Premium Essay

Computer Virus

In: Business and Management

Submitted By wangxin
Words 598
Pages 3
Computer Virus
Good afternoon, ladies and gentlemen, I’m glad to bring my presentation for everyone. Before the start, I want to ask a question, I think most people like searching internet, someone like play computer games, someone like shopping, someone do other things. Whether you have the experience of account theft, information loss, and other internet security problems. So, today my topic relate these problems, computer virus.
What is computer virus? CV is a computer program that can replicate itself and spread from one computer to another, and it cause the damage of computer function or destruction of data. Does anybody who knows the first computer virus in the world? Generally believed that as early as 1981, Apple gave birth to the first computer virus. In 1986 a personal computer virus, comes from a pair of Pakistan's brothers, Buster and Amjad for the purpose of preventing piracy written in C-the BRAIN virus. It is estimated that there are about 2 million mature hackers in the world, and over ten thousand new virus every day, the virus caused the loss of $ 100 billion annually. (1) Computer virus is a new derived in the form of computer crime
A computer virus is a high-tech crime, transient, dynamic and random. Difficult to evidence, the risk of small damage, so stimulating crime awareness and crime activities. The virus does not come from the unexpected reason, most virus can be found in the author and origin information, from the statistical analysis of a large number of virus, talented programmers to express themselves and demonstrate their ability, for retaliate, for joke, for information, Of course, including for political, military, religious, ethnic and other reasons. (2) The vulnerability of computer hardware and software products is essential for technical reasons
So far there is no way to advance Understanding a program error, found…...

Similar Documents

Free Essay

Virus Technology

...VIRUS TECHNOLOGY   view Presentation   The term virus is as old as hills are now in the world of computer technologies. A virus basically is software that is made to run automatically usually used for destructive purpose by the computer experts. Though virus is a well known but not known well. Definition : A computer virus is a coded program that is written in Assembly or a system programming language such as ‘C’ to deliberately gain entry into a host system and modify existing programs and/or perform a series of action, without user consent.     In this paper we would like to throw light on some of the unturned stones of the world of virus. We would start from history of the virus i.e. who created the first virus, for what purpose and hoe it affect to the computer. Then classification of viruses by to different methods: Ø General classification of the virus. Ø Behavioral classification of the virus. We covered the topic how nowadays viruses affects to the Mobiles, how they come to the mobile. The small and most important topic that we covered is the ‘Positive Virus’. We covered how the virus actually works in the host computer along with one example as they would enlighten our knowledge about viruses, this is because we want to secure of viruses and actually need to known how are they programmed and executed automatically. We also covered some information about the most popular viruses with  some vital information i.e. how they work, how much harmful......

Words: 5536 - Pages: 23

Free Essay

Virus

...Abstract The Business problem to be sold is how to prevent viruses from infection the networked computers, education the staff on what a virus is and why it is important to know what harm it can do to you network. How to prevent getting a virus, and why you should use encryption software when sending important data to others in your business. This will provide instie for the company and help them keep cost down as they will not have to keep hiring or paying for an IT technician to fix and repair their systems, and also why the use of encryption usage will keep their confidential information from getting in to the wrong hands or the hands of a competitor. Company Background Wing Warehouse is a sport bar and grill, famous for their wings and such. It is not just a bar it is a family fun and dining area also. The company is growing quickly in the last month 2 new locations in the Ohio area have opened. At the 17 locations just in Ohio 7 of those are run by one single manager, in saying so he must you a main office and network and share files and such for easy access with the other stores. The total numbers of employees that use the computer networked systems are around 3,000. In saying this even managers do not have all the computer knowledge they need to run a business successfully and without having any computer issues. Recently they were affected by a huge computer virus that shut down 7 of the stores for two days. Being that this is a very popular place for family and......

Words: 2674 - Pages: 11

Free Essay

Virus

...Michigan alone. Out of the 44 states that were involved in a breakdown of statewide reported infections, there were a total of 1,992 cases and 87 deaths reported. The Centers for Disease Control and Prevention (CDC) stated that there is a fatality rate that ranges from 3 to 15% and the first case reported of human infection was in 1999. The topics will discuss history, transmission, treatment, and prevention of the virus. West Nile Virus (WNV) is a virus that is normally seen in the Middle East, Africa, and West Asia through a patient located in Uganda (Henley, 2003). WNV can infect dogs, birds, horses, squirrels, mosquitos, humans, and other mammals. It was thought to have evolved from Israel, and has spread swiftly throughout the United States. The numbers of cases reported were from 20 to 60 per year, until in 2002 when the number rose to above 4,000 (Henley, 2003). The virus exhibits in various ways such as asymptomatic, mild, and severe infections that demonstrate specific outcomes. When the individual is asymptomatic there are no signs or symptoms of the virus. Mild infection or West Nile Fever carries symptoms of nausea and emesis, rash, muscle pain, enlarged lymph nodes, headaches, anorexia, and discomfort (Google, 2012). According to the Journal of Family Practice approximately 20% of individuals that are infected show these symptoms and a gestation time of 3 to 14 days and lasts anywhere from 3 to 6 days. The next way that WNV manifests is through severe......

