StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Viruses and Worms - Research Paper Example

Cite this document
Summary
This research paper aims to discuss the computer viruses and worms, that are considered as a very serious computer security threats today. The researcher focuses on the analysis of the types, symptoms and methods of computer viruses, that affects other computer programs by replicating itself. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.3% of users find it useful
Viruses and Worms
Read Text Preview

Extract of sample "Viruses and Worms"

VIRUSES AND WORMS Table of Contents Table of Contents 2 Introduction 3 Computer Viruses 3 Types of Computer Viruses 4 How virus spread 5 Symptoms of Computer Virus 6 Methods of virus removal 7 How to protect against virus 7 What are Worms 8 Types of Computer Worms 8 Harms of Computer Worms 10 How to Protect Against Worms? 10 How to remove Computer Worm 11 Difference between virus and worm 11 Conclusion 12 Works Cited 13 Introduction In the present era of computer and communication technology, it has been observed that computer security and privacy has been compromised over the last few years. Additionally, the developments in the programming field have introduced a lot of expediencies to various walks of life however they have as well produced cyber hackers and techniques to perform computer related crimes at a great extent. In addition, at the present, computer viruses and worms are considered as a very serious computer security threats (Scribd Inc.), (Takamiya and Kasamoto) and (TechTerms). This report will present a detailed overview of computer viruses and worms. Computer Viruses A virus is a computer program that affects other computer programs by replicating itself. Additionally, a virus has the capability to duplicate itself by activation, with the intention that it is able to grow, always looking for latest host platforms. The majority risk-free viruses carry out operation in a way that they make their copies as well as extend to more computers. In addition, a computer virus code may perhaps affect additional computer software or it can totally change the data, conceivably self-devastating as performed. However, the only proof computer virus similar to this is the devastation they have caused on the affected PCs. Just because of this capability it becomes extremely hard to offer protection beside virus programs (McAfee) and (Shelly, Cashman and Vermaat). Moreover, during the last few decades, it is observed that computer viruses have been in action with the development of computer technology. A virus is perceived as “a self-copying computer code or program which multiplies by copying it into further documents or .exe files.” Similar to an actual virus, a computer virus changes the system of an available computer program to “control” it as well as starts its replication. Frequently computer viruses have a special task or attention, for example removing definite data files or causing harm to a computer system (McAfee) and (Shelly, Cashman and Vermaat). Types of Computer Viruses There are many types of viruses, some of which comprise: Polymorphic viruses: Polymorphic viruses alter their form with every attack. Additionally, these types of encrypted viruses are typically hard to perceive as they are superior at concealing themselves from anti-virus programs (Wright State University) and (McAfee). Boot Sector Viruses: These viruses are the oldest kind of virus. The influence of these viruses is observed on startup programs of computer and the virus activates itself with the startup of computer. Boot sector viruses are the type of viruses that spoil the boot sector (known as master boot record) of an infected system. These viruses initially change or over-write the actual boot code, by swapping it with devastated boot code. They will then move the actual boot sector data to an additional hard disk sector, then declaring that particular disk sector like a spoiled mark on the storage disk with the intention that it will become useless for future (Wright State University) and (McAfee). Macro Viruses: This kind of viruses utilizes commands known as macros those are fixed in further computer programs to cause harm and extend to additional related files used by that definite computer program. For example Microsoft applications such as Word and Excel use macros, and macros viruses are able to grow through the utilization of these certain commands (Wright State University) and (McAfee). File Viruses: File viruses have the capability to join themselves to further computer software programs. As the program is executed, the file virus makes its way to the memory locations so that it could be able to affect other executable files or start destructing the computer system (Wright State University) and (McAfee). Multi-partite viruses: These viruses affect both .exe files and boot sector of hard disk. They are the nastiest types of viruses since they are able to merge a few or all of stealth virus methodologies, through polymorphism practice to avert its exposure to various antivirus programs (Wright State University) and (McAfee). Stealth viruses: These types of viruses try to conceal from both the operating system capabilities and antivirus program. However, to perform this activity, they have to reside in computer memory so that they could be able to interrupt every effort to employ the operating system. Additionally, a stealth virus is able to conceal alterations it usually creates to directory framework, file sizes, and further features related to an operating system. Because portion of the virus stays in memory, resultantly users will experience less memory usage (Wright State University) and (McAfee). How virus spread Few cases which spread viruses are: (Media and Culture) and (McAfee) A person installs game software to use it on a PC that