Malware: The Computer Virus

Improved Essays
Over the years, America and other nations all over the world have gone through many changes. One of those changes involves the evolution of technology. Technology has become so advanced that there is literally a more advanced way to handling daily operations. From automatic cash registers to intelligence gathering, technology has inevitably played an essential role in the way the countries all over the world have advanced. Unfortunately with that success, there are more opportunities for hackers to override those systems in order to steal information from unsuspecting users who have entrusted their most private information into the computer system. With credit card, bank account and all personal information stored on the computer now, all of …show more content…
Over the years, the term Malware has taken on different names and meanings. Before Malware became the definitive term, it was known as the computer virus. The term Malware was coined in 1990 by scientist Yisrael Radi. Although Malware was known as a different name before 1990, the purpose of Malware is still the same. Malware is defined as malicious software that is installed and designed with the purpose of infecting the user’s computer system. Malware can either affect the user individually or it can effect and damage the entire organization. The victim circumstances depend on the hacker’s intent.
Although Malware is designed for malicious intent, the system itself is only the broader term. Malware is the overall software that is designed, but there are variants of Malware that are more specific and have different intents when it comes to the victim. Among those variants include Trojan Horses, Worms, Rootkits, Spyware and Phishing. The terms are different and each form of Malware are known for their own purposes. As a collective unit, their purpose is universally the same, which is to inflict as much damage on the user or users as much as
…show more content…
As many would guess, this form of Malware was derived from the Greek story of the Trojan horse, which the Greek used to deceive the Trojans into their most sanctified wall. By gaining entry into the Trojan wall without the Trojans knowing, the Trojans were ultimately destroyed and their wall crumbled. The Trojan horse virus is essentially the same way. It is a program that appears to be harmless, but in actuality it is designed to unload worms, viruses and spyware. It is considered to be one of the more dangerous forms of Malware, due to its inability to replicate and its difficult classification as a virus. Another reason that it is considered to be one of the more dangerous forms of Malware is due to the fact that it is secretive and unsuspecting. The attachment appears to the user’s email account or server as a harmless attachment. Once the user opens the attachment, the software is downloaded and all of the personal information that is stored on the computer is now in the hacker’s

Related Documents

  • Improved Essays

    This is one of the biggest question that occurs in the head, such as “ How ‘Important Security Alert From Windows’ Pop-Ups sneaks in the computer?” According to experts, this threat comes due to human weakness and unsafe browsing habits. Almost every computer user wants to download free stuff like background images, songs, videos, applications, add-ons at free of cost so that they download it from unreliable sources, which often contains malicious threats. In addition, many users receive floods of spam e-mails, which claims "you are selected as the today's happiest winners" or offers loans at very low interest rates.…

    • 425 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Please research one virus and one worm, and write a maximum 2-page single-spaced paper explaining what each of them is, what they do, what their impact was, what the mechanics of how they work are (the technical aspect), and how were they stopped. Computer virus: It is a piece of code which is loaded onto the computer without the user knowledge and runs itself. When this code is executed, it makes a copy of itself and inserts this copy into another computer programs, data files of the hard drive. Such small virus also steals hard disk space and CPU time , corrupts data.…

    • 1405 Words
    • 6 Pages
    Superior Essays
  • Brilliant Essays

    Pt1420 Unit 1 Essay

    • 1006 Words
    • 5 Pages

    A Short History of Computer Viruses. [ONLINE] Available at:https://antivirus.comodo.com/blog/computer-safety/short-history-computer-viruses/. [Accessed 08 October 2015]. Into The New World: CASE STUDY NO. 5. 2015. Into The New World: CASE STUDY NO. 5. [ONLINE] Available at:http://febzmagz.blogspot.co.uk/2011/04/case-study-no-5.html.…

    • 1006 Words
    • 5 Pages
    Brilliant Essays
  • Improved Essays

    Given the University’s many diverse systems and disparate departmental roles managing the various systems the overall information security plan was not update to date nor consistent. There were obvious holes in the security plan which allowed a hacker to infiltrate the main domain server. The hacker secured administration rights on the server and they managed to infect other systems attached to the network. Thankfully, a trail of clues were found by the administrators.…

