks in companies from 2013 to 2015 has been analyzed (source: Forbes).…

    • 621 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    The Norwalk Virus is the most common cause of epidemic nonbacterial gastroenteritis in the world. It is named for the city of Norwalk,Ohio in which the first confirmed outbreak occurred in 1968,infecting almost all the students and teachers of a nearby school. This epidemic, also known as Norovirus, is spherical shaped with hexagonal designs spanning all round its surface. When examined through a microscope,this virus can be in different colors ranging from red and orange to blue and green.…

    • 132 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Virus Taxonomy Order: Unassigned Family: Bunyaviridae Genus: Phlebovirus Species: Toscana virus talk.ictvonline.org Structure and genome The toscana virus (TOSV) is a negative-single stranded RNA virus, it is spherical in shape, it has an enveloped surrounding its capsid, and it has a diameter of 80–120 nm. Its genome is partitioned into three segments, termed (large)L, (medium)M and (small)S. With L about 6,400 nucleotides in length, M about 4,200 nucleotides in length, and S about 1,900 nucleotides in length. L encodes for the viral polymerase, M encodes for structural glycoproteins and S encodes for nucleoproteins (kuhn,Bebermeyer & Hartmann-Klosterkotter , 2005). Pathogenesis…

    • 668 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Norovirus Research Paper

    • 622 Words
    • 3 Pages

    Introduction Norovirus infection causes inflammation in the stomach and intestines (gastroenteritis) and food poisoning. It is caused by exposure to a virus in a group of similar viruses called noroviruses. Norovirus spreads very easily from person to person (is very contagious). It often occurs in places where people are in close contact, such as schools, hospitals, and restaurants. You can get it from food, water, surfaces, or other people who have the virus (are contaminated).…

    • 622 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    I am talking about a computer virus, which is designed to spread from host to host and has the ability to replicate itself through a file or document on a computer. I chose to talk to about two viruses: Sircam and AIDS. The Sircam Virus is a computer worm that propagates by e-mail from Microsoft Windows systems. In July of 2001, the Virus was sent through email with an infected link in one of their many messages they send: “I send you this file in order to have your advice, I hope you like the file that I send you, I hope you can help me with…

    • 627 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Airborne viruses like measles should cause parents against vaccination to reconsider their stance. Airborne viruses can remain in the air for 2-3 hours after the infected person leaves the rom. To contract measles, one only needs to breathe the same air as an infected person, meaning measles is a highly infectious virus. If exposed, there is a 90% chance the unvaccinated person will contrast measles, with the most susceptible being children.…

    • 210 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Noroviruses (NoV) are important human pathogens and a major public health threat. Noroviruses are non-enveloped, single-stranded, positive sense RNA viruses that cause acute gastroenteritis in humans (1-4). Noroviruses have been referred to as ‘cruise ship viruses’ from well-publicized cruise ship outbreaks although these outbreaks account for less than 1% of all outbreaks worldwide (5). The symptoms and illness associated with Norovirus infections is often referred to as ‘stomach flu’, despite little resemblance to the influenza virus. Noroviruses are responsible for 21 million infections and over 70,000 hospitalizations annually in the USA, and account for 10-15% of severe cases of gastroenteritis in children less than 5 years old (6).…

    • 528 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Spyware Research Paper

    • 751 Words
    • 4 Pages

    Agreeing that spyware is a good way to protect teens and their health. Spyware is a type of undercover job to keep the parents always knowing what their teens are doing. Spyware can help parents always knowing what their teens are doing. Spyware can also be explained to teens by their parents and them maybe the spyware will make parents embarrass their teens and the teens may lose a good relationship between the parents and their kids.…

    • 751 Words
    • 4 Pages
    Decent Essays
  • Improved Essays

    An unrecognised virus called coronavirus is the reason for severe acute respiratory syndrome. There are numerous sorts of coronavirus, some of which cause the common flu. The SARS coronavirus (SARS-CoV) was another variation that may have been transmitted to people from animals. Although SARS has the same symptoms as the flu (fever ,dry coughs ,and having difficulties in breathing) it leads to other major effects such as lung failure , pneumonia, and damaging immune cells. SARS CoV harms the body by contaminating epithelial cell of the lung that is approached by the viral particles.…

    • 419 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Contagion Movie Essay

    • 1325 Words
    • 5 Pages

    Viruses; Who is the Beholder? The greatest threat to humanity can’t be seen by the untrained eye. It could lay dormant for millions of years and evolve into the most terrifying form of itself. These infectious viruses create worldwide terror. The 2011 film Contagion by Steven Soderbergh does an incredible but also frightening job of revealing how a lethal virus would impact the Earth.…

    • 1325 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    There are actually many similarities between computer biological viruses. To name a few, susceptibility differs in each individual, and some are specific to a certain type of host. A virus has the ability to integrate itself into the DNA or hard drive and the user or host is usually unaware of the virus until it’s caused a lot of damage. Each type of virus mutates, and can be spread from system to system. There are enough similarities, it should be said – thinking that uploading the human brain into a computer would make us healthier and increase our lifespan is a pipe dream.…

    • 1395 Words
    • 6 Pages
    Superior Essays

Related Topics