Living in a digital age we are all faced with the threat of exposing our private information every time we log on to the internet, because of this it is extremely important that people know how to protect theirselves from digital threats. In order for people, to protect themselves, they must be aware of the basic types of malicious software, how they are spread and how to combat them. The generic virus is software which has been designed to do harm to a computer, replicate itself, and spread to other computers. While viruses can be spread via CDs and USB drives, the most common way for them to be distributed is through email attachments.(Brown 20-21) Email viruses have been known to search an infected persons email account, and send a …show more content…
Trojans disguise themselves as legitimate programs, such as a game or Anti-Virus software, and can only infect a computer once they are downloaded from the internet. While some Trojans are sneaky and attempt to hide their presence, others attempt to bait the uninformed into paying the creator money to protect themselves from a “virus” that their computer has been infected with.(Brown 20) A prime example of these types of Trojans would be AntiVirusXP 2008. This program would trick users into believing that it was part of the built in virus protection on the Windows XP operating system. This program would then make users believe that their computer has been infected with a multitude of viruses and that they need to run the fake anti-virus program in order to remove them. When in truth once it is run the program would download other malicious software and further infect the users computer with potentially system crippling or information stealing viruses.(Rogue Security Software I Fake Anti-Virus Alerts I Scareware.") One of the stealthier types of Trojans is known as a password stealing Trojan. These Trojans make a copy of any passwords stored on an infected computer, and copy any keystrokes that a user makes when it believes that they are entering a password.(Trojan Virus) Because these types of Trojans work in the background users may not notice that they have been infected. The absolute best way
The users are recommended to scan the computer with an anti-malware program in case the user detect any out of the ordinary activities of the
Trojan’s are one threat it is a type of malware designed to provide unauthorized, remote access to a user’s computer. Trojan horses do not have the ability to replicate themselves like viruses; however, they can lead to viruses being installed on a machine since they allow the computer to be controlled by the Trojan creator.
Let’s say user (A) download an execution file (EXE) on his-her PC and double click on that file, if this file is infected the virus works based on the written code by the hacker/ attacker/ intruder and copy some files into the system. In case, user (A) does not have virus protection, the virus works perfect in destroying that computer or sending information from this computer to the attacker email. Viruses not only designed to destroy PC’s, but also designed to get information from
Computer virus is a program that can copy itself and infect a computer without the permission or knowledge of the user. Viruses perform some type of harmful activity such as accessing private information or corrupting
Generally, the horse of Trojans is coded programs coded for the purpose of harming the computer devices which appears to be harm free, but when the code is executed by users, the data & file systems are corrupted leading to damaging the computer devices.
The specific program used to prevent viruses, worms and Trojans which attached in the email or website.
Viruses and worms are malicious programs that self-replicate on computers or through computer systems without the user being cognizant. Worms are a series programs that repeat themselves from system to system minus the use of a host fie. Worms use methods to infiltrate remote computers and launch replicas of themselves like email messages or coping files to an accessible disk. A computer virus is a
Computer viruses are minute program which is “embedded inside an application or within a data file which can copy itself into another program“(Adams et al, 2008 ) for the sole determination of meddling with normal computer operations. The consequences may range from corruption and deletion of data; propagation of virus on to network and deployment through attachments through emails in order to further creating havoc to all associated computing devices.
To understand the business of malware, one must understand how malware has evolved in the past twenty-five years. Malware, which includes all kinds of malicious software, was originally created to show the weaknesses of computers. The first type of malware, created in 1986, was a virus called “Brain.A. Brain.A was developed in Pakistan, by two brothers - Basit and Amjad. They wanted to prove that PC is not secure platform, so they created virus that was replicating using floppy disks” (Milošević). Even today malware is still used to check the security of machines.
First we need to understand that we are the first line of defense against any type of cybercrime and need to become more proactive in helping ourselves. While there are laws in place that are being constantly revised to protect our information; for the most part they only help after the fact. The average user doesn’t have proper software setup on their home PC’s to protect their information, and even when they do they don’t keep it up-to-date. There are several very good services available for either free or a very reasonable cost such as antivirus software, adware/spyware protection, and firewall software that will help keep our information from being obtained directly from our very own computer. Once we have these items in place, it becomes as just important to configure them properly and keep them up-to-date so these programs can catch all the newest ways the criminals use to try and get around them.
There are an enormous amount of malicious software programs. The most common types are known as viruses and spyware. Spyware has
A known virus fighting program is the Antivirus. Antivirus is an always background running program, famous by many different programs like G Data AntiVirus, Kaspersky Anti-Virus, BitDefender Antivirus, Panda Antivirus Pro, Webroot SecureAnywhere AntiVirus etc. The antivirus keeps up a giant database of known programs, good and bad, with a command called scan, search through your entire computer is done and when encounters one program that it doesn’t recognize it sends details for examination and begins observing that program and if its suspicious it doesn't give the program a chance to play out any activity. If the program ends up being genuine its probation ends If not, it terminates the program and reverses all of its actions. (Larkin)
There are special viruses that creates different types of malicious problems on a network or computer, for instance it will create or open programs to perform tasks. Viruses is also used for denial of service attacks, password cracking and many more. This can be fought against by having a reliable protection service; it is safer if this is taken from the provider itself.
A computer virus is Program or a portion of the codes that enter into the computer to target vandalism and characterized by their ability to copy itself to many copies and their ability to move from place to place and from computer to computer, disappearances and contents cover.