someone has copied from a home computer system. So without user knowledge, the game software was already infected with a virus code. Computer viruses as well spread by means of downloading malicious programs over the internet. A program acquired from a seller in agreement cover is spoiled since the actual consumer had attempted to use the software on an infected computer. Virus is extended by offering an infected storage media to a user. Someone provides us a disk consequently we are able to test the latest software. Virus is spread by means of host files which are attached to an electronic mail as well as transmitted over the web based technology like internet Symptoms of Computer Virus There are a number of prime factors that reveal that a computer system has been infected with a virus program. Some of them are outline below: (Microsoft) The computer system works slowly as compared to the normal cases. The computer system doesn’t take action, we may experience that it locks up regularly. The computer system hangs, and after that it begins to restart with regular intervals. Disks become unreadable and show various error messages. Software programs installed on the system do not execute accurately. We observe extraordinary operating system related error messages. We notice vague operating system dialog boxes. Application software vanishes as of the machine albeit we did not deliberately uninstall the software. Methods of virus removal Once a computer is infected with virus, it is important to remove the virus from the system so that the system may work properly and without bugs. However, confiscating a computer virus program is regarded as a complicated job lacking the support of computer virus deletion programs. For facilitating the process of virus removal, it is necessary that we keep our computer system up-to-date with the newest windows and antivirus updates, fixes, antivirus tools, and patches as well as we must be aware about the most modern threats and vulnerabilities, run our computer system as a regular user (not like an administrator), and afterward we have to take into account a security policy while we use the internet, download multiple files, and send files over the network. When we come to know that our system has a virus, its category or the way it came to our system is not much significant like deleting it and applying proper policies to stop its entrance into your system (Microsoft2) and (Microsoft). How to protect against virus In order to attain maximum security against viruses, we should have to consider the following steps: (Microsoft) On a Microsoft platform such as Windows we should have to turn the windows firewall on as it helps to defend against unwanted interruption from external network. We should use most updated version of operating system. We should utilize updates and approved antivirus programs such as Microsoft Security Essentials, G-Data Antivirus, and Kaspersky etc. We should utilize updated antispyware program on our machine. What are Worms A computer worm is a type of infection which has the capability to extend itself to one or more computer systems with no need to be transmitted as an element of a host message. Additionally, a computer worm has the potential to destroy the hosted data on a computer, practical performance, or affect network utilization, at the moment it gets run. In most cases a worm does not really damage either the computer programs or hardware, as a minimum in assumption. In addition, at the present, mostly PCs are linked to the local area networks and web based technology like internet, helping the distribution of wicked programs. In addition, a number of sources utilize a substitute term in which a virus is declared as some type of self-duplicating malware program. Most well known examples of worms comprise Melissa, Sobig, ILoveYou, Sasser and MyDoom worm (Scribd Inc.) and (Turban, Leidner and McLean). Types of Computer Worms File-sharing Networks Worms: A shared folder is used to hold the replication of this worm; almost certainly this folder is placed on the local computer. Then the replica of the worm is added into the shared folder with the name of file that looks to be secure. At this time the file sharing worm is prepared for download using the Peer to Peer network as well as makes the continuous sharing of infected file over the network (Virus All). Email Worms: In this type worm distribution is performed using sullied messages of electronic mail. In this scenario, any type of website link or attachment within an email message might include a degraded website link (Virus All). Internet Worms: These worms are considered as the malevolent worms. These worms will scrutinize the entire accessible resources of the network with the help of neighboring OS services or look into the wireless network like internet for defenseless computers. These vulnerable computer systems then attempt to connect in order to obtain full control over these computers (Virus All). IRC Worms: In this type of worm chatting channels are the prime objective as well as the similar distribution or contagion technique is employed like I have mentioned earlier i.e. transferring tainted files or besmirched websites links. In this scenario, transmitting an infected file is considered as less successful since the receiver needs to validate delivery, save the received file and open the file earlier than the infectivity will occur on the computer (Virus All). Instant Messaging Worms: In IM worms the distribution is performed using instant messaging application programs by transferring violated website connection to each one whining the local contact list. The technique selected to send the link matters a lot in this type of worm spreading (Virus All). Harms of Computer Worms Identity Theft: A large number of worms have been developed to duplicate on a computer with