Words: 1005 - Pages: 5

Premium Essay

Computer Virus Hunter’s

...Case study This case study is about the computer virus hunter’s at Symantec Corporation. Symantec Corporation deals with the antivirus software. The product provides protection against harmful contents for the computer. Q 1. Keeping professional excited about the work that is routine and standardized and chaotic is major challenge for Vincent Weafer. How could he use Technical, Human and conceptual skills to maintain an environment that encourage innovation and professionalism among the virus hunters? 1. Technical Skills:   a. He provides security storage and system management solution.   b. The work never stopped to maintain efficiency.   c. When Santa Monica’s team finished, then Tokyo took over, this handed over to Japanese then to Dublin and back to Santa Monica. 2. Human skills:   a. Coaching and monitoring the works.   b. Networking outside the organization.   c. Working in a team to solve the problem. 3. Conceptual skills:   a. Using information to solve business problem.   b. Discover the problem and finding solutions. Q 2. What management role would Vincent be playing as he (a) had weekly security briefing conference calls with coworkers around the globe, (b) assessed the feasibility of adding a new network security consulting services, and (c) kept employees focused on the company commitment’s to customers? (a) According to the study by Henry Mintzberg managers have different but highly interconnected roles. According to this we can say that......

Words: 287 - Pages: 2

Free Essay

Computer Virus

...In this assignment, I will be addressing a few topics about computer virus . I will explain the difficulty of creating a computer virus and its frequency and also explaining the differences between a virus and a worm, along with their threat level. According to Microsoft, computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation (Microsoft, 2013). Computer viruses are difficult to create because you have to know the proper coding and determine what you are trying to attack. Many computer programmers or hackers have coding set up online as a start up, but majority of them don’t function correctly. There is constantly many people trying to hack into computers on a daily. Some are fortunate to succeed and some are not. A virus consists of self-propagating program codes that’s triggered by a specific time or event (Bidgoli, 2012). A virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Viruses can be transmitted through an email attachment or through a network. A computer virus severity varies. It can be mild like a prank, displaying images on a user’s screen or while others can damage your hardware, software or files. According to Cisco, all viruses are attached to an executable file, which means the virus may exist on a system but will not be able to active until a user runs or opens the malicious host file or...

Words: 568 - Pages: 3

Premium Essay

Trojan Virus

...gates of Troy. The Trojans assumed it was a peace offering from the Greeks, and moved the horse inside the gates. The wooden horse was of course filled with hidden warriors, and once inside the gates, they broke out of the horse, and demolished the Trojans. Trojan horse programs work the same way. Trojan horses can destroy files and data, but commonly contain spyware, and even backdoor programs. Trojans are usually contained in software downloads from unknown or untrusted sources. Some people don't consider a trojan horse to be a virus, because it does not reproduce itself as a virus does, however it's ability to destroy files and install programs without the user knowing do indeed make it a virus. When a trojan horse is being used as spyware, it monitors your computer activities, and may even record keystrokes. This information is then sent to a third party, without you being aware of it. It may also cause pop up ads to display on your computer. The real danger is that information such as passwords and credit card and banking information can be delivered to that unknown third party, opening you up for identity theft. When the trojan horse installs a backdoor program, it sends information to the third party, making it possible for hackers to get into your system, via the backdoor, and to use the system just as if it were their own. They will often do this to look around your hard drive for information, but may also use this to send spam with your email client,......

Words: 573 - Pages: 3

Free Essay

What Is a Computer Virus

...is a computer virus? Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. What do computer viruses do? Through the course of using the Internet and your computer, you may have come in to contact with computer viruses. Many computer viruses are stopped before they can start, but there is still an ever growing concern as to what do computer viruses do and the list of common computer virus symptoms. A computer virus might corrupt or delete data on your computer, use your email program to spread itself to other computers, or even erase everything on your hard disk. Computer viruses are often spread by attachments in email messages or instant messaging messages. That is why it is essential that you never open email attachments unless you know who it's from and you are expecting it. Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Computer viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download. To help avoid computer viruses it's essential that you keep your computer current with the latest updates and antivirus tools, stay informed about recent threats, run your computer as a standard user (not as administrator), and that you follow a few basic rules when you surf the Internet, download files, and open attachments. Once a virus is on your computer,......

