Virus and Malicious Code
From the first e-Activity, explain the key differences between viruses and other malicious codes. Identify at least three (3) different types of viruses, and describe the main differences between each one. Next, explain both the potential threat posed by viruses and other malicious codes and their main effects on computers and productivity.
The differences between viruses and other malicious codes are:
Viruses are dependent on a host program and it is pretty much parasitic and dependent whereas malicious codes, e.g., a worm has the ability to propagate and is an independent form of software. Also, not only are viruses dependent they also propagate by intrusion into another program where it is assimilated and causes infection that travels from computer to computer.
Unlike viruses, a Trojan is another type of malware that is entered into the host (computer or database) where it reveals a purpose of destruction and it is not able to self-replicate or infect. Bots are interactive software with other networks and automate tasks that can be either good or with malicious content.
The potential threat posed by viruses and other malicious codes and their main effects on computers and productivity are the ability to cause a minor irritation, theft of confidential information or money, destruction of data, compromised systems, disabling of systems and networks. The rate of productivity can be affected so severely that information destroyed can cause a business to shut down due to a lack of back-up information, loss of clients can reduce the rate of service done and also cause inability to be considered marketable with a trust seal.
From the second e-Activity, discuss the fundamental lesson(s) that we can learn from the attacks of viruses and other malicious codes. Speculate on the main steps that both individuals and businesses can take in order to protect themselves from attacks that may occur in the future.
The fundamental lessons that can be learned is to find the nature of invasion and the steps needed to accomplish and foil another intrusion. Once an intrusion has been done or a system has been compromised the next step is how to correct, stabilize and prevent further attacks. Some of the ways that this can be done is by peer reviews (combined effort to resolve the state of compromise), hazard analysis (study of vulnerabilities and steps to suggest reduction), testing (systematic run and check of all components), configuration management (literal analysis of written software for possible malware intrusion and code disruption).
Further some of the main steps that individuals and businesses can take to protect themselves from attacks are:
1. Install software to counter malware attacks
2. Update systems with a new operating system
3. Establish password entry with encryption
4. Firewalls (make more complicated)
5. Knowledge on malware and viruses attacks
6. Hire computer experts for assistance and maintenance of security
http://www.microsoft.com/security/portal/mmpc/shared/prevention.aspx
www.quickenloans.com/.../tips-protect-computer-viruses-malware-attacks
Reply to co-student #1
The information on viruses was very informative. It is interesting how a code is programmed to replicate and do a series of commands for data acquisition, key strokes or whatever the task. The effect of all (adware/spyware, trojan, DoS Attack) can be a tremendous threat if no back-ups are available or the attack caused a shut down of the entire business.
A business today without its computer(s) is like a blind duck looking for water.
Thank you.
Felicia
Reply to co-student #2
I agree with your points that a trojan is an intruder with a hidden agenda with the sole purpose of destruction. One thing about adware/spyware is that ultimately its mission is really quite incredible because it goes in with a seeking and gathering of information and is pretty much self-sufficient.
Also, these three can be quite damaging and costly to repair with alterations to the software, database and overall changes in the systematic logical sequence of processing data.
Thank you.
Felicia
Saturday, June 18, 2016
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment