StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer virus - Coursework Example

Cite this document
Summary
Working in the internet and the spreading of the IT technologies can bring many risks to the data which firm of enterprise possess and in many cases, other companies can hire attackers to copy some confidential information regarding the plans of the company’s development or to…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.5% of users find it useful
Computer virus
Read Text Preview

Extract of sample "Computer virus"

IT Security Considering the Enterprise Benefits affiliation IT Security Considering the Enterprise Benefits Working in the internet and the spreading of the IT technologies can bring many risks to the data which firm of enterprise possess and in many cases, other companies can hire attackers to copy some confidential information regarding the plans of the company’s development or to undermine company’s activity (Whitman). To achieve these targets attackers can use online attack on the main resource if we deal with the web shop, internet enterprise.

If we work with the company that has access to the internet and work with it very often we should underline infecting the computer with viruses or backdoors, special malicious application which allow attacker to take control over the infected computer and maintain any action attacker want. It can include copying of the information, stealing of the passwords, formatting of the hard drives with the valuable information and damaging of the website or the information regarding the company’s activity(Ciampa, 2012).

Considering the high level of the defense hackers can physically implant the virus to the computer and it can cause to all effects described above. Motivating factor to attack the computer can be both personal gain (fulfilling the order produced by the company-competitor) and the undermining of the company’s competitors systems to have some benefits during the drop of the company’s activity (Singer). There are four purposes of the attacking the company’s IT infrastructure:1. Take some confidential information from the victim computer.2. Disable some peculiar systems of the company’s infrastructure.3. To integrate malicious software to spy or to take control over the company’s computers.4. To damage the IT infrastructure of the company.

ReferencesWhitman, M., & Mattord, H. (n.d.). Management of information security (Fourth ed.).Ciampa, M. (2012). Security guide to network security fundamentals (4th ed.). Boston, MA: Course Technology, Cengage Learning.Singer, P., & Friedman, A. (n.d.). Cybersecurity and cyberwar: What everyone needs to know.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer virus Coursework Example | Topics and Well Written Essays - 250 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1673351-computer-virus
(Computer Virus Coursework Example | Topics and Well Written Essays - 250 Words)
https://studentshare.org/information-technology/1673351-computer-virus.
“Computer Virus Coursework Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1673351-computer-virus.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer virus

The Real Computer Virus

The Real Computer virus.... Cannon covered in detail the much-ignored ubiquitous nature of disinformation in his article (2001) in the backdrop of new fast paced communication technologies such as the Internet and email.... He illustrated his observations using several instances of belief in and spread of… He cited several examples such as the imagined fate of the men who signed the Declaration of Independence and the glorification of Vicente Fox, a Mexican politician, by Hazards of Misinformation First Last Dr....
2 Pages (500 words) Essay

Viruses and Worms

… A virus has the capability to duplicate itself by activation, with the intention that it is able to grow, always looking for latest host platforms.... The major difference between a virus and a worm is that a virus needs a user to execute it on a computer which activates it to offer damages and troubles, whereas a computer worm distributes as well as brings about a lot of harm without any involvement of a person.... This research paper aims to discuss the computer viruses and worms, that are considered as a very serious computer security threats today....
9 Pages (2250 words) Research Paper

Computer Virus Charges Sought

In the paper “Computer virus Charges Sought” the author describes the case of the creator of the “I LOVE YOU VIRUS”.... "TECHNOLOGY; Computer virus Charges Sought - New York Times.... hellip; According to Guzman, he programmed the virus merely to practice his programming skills.... nbsp; He contends that he did not intend for the virus to spread, a contention held up in court.... The creator of the “I LOVE YOU virus,” Onel de Guzman, was a Pilipino hacker operating in the late 1990s....
1 Pages (250 words) Assignment

The Love Bug Virus

There are different kinds of a virus and each of them has a THE LOVE BUG VIRUS The Love Bug Virus Affiliation Explain the difficulty of creating a Computer virus and discuss the frequency with which this happens.... reating a Computer virus requires extensive programming skills.... Additionally, a Computer virus is a kind of malware that can vary in harshness and damaging a system from causing slightly disturbing effects to destructing software programs or data and resulting denial-of-service (DoS) attacks....
2 Pages (500 words) Case Study

Legal, security, or privacy issues within electronic commerce

' and it led to the generation of millions of e-mails (“Millions hit by Computer virus,” 2015).... ' and it led to the generation of millions of e-mails (“Millions hit by Computer virus,” 2015).... ReferenceMillions hit by Computer virus.... The name of the virus involved was ‘Sobig.... The virus spreads through e-mail… When users open the email attachments unknowingly, their computers become infected....
1 Pages (250 words) Assignment

Key Roles of Viruses in Social Networks

The paper "Key Roles of Viruses in Social Networks" discusses that the trend of Computer virus propagation and the roles that different computer viruses play can best be examined through simulations.... The first research covering online special networks involved the modelling of the cross-site scripting Computer virus through the use of susceptible, infected or SI models.... A Computer virus is able to deceive social network participants through the choice of topics that interest them, propagation of the virus undergoes an exponential increase....
6 Pages (1500 words) Essay

Details Concerning the Virus

The paper 'Details Concerning the Virus' focuses on battling with a Computer virus which is a usual event to anybody who is using a computer system either at the domestic level.... The circumstance above is subjective to the risk of Computer virus infection.... By definition, a Computer virus is an infectious program that replicates or clones itself while seeking a new host environment within the computer system either within the stored files or right inside the operating system....
6 Pages (1500 words) Case Study

Computer Virus and Economic System

The paper 'Computer virus and Economic System' provides detailed information on the metamorphic virus “the Win95/Bistro virus” and its troubling effects on online banking as well as the trading system.... It will expound on how the virus influences the economic system.... hellip; On most occasions, the virus has very malicious intent.... (1), the virus can be grouped into two; transient or resident.... A transient virus is a type of virus that its survival depends on the lifespan of the host....
7 Pages (1750 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us