Words: 272 - Pages: 2

Free Essay

Virus

...Virus H1N1 (Influenza) La gripe H1N1 es una enfermedad respiratoria contagiosa que causa síntomas similares a los de la influenza en las personas. Los virus de influenza cambian constantemente sus genes (mutacion). Este virus aparece en los cerdos tanto como en los humanos. El tratamiento para este virus es vacunarse y descansar en el hogar. Su supervivencia en el ambiente es de 1 a 2 dias. Herpes VHS02 La infección por el VHS-2 está muy extendida y se transmite sobre todo por vía sexual. Dura toda vida y no tiene cura. Se calcula que cada año se infectan con este virus unos 20 millones de personas. La infección por el VHS-2 está presente en todo el mundo y constituye un importante problema mundial. El VHS-2 causa herpes genital, que se caracteriza por la aparición ocasional de úlceras genitales dolorosas que pueden tener un importante efecto negativo en el bienestar y las relaciones personales. No existe tratamiento ya que no tiene cura y vive entre nosotros toda la vida. Su supervivencia es de 5 horas a 8 semanas en el ambiente Los virus estan vivos? Los virus son microorganismos acelulares, es decir, no tienen ni son células. Las células son las unidades de vida más pequeñas ya que cumplen las tres funciones vitales: nutrición, relación y reproducción. Los virus ni se nutren , ni se relacionan, y sólo se reproducen en el interior de otras células. Son parásitos obligados. Si los virus no están en el interior de las células ni siquiera se......

Words: 269 - Pages: 2

Premium Essay

Open Problems in Computer Virus Research

...Skip to main content Open Problems in Computer Virus Research Steve R. White IBM Thomas J. Watson Research Center Yorktown Heights, NY USA Presented at Virus Bulletin Conference, Munich, Germany, October 1998 Abstract Over a decade of work on the computer virus problem has resulted in a number of useful scientific and technological achievements. The study of biological epidemiology has been extended to help us understand when and why computer viruses spread. Techniques have been developed to help us estimate the safety and effectiveness of anti-virus technology before it is deployed. Technology for dealing with known viruses has been very successful, and is being extended to deal with previously unknown viruses automatically. Yet there are still important research problems, the solution to any of which significantly improve our ability to deal with the virus problems of the near future. The goal of this paper is to encourage clever people to work on these problems. To this end, we examine several open research problems in the area of protection from computer viruses. For each problem, we review the work that has been done to date, and suggest possible approaches. There is clearly enough work, even in the near term, to keep researchers busy for quite a while. There is every reason to believe that, as software technology evolves over the next century or so, there will plenty of important and interesting new problems that must be solved in this......

Words: 6039 - Pages: 25

Free Essay

Computer Virus

...2012 Computer Virus: Do you own a laptop or a desktop computer? Have you ever experienced different weird action from it? Have you ever started writing a document, and it looks different, some chapters might be missing or something else abnormal has happened. For instance getting slow or when you turn the computer on, it says that all the data has been erased. NOOOO!! The first thing you do in situations like this is panic. You might think all that hard work you’ve done is all down the drain. That could be true, but in most cases viruses have not done any harm jet, but when some people try to get rid of viruses they delete files or they might even format the whole hard disk. Doing such isn’t the best thing to do when you think you have a virus infection. A good analogy to best explain what viruses are like is when people gets sick and you don’t know what’s wrong what do they do? They go to see a doctor to find out what’s wrong with them. It’s the same way with viruses, if you don’t know what to do you call someone who knows about viruses and get professional help. It is concluded that computer viruses is an important research area with potential applications to other fields, that current systems offer little or no protection from viral attack. (Fred). A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also used to refer to other types of malicious software, including: adware and spyware programs. A virus can......

Words: 310 - Pages: 2

Premium Essay

Melissa Virus

...“Melissa virus infects Word 97 documents and the NORMAL.DOT file of Word 97 and Word 2000. The virus code is contained in one macro named "Melissa"” (Melissa Virus). This virus comes with a harmful capability especially in Word 97. It has the power to spread its virus rapidly by using an email. When it is opened for the first time the virus checks if the user’s computer have the program MS Outlook installed. Then if it finds the program, the virus will then sends email to the email addresses found in the address book. “The email that is sent by the virus will contain the following subject header: ‘Subject: Important Message From ,’ where is the full name of the user sending the message. While the content of the body contains ‘Here is that document you asked for ... don't show anyone else ;-)’ with an attachment ‘list.doc’ which contains references to a lot of pornographic sites” (CERT® Advisory). Because of the email system the virus spreads quickly. “It created this entry in the Windows registry: HKEY_CURRENT_USERSoftwareMicrosoftOffice"Melissa?"="...by Kwyjibo" and in some cases when the day of the month equals the minute value, a payload of text is written at the current cursor position that says: "Twenty-two points, plus triple-word score, plus fifty points for using all my letters. Game's over. I'm outta here." The mentioned quote is taken from Bart Simpsons’ character in The Simpsons which disables some security safeguards of the computer” (Melissa virus). Melissa......

