Computer Viruses Essay, Research PaperAnna L. PorterProfessor J.
BrownInformation Systems 201December 1, 1998Computer VirussA computing machine virus is an illegal and potentially detrimental computing machine plan designed to infect other package by attaching itself to any package it contacts. In many instances, virus plans are designed to damage computing machine systems maliciously by destructing or perverting informations. If the septic package is transferred to or accessed by another computing machine system, the virus spreads to the other system. Viruss have become a serious job in recent old ages, and presently, 1000s of known virus plans exist ( Reed 85-102 ) .Three types of viruses are a boot sector viruses, file virus, and Trojan Equus caballus virus. A boot sector virus infects the boot plan used to get down the system. When the septic boot plan executes, the virus is loaded into the computing machine? s memory. Once a virus is in memory, it can distribute to any floppy disc inserted into the computing machine.
A file virus inserts virus codification into plan files. The virus so spreads to any plan that accesses the septic file. A Trojan Equus caballus virus ( named after the Greek myth ) hides within or is designed to look like a legitimate plan.Some viruses interrupt processing by stop deading a computing machine system temporarily and so exposing sounds or messages. Other viruses contain clip bombs or logic bombs.
A clip bomb is a plan that performs an activity on a peculiar day of the month. A logic bomb is a plan that performs an activity when a certain action occurs, such as an employee being terminated. A worm, which is similar to a virus, transcripts itself repeatedly until no memory or disc infinite remains.To observe computing machine viruses, antivirus plans have been developed. Besides thedetection of the viruses, antivirus plans besides have public-service corporations to take or mend septic plans or files. Some damaged files can non be repaired and must be replaced with clean backup files.
The tabular array below lineations some techniques used to protect computing machine systems.TableTechniques for Virus Protection and System BackupUsing Virus Protection SoftwareBacking Up Your SystemInstall virus protection package on every computing machine system.Develop a regular program for copying and hive awaying of import informations and plan files.
Before usage, scan every floppy disc with a virus scan plan to look into for viruses.Implement a backup program and adhere to its guidelines.Check all plans downloaded from the Internet or bulletin boards for viruses.Keep backup transcripts of files in fireproof safes or vaults or off-siteIf your system becomes virus infected and you have inquiries, contact the National Computer Security Association ( NCSA ) for low-priced aid ( Elmhurst, 6 Nov.
1998 ) .Plants CitedChambers, Anita R. , and Zachary W. Peters. ? Protecting Against Virus Attacks. ? Computers May 1998: 45-62.
Elmhurst, Mark. ? Virus Infection: Where to Obtain Assistance? Word 97, Project 3. hypertext transfer protocol: //www.
scsite.com/wd97/pr3.htm ( 6 Nov. 1998 ) .Reed, Margaret E. An Introduction to Using Computers. Chicago: West Davidson Jones Publishing Company, 1998.
Chambers, Anita R. , and Zachary W. Peters. ? Protecting Against Virus Attacks.
? Computers May 1998: 45-62.Elmhurst, Mark. ? Virus Infection: Where to Obtain Assistance? Word 97, Project 3. hypertext transfer protocol: //www.
scsite.com/wd97/pr3.htm ( 6 Nov.
1998 ) .Reed, Margaret E. An Introduction to Using Computers. Chicago: West Davidson Jones Publishing Company, 1998.