CHAPTER 1: COMPUTER VIRUSES One of the most familiar forms of hazard to computing device security is the computer computer virus. A computer virus is a program written by a issue or a cracker, knowing to perform several(prenominal) miscellanea of dissimulation upon an unsuspecting victims computer. In some cases, the fob performed is mild, such as drawing an offensive moving view on the victims screen or dynamic all of the characters in a document to another language. sometimes the trick is much more severe, such as reformatting the mute drive and erasing all the data or damaging the motherboard so that it cannot course properly. Types of Viruses Viruses can be categorized by their effects, which nonplus being a nuisance, destroying data, facilitating espionage, and destroying hardw ar. A nuisance virus commonly does no real damage but is an inconvenience. The most subtle part of a computer to replace is the data on the hard drive. The installed programs, documents, databases, and saved e-mails form the heart of a own(prenominal) computer. A data-destructive virus is designed to destroy this data. Some viruses are designed to create a backdoor into a system to get intimately security. Called espionage viruses, they do no damage but allow a hacker or cracker to enter the system subsequent for the purpose of stealing data or spying on the work of the competitor.
Very rarely, a virus is created to damage the computer hardware of the computer system itself. Called hardware-destructive viruses, these bits of programming can relegate or destroy chips, drives, and other components. Methods of Virus Operation Vi! ruses operate and are transfer in a variety of ways. An email virus is commonly transmitted as an attachment to a message displace over the Internet. Email viruses require the victim to click on the attachment, which causes the virus to execute. Another common dash of virus infection is via a macro, a small mapping that allows users to customize and modify certain functions. A macro virus is written for a specific program, which...If you want to get a full essay, prescribe it on our website: OrderCustomPaper.com
If you want to get a full essay, visit our page: write my paper
No comments:
Post a Comment