Words: 554 - Pages: 3

Premium Essay

Computer and Virus

...How the virus and the hackers effecting today’s business world In the past decade, computer and networking technology has seen enormous growth. This growth however, has not come without a price. With the advent of the Information Highway, as it's coined, a new methodology in crime has been created. Electronic crime has been responsible for some of the most financially devastating victimizations in society. In the recent past, society has seen malicious editing of the Justice Department web page (1), unauthorized access into classified government computer files, phone card and credit card fraud, and electronic embezzlement. All these crimes are committed in the name of free speech. These new breed of criminals claim that information should not be suppressed or protected and that the crimes they commit are really not crimes at all. What they choose to deny is that the nature of their actions are slowly consuming the fabric of our country's moral and ethical trust in the information age. Federal law enforcement agencies, as well as commercial computer companies, have been scrambling around in an attempt to educate the public on how to prevent computer crime from happening to them. They inform us whenever there is an attack, provide us with mostly ineffective anti-virus software, and we are left feeling isolated and vulnerable. I do not feel that this defensive posture is effective because it is not pro-active. Society is still being attacked by highly skilled computer......

Words: 1225 - Pages: 5

Free Essay

Virus

...Computer Viruses: Detection, Removal & Protection Methods 1. [pic]Anti-Virus Programs 2. [pic]Detection of an Unknown Virus 3. [pic]Prophylaxis of Computer Infection 4. [pic]Recovery of Affected Objects 5. [pic]Virus Algorithm Analysis 6. Protection Methods Anti-Virus Programs 1. [pic]Types of Anti-Viruses 2. [pic]Which Anti-Virus Program is Better? 3. [pic]Tips on Usage of Anti-Virus Programs "Working with bad data implies good code" Andrew Krukov, AVP Team Types of Anti-Viruses Anti-virus programs are the most effective means of fighting viruses. But I would like to point out at once that there are no anti-viruses guaranteeing 100 percent protection from viruses. Any declarations about their existence may be considered to be either an advertising trick or a sign of incompetence. Such systems do not exist, because, for each anti-virus algorithm, it is always possible to suggest a virus counter algorithm, making this particular virus invisible for this particular anti-virus (fortunately, the opposite is also true: for any anti-virus algorithm, it is always possible to create an anti-virus). Moreover, the impossibility of the existence of the absolute anti-virus has been mathematically proved based on the theory of finite slot machines - the author of this proof is Fred Cohen. It is also necessary to pay attention to some terms used in anti-virus program discussion: False Positive - when an uninfected object (file, sector or system memory)...

Words: 4870 - Pages: 20

Premium Essay

Computer Virus

...the basic concept of virus and provides an insight of the history of virus. The report also analyses the spread of viruses and defines certain measures that computer users may take into account to avoid viruses. Overall ,it was learnt from the report that it is important to keep us updated about computer viruses to be able to successfully safeguard us from computer virus attacks Introduction to Computer Virus: Viruses are mischievous programs, the purpose of which is to disrupt the sensible use of computers. It is a type of a mal-ware and do little more than display a message( Usually insulting!!!) on the screen , but some are designed to act after a certain period of time and do such things as make the letters start to drop off the screen or even erase the entire contents of your hard disk. As their name suggests, viruses are able to spread by infecting other disks and they do this by copying themselves onto other disks which are being used by the computer. Viruses are little programs or scripts that can create files, move files, erase files, consume your computer's memory, and cause your computer not to function correctly or to crash completely. Some viruses can duplicate themselves, attach themselves to programs, and travel across networks. They can self-modify or change over time as they copy themselves.  Viruses only spread across multiple computers if an uninfected computer is connected to a network, or if the computer gets connected......

Words: 2136 - Pages: 9

Premium Essay

Virus

...A computer virus is a computer program that can replicate itself[1] and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability. Malware includes computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious or unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves. An example of a virus which is not a malware, but is putatively benevolent, is Fred Cohen's compression virus.[2] However, antivirus professionals do not accept the concept of benevolent viruses, as any desired function can be implemented without involving a virus (automatic compression, for instance, is available under the Windows operating system at the choice of the user). Any virus will by definition make unauthorised...

Words: 271 - Pages: 2