Computer Virus User Awareness Research Paper

Exclusively available on Available only on IvyPanda®
This academic paper example has been carefully picked, checked and refined by our editorial team.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

One of the most frustrating things in the use of computer technology is being infected by computer viruses! Imagine yourself conveniently working on a computer on a very important task, and then all of a sudden, the file you have been slaving on for nights on end disappears! Most likely, it has been “eaten up” by an irritating, nerve-wracking computer virus.

What is a computer virus?

A computer virus “is a software program that attaches itself to, overwrites or otherwise replaces another program in order to reproduce itself without the knowledge of the computer user,” as defined by Collette Dilly (2001). It is actually similar to a biological virus wherein both the computer and biological virus share the same characteristic of “infecting” their hosts and have the ability to be passed on from one computer to another.

Just like humans, a computer that is infected with a virus also becomes “sickly” and thus, prone to suffer malfunction in its operation or running of computer programs and software.

Trading programs with other people’s computers may contaminate one’s computer programs. The use of modems necessary to connect to the internet can likewise acquire viruses. Some unsuspecting users may get it from seemingly innocent emails.

When this program enters your computer through your input device, it hides in your computer’s memory and starts to duplicate itself like a disease. When you save your data, you also save the virus. Slowly but surely, the virus crowds out your data and causes major system problems. (Trickum Middle School, 1997)

What does a virus do to a computer?

These computer viruses are actually created and developed by people using bits and codes designed to adapt to a computer’s system or files and data. Depending on the particular type or kind of computer virus, the effects of viral infection on computers may range from a simple display of some sort of messages to a devastating crash of your computer system and programs.

The most common types of computer viruses are Trojan Horses, E-mail viruses, and Worms. A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically. An e-mail or network virus moves around in e-mail messages and usually replicates itself by automatically mailing itself to dozens of people in the victim’s e-mail address book. A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole and then starts replicating from there, as well.

How can we protect ourselves from computer viruses?

Users should also consider the variety of anti-virus products currently available to protect their computers.. There are three classes of anti-virus products: detection tools, identification tools, and removal tools. Scanners are an example of both detection and identification tools. Vulnerability monitors and modification detection programs are both examples of detection tools. Disinfectors are examples of removal tools.

  • Such anti-virus programs must be used to scan the computer of probable existing viruses. Never insert floppy disks or CDs from unreliable and unknown sources. Scan them with the antivirus before running them on the computer.
  • Avoid opening emails from unknown sources. They may contain malicious information as well as destructive viruses. Download mails with care. Scan attachment with anti-virus software. Big email companies like Yahoo! usually have their own reliable default anti-virus software that automatically scans the attachments.
  • Back up files for security reasons. In case the computer gets infected and needs to be reformatted, then it is ensured that important files have been saved in a separate folder or CD.

Now that awareness of the management of a computer virus is widespread; it is a comfort to know that it is not a hopeless case! The important thing is to maintain a clean and virus-free computer to save one’s files… and one’s sanity!

References

  1. Dilly, C. (2001) “” Web.
  2. Trickum Middle School (1997) “Will a Computer Virus Strike Your Computer?” Computer Viruses? What Really Is It? Vol.1 Issue 1, 1997
  3. Brain, M. (n.d.) “” Web.
  4. Burgess Forensics (2006) Web.
More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2021, September 18). Computer Virus User Awareness. https://ivypanda.com/essays/computer-virus-awareness/

Work Cited

"Computer Virus User Awareness." IvyPanda, 18 Sept. 2021, ivypanda.com/essays/computer-virus-awareness/.

References

IvyPanda. (2021) 'Computer Virus User Awareness'. 18 September.

References

IvyPanda. 2021. "Computer Virus User Awareness." September 18, 2021. https://ivypanda.com/essays/computer-virus-awareness/.

1. IvyPanda. "Computer Virus User Awareness." September 18, 2021. https://ivypanda.com/essays/computer-virus-awareness/.


Bibliography


IvyPanda. "Computer Virus User Awareness." September 18, 2021. https://ivypanda.com/essays/computer-virus-awareness/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1