the purpose of stealing that computer information and returning all this valuable information to a user (eHow). Spam Channels: A number of computer worms execute with the intention to share web proxies’ information to a user at inaccessible site. This user is able to afterward "capture" our email message otherwise Internet access as well as employ this information to send a spam to the host websites that participate in illegitimate actions (eHow). Disturbing harms: Similar to any other task of stealing or destruction, these types of worm not only take control of private resources and time to repair any harm, but as well makes the casualty experience exposed and insecure (eHow). Destruction and Data Decay: A few worms are planned to basically or erratically offer destruction during their replication on a computer, as well as damage or remove vital data and information on a computer (eHow). How to Protect Against Worms? Computer worms those extend via weaknesses in network services could excellently be defended by installing most modern patches offered by operating systems. This comprises computer worms for instance SQL Blaster and SQL Slammer. On the other hand computer worms those extend like Trojan horses are able to superbly be defended by deleting unwanted emails or not to download any electronic mail attachment. These attachments include more than executable files. In this scenario, Microsoft Word and Excel files include macros which can provide huge harm to the data and information lying on a specific computer (Answers Corporation). How to remove Computer Worm At present, there exist a number of highly developed spyware remover programs those have the potential to examine the computer in the same manner antivirus program carries out the scanning process. In addition, these programs’ widespread signature databases are able to as well distinguish and delete harmful computer worms and related nasty codes. The dominant and most leading antispyware software like that Ad-Aware SE, eTrust PestPatrol, Microsoft AntiSpyware Beta, SpyHunter, and Spyware Doctor are recognized as extremely reliable worm detection and deletion tools. Moreover, these software programs have the capability to strongly detect malicious type of computer worms and spywares and then remove them from the computer (2-spyware.com). Difference between virus and worm The major difference between a virus and a worm is that a virus needs a user to execute it on a computer which activates it to offer damages and troubles, whereas a computer worm distributes as well as brings about a lot of harm without any involvement of a person. Thus more generally, for our system to be affected through a computer virus code, we usually have to perform a task, for instance open an infected file, even as by means of computer worms our computer system is able to be collapsed yet we don’t execute any software or open an email attachment (Godwin). Conclusion In this report I have presented a deep analysis of computer viruses and computer worms at the present age of technology. Progressively, it is observed that computer viruses and worms are turning out to be more widespread. The modern technology and programming techniques have massively helped computer programmers and hackers to write malicious code to bring devastation to computer system. In this report I have presented types of viruses and worms, techniques of dispersion, their potential harm to the computer, possible protection techniques and afterward methods of removal of computer viruses and worms. With the passage of time we are expected to have deep knowledge of computer viruses and worms and their potential influences on computer technology. I hope this research will facilitate effectively in gaining knowledge of computer viruses and worms and their potential impact in the field of computing. Works Cited 2-spyware.com. Worms Removal Instructions. 2008. 15 April 2011 . Answers Corporation. How do computer worms spread? 2011. 15 April 2011 . eHow. Harmful Effects of Computer Worms. 2011. 16 April 2011 . Godwin, Worth. Computer Worm & Virus: A Definition and Important Information To Understand . 15 February 2008. 16 April 2011 . McAfee. An Introduction to Computer Viruses (and Other Destructive Programs). 2010. 14 April 2011 . Media and Culture. Spreading the Computer Virus. 28 October 2004. 14 April 2011 . Microsoft. Computer viruses: description, prevention, and recovery. 18 February 2011. 15 April 2011 . Microsoft2. What is a computer virus? 2011. 15 April 2011 . Scribd Inc. Introduction to Computer Viruses. 2011. 14 April 2011 . Shelly, Cashman and Vermaat. Discovering Computers 2005. Boston: Thomson Course Technology, 2005. Takamiya, Ward and Jocelyn Kasamoto. An Introduction to Computer Viruses. November 2000. 15 April 2011 . TechTerms. Worm. 2011. 14 April 2011 . Turban, Efraim, et al. Information Technology for Management: Transforming Organizations in the Digital Economy . New York: Wiley, 2005. Virus All. Computer Worms Information. 2011. 15 April 2011 . Wright State University. Introduction to Computer Security. 2011. 15 April 2011 . Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Viruses and Worms Research Paper Example | Topics and Well Written Essays - 2250 words”, n.d.)
Viruses and Worms Research Paper Example | Topics and Well Written Essays - 2250 words. Retrieved from https://studentshare.org/information-technology/1576522-viruses-and-worms
(Viruses and Worms Research Paper Example | Topics and Well Written Essays - 2250 Words)
Viruses and Worms Research Paper Example | Topics and Well Written Essays - 2250 Words. https://studentshare.org/information-technology/1576522-viruses-and-worms.
“Viruses and Worms Research Paper Example | Topics and Well Written Essays - 2250 Words”, n.d. https://studentshare.org/information-technology/1576522-viruses-and-worms.
  • Cited: 0 times