    • 671 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Once this scareware infiltrated the computer then, it encrypts the file of the victim and adds the file name with ".KilledXXX" extension like "Sample.jpg" changed to "sample.jpg.killedXXX”. After that, Jhon Woddy Ransomware locks the screen of the computer and…

    • 341 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Win32 Zlob Research Paper

    • 326 Words
    • 2 Pages

    It gets into your system via spam mails or unauthorized programs and websites. Once it gets into your system, it starts attracting other similar type of viruses and malware and then all these viruses launch a collective attack on the system, virtually turning…

    • 326 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Stallings and Brown (2012) describes malware as “a program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim’s data, applications, or operating…

    • 825 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    What is Crystal Ransomware? Crystal Ransomware is a dubious PC contamination recognized as ransom. This notorious PC threat is a dreadful document encryption virus that utilizations AES and RAS ciphers to lock your records. It can undoubtedly intrude in your machine without consent and encrypt every one of your information without authorization.…

    • 276 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Ransom Ware Case Study

    • 421 Words
    • 2 Pages

    Case Project 2-5 Ransom ware is a program that prevents a user’s device from properly operating until a fee is paid. Ransom ware is malware that is highly profitable. Variation of ransom ware displays a fictitious warning that there is a problem with your computer, even if your computer is old or new, ransom ware reports the same problem. There are many types of ransom attacks, FBI warnings saying that you are a victim of child pornography is one that is most common and something we see on our computers today. A recent ransom ware attack happened in Hollywood.…

    • 421 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    It may also do a task without you knowing about it. Malware probably looks innocent enough to you, but it is a very dangerous site by installing an authorized program. Malware may be a word document or a PowerPoint presentation. Malware may also be a version of the Trojan Horse, which may appear after a successful virus attack. Once this malware is installed on your computer, the attacker can see what you are doing.…

    • 1229 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Researchers from Blue Coat Labs have identified the emergence of a previously undocumented attack framework that is being used to launch highly targeted attacks in order to gain access to, and extract confidential information from, victims’ computers. Because of the many layers used in the design of the malware, we’ve named it Inception—a reference to the 2010 movie “Inception” about a thief who entered peoples’ dreams and stole secrets from their subconscious. Targets include individuals in strategic positions: Executives in important businesses such as oil, finance and engineering, military officers, embassy personnel and government officials. The Inception attacks began by focusing on targets primarily located in Russia or related to Russian…

    • 141 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Based on information found at http://www.streetdirectory.com/travel_guide/119477/security/why_spyware_is_so_dangerous_to_you.html Spyware can be very personal to you in a way of stealing your information. Why and what it steals Among the very bad Spyware we find a thing called “malicious Phishing”. The people who make these Phishing site are usually skilled computer technicians and basically, talented people. They would much rather use their talent to hide behind fake web sites and make a mess of others.…

    • 172 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    I haven’t been able to use my computer for the past two weeks a virus and it wasn’t fun. Today, I’m trying to catch up with my online classes (Writing essentials and Write your life story) and writing in my blog. I can’t believe how much time I spent on my computer between my classes, my blog, Pinterest, and Facebook. So having a little break from all that it wasn’t that bad at all. I have a full-time job from Monday to Friday and beside my job I have to take care of my house, my grandkids (babysit after school), my husband, my dog, and my elderly dad who for the past year and half he moves into my home.…

    • 407 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The Enemy Virus

    • 557 Words
    • 3 Pages

    The Enemy, one of the most darkest young adult literature I have ever read. No matter what chapter I’m in, there’s always seems to be a zombie somewhere within the pages. If I were to use one word to describe this novel, it would be “gruesome.” Seriously, a mysterious virus that has no known cure to counter it turned all adults into child-eating zombies. Children and teens that aren’t over the age of 16 are immune to this virus for some reason.…

    • 557 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Ransomware Essay

    • 1262 Words
    • 6 Pages

    Information systems and the data they produce and store can save lives and start wars, among a multitude of other things. Because of this, information systems present a tempting target for attackers wishing to use them for personal gain, either through hacking or malicious software. One particular type of malicious software has been on the rise in recent years: ransomware. This paper will examine what ransomware is, how it has developed over the years, the effects it has, and how it can be prevented and dealt with.…

    • 1262 Words
    • 6 Pages
    Great Essays