Friday, March 1, 2019
Virus- – Malicious Software – Introduction
Introduction This appellation allow explain about todays or so stern challenges for information processing placement exploiters, developers, professionals and all, one common step of assault on ready reckoner is malicious computer program called Virus. They hurt many divers(prenominal) types nigh of them give the gate do very crushing effect on system and cost fortune as swell. Most of the organisations have bigger challenges to block such a entropy effecting computer vir usances. commonwealth agency melodic phrase is the one of the organisation which is always a treat because of there hole-and-corner(a) selective information-transferring between clients and staffs, so its effecting companies network performances and productivity.We will see some of them and understand how we can protect systems. About there have been well said about viruses from Microsoft (2006) Computer viruses be small softw ar programs that argon designed to spread from one computer to an ot herwise and to interfere with computer operation. A virus might dispirit or delete selective information on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk. Computer viruses are some well written programs by programmers. They will upload on your computer or server without your information and execute without your knowledge.Some of them will corrupt or delete your all important(predicate) data as well as application files. An even more than they will onslaught on your system files, networks. They will distribute your data form one computer to another. Its depends on different kind of viruses and there own capability. History There are times when people want to destroy computers. In a time of war, a country may want to hamstring their competitor by destroying their intelligence databases (Ludwig, 1996). According to Spamlaws (2010) ,There are plenty of malicious software ,which is effected on computers . ostl y know as viruses, spywares, trojan hourses and worms, rootkits and many other dangerous program which effect on system . As per comparisen these are different to each other Viruses Comuter viruses make system halt or keep contatly shuting down and do damages to files so user have embarrassingies to access documents or any other applications. These type of virsues make such damages which can be seen. SpywareThese types of software is installed on computer without users knowladge. They will change computer settings, make computer functionality difficult to use. They will collect data from users computer and sendback to remote host.Capable to hack your password,financial information. fifth column hourse According to Cicso(2010), it is harmful piece of software,after it is activated,it can irritating the user by popping up windows,changing desktops,damaging deleting files,staling data as well as trigger off and spreading viruses. WormsWorms are damaging and irritating others netwo rk than host computer, it is dangarous to direct viruses to other computers without effecting host computer. Athors claim,(Ianelli,Kinder and Roylo,2007)If attackers can get their malware downloaded on victims system,they can view money by causing the system to run the pay-per-install software.Causes to Estate Agency Bussiness Un same(p)ly other businesses Estate agency is always an attackers orchestrate because of Confidential data transfering on Internet with its clients. By virus attack it can be posible to change in important documents or companies policy,as per McAfee (2000),In 2000 ILOVEYOU virus had similarly damage to thousands of computer. Virus can make very devastating effect on Estate agencies e-mail system,which is always busy for transfering important application files (DOC,.EXL,PPT etc) between millions of computer,as per CERT (1999),In1999 Melissa virus was so powerful that it hale Microsofts and other big organisation to switch off their e-mail systems. Similar ly Twitter worm has effected upto quarter of millions twitter accounts in Jan 2010. Suggetion for better use of computer systems in Estate agency ? address and admin all data, email system and applications centralized. ? Keep backup on a regular basis and easily. ? tag on new clause in Turms of use for fair use of data handling to all users. ? Install Anti-virus software that will update regularly to check all downloaded files and block new spywares.Show and prove more commitement to data security within organisation. ? Use more secure operating systems alike UNIX, LINUX. ? Avoid downloading unsecured data software from third party blade sites or unathorized CD, DVD or external memory sticks. ? leave technical condense to staff about how to deal with such crotchety files or data. For example, never run executable files (. EXE) which comes with email attachments. ? It is an advantage to use malware analysis software with the email system. Conclusion Investment into Companies IT infrastructure will help to block malicious software and improve security for online communication.It can be reduce cost on system maintenances and additional accessories like software, hardware. Staff can work more efficiently and more positively to produce better results. Customers as well more assured about data security with the organisation. They dont be worried about confidentiality of sharing personal data with the company. Satisfied customers is the most important key factor to become a successful organisation.References apply in this assignment o CERT,1999, http//www. cert. org/advisories/CA-1999-04. html ( fail accessed 31/10/2010) o Cisco, 2010, What is the differenceViruses,Worms,Trojans and Bots? http//www. cisco. om/web/about/security/intelligence/virus-worm-diffs. htm l( Last accessed 30/10/2010) o Ianelli,N. ,Kinder,R. and Roylo,C. (2007) The use of malware analysis in support of law enforcement (P. ) Carnegie mellon university o Ludwig, M. A. (1996) The littl e black book of computer viruses (p. 11). genus Arizona American eagle publication. o McAfee,2000, http//vil. nai. com/vil/content/v_98617. htm (Last accessed 30/10/2010) o Microsoft,2006, http//www. microsoft. com/uk/protect/computer/basics/virus. mspx ( Last accessed 30/10/2010). o Spamlaws ,2010, http//www. spamlaws. com/malware-types. html ( Last accessed 01/11/2010)
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment