Computer Viruses Research

Good Essays
According to website cloud tweaks, about $4.55 Billion U.S. dollars are spend in a U.S. house-holds per year from viruses, spyware and other malware ("Cloud Infographic”, 2014). All of money is wasted due to the lack of security. When thinking about security, the first thing that comes to mind is passwords. Many things today are password protected in order to keep protection for personal belongings. This can range from protecting Facebook conversation chats to protecting online bank account information. Even with things that are password protected hackers still seem to gain access to personal information. Hackers use different kinds of malware to cause damage to their victims. There are many kinds of malware in this world. However, there are …show more content…
The most used malware is a virus. 57% of things that infect us are viruses. Viruses, as explained by Microsoft, are software programs that are designed to spread to computers and meddle with computer operation ("What Is a Computer Virus?"). Fred Cohen correctly coined the term computer virus in 1985. Viruses secretly attach themselves to a document or another program and they execute when that document or program is opened. Viruses require user action to execute. This means that the user must do something to trigger the virus. However, once it is triggered it replicates itself by spreading to other computers. As mentioned on Wikipedia, most of viruses target systems that run Microsoft Windows. There are 4 phases that a virus goes through. The first phase known as the dormant phase is when the virus is idle. The dormant phase is when the virus is triggered. The second phase, known as propagation phase, is when the virus starts multiplying itself. The third phase, known as triggering phase, is when the dormant virus gets triggered it comes to this phase. The last phase is known as execution phase and this is where the virus actually does what it was intended to do ("Computer Virus"). There are many reasons why people create virus. For example, people may gain profit from a virus; they may want to gain access to …show more content…
As defined by Wikipedia, Phising is used to get information like usernames, passwords and credit card information and they are disguised as trustworthy. Phishing is a homophone of fishing because it is similar to fishing in the way that the scammers are using a bait to catch the victim. Phishing is an example of social engineering ("Phishing"). Phishing starts with scammers sending an email to the victim asking them to confirm their password or their payment information and the email is usually a link to a website. The fake website looks exactly like the real one. On the website the victim is asked to confirm their password or payment information. The scammers usually get access to all the victims’ information through phishing. In addition phishing emails can also have links that lead to websites that have malware. The way to prevent phishing is not to open any spam mails unless you are hundred percent sure it is not a junk mail. Also, when you get an email on confirming any information, do not use the link in the email. Type it on Google and go to the official website and then confirm the information if

Related Documents

  • Decent Essays

    1) What is the difference between a virus and other types of malicious code? A virus is a particular type of malicious program designed to duplicate itself and spread from system to system. Normally, viruses attach themselves to files that can be shared enabling the malicious code to access to new computers. Viruses that are more complex may take over your email client, mailing copies of themselves to the contacts for a faster, more effective transmission (Fritsch et al, 2015). Numerous virus contain a load designed to damage the system’s data, while others only spread without causing direct damage to their hosts.…

    • 1458 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Cyber Security Failure

    • 802 Words
    • 4 Pages

    A tool that many of the hackers are now armed with, is the use of social engineering techniques that are luring people to websites that are full of malware and many types of spy wear. (Howarth). An acritical for SecureWorld put it this way “You can have the very best security tools and programs in place using state-of-the-art computer systems, yet all it takes is just one click to bring it all down” (Cybersecurity). This is the reality that we live in today; that we have to be extra cause on what we click and double check who. To make clear what a security attack is, it is a “A security event that has been identified by correlation and analytics tools as malicious activity that is attempting to collect, disrupt, deny, degrade or destroy information system resources or the information itself” (Gallagher).…

    • 802 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Thisanonymous hacker does its best toremove all the evidences of the system thats being hack, defy the intrusion detection alarms and thus avoid any form of legal actions against him. This was the third phase of hacking.In the last phase, they are ready to clear all the tracks and logs which get stored in the server log due to their activity. This is a must…

    • 1032 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Unfortunately with that success, there are more opportunities for hackers to override those systems in order to steal information from unsuspecting users who have entrusted their most private information into the computer system. With credit card, bank account and all personal information stored on the computer now, all of…

    • 1143 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    and how to protect from it ?. More susceptible to this malware who browser suspicious sites which mean some sites are already get hacked from hackers and the hackers have hidden ransomware. To be more safe , users and employments should not visit a susceptible sites and if they need to visit make sure that browser is updated and do not download any execution file. As I mentioned the common attack method of ransomware. So we can always have seen that attack come in after the victim accept which mean the attacker convince the victim to open the link or the execution file.…

    • 1452 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Nothing brings more fear to an individual when learning that a malicious code has been entered in his or her computer. This fear is the same feeling one experience when their credit card is stolen or compromised. The feeling of security quickly diminishes. Just what is a malicious code? Simply put, malicious codes are programs just like any other computer program which performs an explicit action.…

    • 1682 Words
    • 7 Pages
    Decent Essays
  • Decent Essays

    Most, if not all, computers can be inflicted by Malicious software (Malware) are hard to fix an infection found in the system. It can lead to hacking, leaking of valuable information and a vulnerable threat to security. It requires no intervention to propagate across computer networks like the flu shot. Moreover, there are many types of malware like Trojan horses, viruses, worms, rootkits, spyware which penetrates specific application to deteriorate the system thus stealing confidential data from computer. As a consequence, these malware propagates through computer hardware gradually and pave a new way to penetrate operating system.…

    • 1094 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Users infected by web site that contain malicious ads. Because the ads have code that scans user 's system for vulnerabilities. The vulnerability can be exploited to cause the system to download malware and execute it. Finally, it infects the system with a data-stealing program. (Nappa, Rafique & Caballero,…

    • 1807 Words
    • 8 Pages
    Decent Essays
  • Decent Essays

    Some of the pratical uses of cyber attacks are- fake wireless access points, cookie theft, and file name tricks. Fake wireless access enables hackers to mimic the free wifi of the establishment they are currently in. When users coonect the hacker can then sniff the users computer for unprotected data. With cookies theft hacks gather information about the users search sites, followed by log-in passwords. This in return allows them to replicate that particular user.…

    • 1138 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    The Malware Life Cycle Ka Vang Walden University The Malware Life Cycle There are many risks involved in cyber security, some more serious than others. This can range from viruses erasing an entire system, attackers hacking into a system and modifying files or attacking others, compromising sensitive information such as credit card and personal information, and more. Although these types of issues exist, there is no guarantee that even taking the best precautions will ensure 100% protection. Instead, the best option is to take the necessary steps to minimize the chances. Motivations and Evolutions A hacker’s motivation is varied and complex.…

    • 1603 Words
    • 7 Pages
    Decent Essays

Related Topics