Computer Viruses: Spreading, Multiplying and Damaging Essay

Exclusively available on IvyPanda Available only on IvyPanda
Updated: Dec 25th, 2023

A computer virus is a software program designed to interfere with the normal computer functioning by infecting the computer operating system (Szor, 2005). These viruses have the capability of spreading from one computer to another. They are also capable of multiplying. Viruses cause myriads of working challenges to computers ranging from destruction of files, slowing down computer performance, renaming files in computers and eventually making it difficult to access stored files (Szor, 2005).

We will write a custom essay on your topic a custom Essay on Computer Viruses: Spreading, Multiplying and Damaging
808 writers online

These viruses can spread from one computer to another through an internet connection and sharing of floppy disks, flash discs and any other external and portable device that can transfer data from one machine to another. Viruses are distinguished from worms because they cannot run automatically (Szor, 2005). Therefore, the user of a computer must perform a function that will necessitate their operations.

The virus programs are not-self generated within a computer system. However, they are designed and produced by computer hackers. The hackers who design most common computer viruses usually come up with the names (US-CERT, 2012).

Some of these viruses include Melissa, the Anna Kournikova, MyDoom, Sasser & Netsky, the ILOVEYOU virus, The Klez Virus, Code Red and Code Red II, Nimda virus, SQL Slammer/Sapphire virus, Leap-A/Oompa-A virus, and Storm Worm (US-CERT, 2012). All these viruses are tools used by hackers to destroy and access remote computer files.

There are many ways through which a computer can be infected by a virus. These may range from direct access such as file sharing to remote access portals such as using internet connectivity. For a computer virus to be effective, it must be allowed to run by the user through various means (US-CERT, 2012). A computer user can accept any new message on the screen without knowing the information in the file.

In this way, a computer virus is then allowed to run, causing harm to the computer. If a computer user opens unknown attachments, then viruses can easily find access into files in a computer. If a computer’s operating system is not updated, it will not be able to filter viruses, making it more vulnerable to attacks (US-CERT, 2012).

In addition, downloading files from unsecure sources allows viruses to gain access to a computer. Viruses can also be hidden within some software. For instance, during software installation, viruses are allowed to infiltrate into computer files (US-CERT, 2012).

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

Viruses have become a major challenge to several companies across the world. However, some measures can be taken to regulate the spread of these computer viruses. For instance, the use of an updated antivirus program sourced from a reputable vendor offers computer protection against most viruses (US-CERT, 2012).

The antivirus must be frequently updated and configured to automatically start as the computer is switched on. Besides, the antivirus should be configured to allow regular virus scanning and virus check when running executable file on the computer. Backing up data is also an important method of protecting a computer from loss of data due to virus infection. The internet is the most common source of viruses.

When dealing with any form of data from an online source, make sure that the source is well known. The use of USB data transfer gadgets should be well monitored and conducted with caution. The antivirus in this case should be used to scan USB drives before accessing the files. The most important protection is making sure that the operating system is updated and the firewall is always activated.

It is also possible to erase crucial information from hard disc drives using viruses. This information may be data collected from a crime scene, banking records, confidential files, and even important government files (Szor, 2005). The use of viruses can manipulate important computer information such as bank records resulting into an individual accessing vital and confidential records. The development and use of viruses has always been aimed at committing crime either directly or indirectly.

References

Szor, P. (2005). The Art of Computer Virus Research and Defense. Boston, MA: Addison-Wesley Professional.

US-CERT (2012). Virus Basics. Web.

Print
Need an custom research paper on Computer Viruses: Spreading, Multiplying and Damaging written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2023, December 25). Computer Viruses: Spreading, Multiplying and Damaging. https://ivypanda.com/essays/computer-virus/

Work Cited

"Computer Viruses: Spreading, Multiplying and Damaging." IvyPanda, 25 Dec. 2023, ivypanda.com/essays/computer-virus/.

References

IvyPanda. (2023) 'Computer Viruses: Spreading, Multiplying and Damaging'. 25 December.

References

IvyPanda. 2023. "Computer Viruses: Spreading, Multiplying and Damaging." December 25, 2023. https://ivypanda.com/essays/computer-virus/.

1. IvyPanda. "Computer Viruses: Spreading, Multiplying and Damaging." December 25, 2023. https://ivypanda.com/essays/computer-virus/.


Bibliography


IvyPanda. "Computer Viruses: Spreading, Multiplying and Damaging." December 25, 2023. https://ivypanda.com/essays/computer-virus/.

Powered by CiteTotal, best referencing maker
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1