CHECK THESE SAMPLES OF Viruses and Worms

The Computer Rootkits

nbsp;… However, invention and implementation of technology has resulted to spread of Viruses and Worms.... In that sense, fighting Viruses and Worms has become an issues which needs to be solved through the adoption of the appropriate measure if at all the running, operation of computer system and networking management has to be continued been enjoyed globally.... Computer Viruses and Worms affect systems through deleting major documents or files or even putting a stop to website right of entry....
8 Pages (2000 words) Report

Security issues involved with the transition of IPv4 to IPv6

The IPV4 is a target for Viruses and Worms transfer as a result of the exhaustible address space of the IPV4.... Name Instructor Subject Date Security Issues Involved With the Transition of IPv4 to IPv6 In the present day, the internet is constantly developing to turn out to be useful to the users....
3 Pages (750 words) Research Paper

Developing a Partial Risk and Mitigation Plan

Viruses and Worms have been declared a big threat to businesses' and institutions' security (Brittson, Oshea & Reyes, 2011.... The other way through which the computers could be affected by Viruses and Worms, is through the downloading of non-genuine files, music, or movies from the internet.... This has been witnessed in many businesses and institutions especially in the cases of Viruses and Worms attack and also the hackers.... First impact would be a delay in completion of the structures and the latest impact would be a failure for completion of the construction 1 Malicious programs attack After the establishment of the ICT center and equipping, the computers may be attacked by viruses, worms and bugs amongst others....
3 Pages (750 words) Assignment

Knowledge and Information Security

Other threats to computer systems worldwide come in the form of viruses, worms and Trojan horses.... It will describe the vulnerability of electronic information held by individuals to a variety of threats.... It will touch on the following areas of interest: Week 3's topic entitled,… Criminal Conspiracy - Database Attack, centres on a hypothetical scenario in Australia, to allow you to examine the motivation and methodologies of conspirators attempting to illegally obtain information from a police crime database....
8 Pages (2000 words) Essay

Intrusion Detection

This comprise network attacks besides data driven attacks on applications, vulnerable services, host based attacks like that privilege escalation, access to sensitive files, unauthorized logins and malware (for example Trojan horses, viruses, and worms) (Comptechdoc, 2009).... This project will provide a deep insight into the intrusion detection and detailed analytical examination of the network attacks, data driven attacks on applications, vulnerable services, host based attacks like that privilege escalation, access to sensitive files, unauthorized logins and malware (for example Trojan horses, viruses, and worms)....
2 Pages (500 words) Essay

The Myth of Secure Computing by Austin and Christopher

alicious Codes are in form of Viruses and Worms that keep the capacity of destructing a company's whole network.... Company's data can be erased wholly because of Viruses and Worms.... This paper presents digital security which is gaining importance nowadays as all business processing is shifted to a computerized setup....
2 Pages (500 words) Article

The Difference and the Disadvantage of the Windows Platform and Linux

Viruses and Worms are far rarer in Linux and OSX than in Windows.... According to Thomas, Chanelle, and Sicam, the total number of Viruses and Worms found in the wild infecting Linux systems are less likely than 1,000 while Windows must tackle, approximately 1,000 new viruses every month (185)....
1 Pages (250 words) Assignment

The Love Bug Virus

Both the computer Viruses and Worms belong to a category of software called malware.... Analysis and detection of computer Viruses and Worms: an annotated bibliography.... number of security threats such as viruses and worm programs cost business organizations, individuals and government agencies millions of dollars every year.... n the other hand, computer worms are like viruses for the reason that they duplicate practical copies of themselves and can result in the same type of harm....
2 Pages (500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us