StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Basic Concepts of the Computer Virus - Report Example

Cite this document
Summary
This report "Basic Concepts of the Computer Virus" gives an overview of the basic concepts of the computer virus and its working, guides through computer virus dangers and hazards and demonstrates overall analysis of the problem and solution in a more simple and comprehensive way…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.1% of users find it useful
Basic Concepts of the Computer Virus
Read Text Preview

Extract of sample "Basic Concepts of the Computer Virus"

A Report on Computer Viruses By Table of Contents Table of Contents 2 Introduction 3 2- What is a computer virus? 3 3- How Virus Spreads? 4 4- Symptoms and Effects of a Computer Virus 5 5- Protecting Against Computer Viruses 6 7- How to Clean a Virus-Infected Computer 10 8- Conclusion 13 9- Bibliography 14 1- Introduction A computer virus is an emerging security threat for computers and data sorted in it. However, by taking some effective actions we can protect our systems from virus attacks. This user manual type report gives an overview regarding the basic concepts of the computer virus and its working. This report will guide through a steps by steps way in order to counter computer virus dangers and hazards. This report demonstrate overall analysis of the problem and solution in a more simple and comprehensive way. 2- What is a computer virus? First of all we need to know that what a computer virus is? A computer virus is a small software program that is developed and spread from one computer to another to interfere with computer operations. Additionally, a virus can delete or corrupt data on our computer, make use of our e-mail program to extend its circle to other linked computers, or even delete our particular data or everything from our hard disk (Microsoft Corporation, 2010). However, computer viruses can be found and developed in any part of the world. In addition, they are created to work on our computers, without our authorization, as well as in many instances, destroy the data and information on our computer. Additionally, several viruses are not dangerous for computers however they irritate us by giving warning and displaying messages. In addition, various viruses harm data in a computer, on the other hand, other viruses, once they enter into a computer, will obliterate the data stored in the computer (Ray, 2004, p.137; Shelly et al., 2005; Norton, 2001). These dirty programs are written by some "dishonest" people. These virus applications are put into the commonly used programs or applications so that when that program will run the linked virus program will also be executed. In this way the virus "infects" the executable file or program. Furthermore, viruses operate in a similar way as DOS or Windows machines and can infect zip or exe files (Myron, n.d). Figure 1- Computer Virus a danger for computers Source:[http://www.thewb.com/blog/files/2009/03/computervirus.jpg] 3- How Virus Spreads? It is essential to know how virus spreads so that we can take some effective actions to prevent the virus from spreading into other computers. A virus can enter into our computer via web sites, email, diskettes, or other media. Thus, it is essential to be very cautious regarding what we permit within of a computer and networks. Also, to make secure a computer from virus attacks, we should install antivirus software and we should scan each application before running (Ray, 2004, p.137) and (Myron, n.d). Figure 2- How Virus Spread Source:[ http://www.contemposervices.com/news/uploaded_images/virus-753148.gif] In addition, viruses also spread via some greeting cards, funny images, or audio as well as video files. Another way of spreading viruses is via downloads from the web. In this scenario some hidden files are downloaded that can harm our computer system or stored data. Furthermore, at the present, there are numerous ways of virus distribution such as flash drive, CD, DVD or some memory cards. Since, these devices are attached to the computers for data transfer but some hidden viruses are also transferred with these systems (Microsoft, 2007). Figure 3- How Computer Virus Spread – Source[http://media.nowpublic.net/images//73/a/73a63487f31bc9bd8b686b94e1bf815c.jpg] 4- Symptoms and Effects of a Computer Virus After the attack of a virus program we could have symptoms and effects through which we can recognize that computer is being attacked by a virus program. The below given are the some of the primary indicators that show a computer is infected (Microsoft, 2007): Computer data drives are not accessible or not working Our computer operates slower than normal Sometime computer stops responding or hangs during working In some cases computer completely crashes and do not boots In some cases computer restarts again and again System is not able to print items correctly. Virus makes that computer’s applications to not work properly Sometimes unusual error messages appear on the screen An antivirus program is not able to install on the computer, or sometime antivirus applications does not run suitably Another indication is that system shows double extension on an attachment we have opened recently like that .vbs, .jpg, .exe. or .gif extension An antivirus system is stopping for no reason. As well, the antivirus program could not be restarted Figure 4- Symptoms and Effects of a computer virus- Source [http://pctuner.abhi3d.com/images/banner.jpg] 5- Protecting Against Computer Viruses Stopping a virus program or infection on our computer is not a great deal easier job. However, there are various easy precautions that we can consider to protect against the virus attack. Following are some of main procedures that we can take to avoid and stop virus attack (The How-To Network, 2001) & (Kroll Ontrack Inc., 2010) & (Microsoft, 2007): Stop unidentified attachments:  The majority viruses are distributed via e-mail attachment that, fortunately, is able to turn out to be active when the attachment is unzipped or opened. However, we are not able connect virus immediately by receiving e-mail, thus, it is a high-class consideration to delete messages holding attachments if we do not the sender of them.   Figure 5- Stop unidentified attachments, Source-[http://www.comfsm.fm/~dleeling/training/attachment_virus1.gif] Keep away from Bootleg or Pirated Software: Virus writers search for the people finding free software, to distribute their creations across the internet as well as around the world. In this scenario we need to only install some well reputed software. Thus, we should keep away from the unknown software system that can be harmful to our system. Figure 6- Virus Program –Source [http://technodigits.files.wordpress.com/2007/07/windowslivewriternewfolde.exeproblemsremovethebrontokworm-12eb7newfolderexe3.jpg] Treat Data Travel Drives by Suspicion: We need not to trust on data travel drives. Thus, we need to scan the each external device that connects to the system. Furthermore, we should not to open any suspicions file that is available in the system. Figure 7- Data Travel Drives source of spreading viruses –Source[http://cache.gawker.com/assets/images/gizmodo/2008/11/circleslashflashdrive.jpg] Back Up: In case of some hardware failure, or crash due to virus attack we need to take some backup for our business or personal data. Since, due to a virus attack our data can be corrupted or deleted. Therefore we need to take data backup and keep the data on external data storage medium. Figure 8- Backup system data- Source[http://www.profitability.net/content/images/BackupRecovery.jpg] Install Antivirus Software: The majority of antivirus software packages present an automatic background safety approach that will clean and detect virus infections as they come into view. If we do not have this alternative, then we need to purchase and install virus software to scan some e-mail attachments, internet downloads as well as foreign disks previous to opening or running them.  Figure 9- Best antivirus systems- Source[http://www.prajishsankar.com/blog/wp-content/uploads/2009/03/best_free_antivirus_software_-in_2009.jpg] Scan All Drives: We need to routinely scan our system (all the data drives) in order to protect the system data. In this scenario we need to check the each system drives for the virus attack. Figure 10- Virus Scan – Source[https://www3.georgetown.edu/uis/images/software/documentation/antivirus/pc/symantec9/sav9.virus.scan6.gif] Update Often: To protect the system from external virus attacks we need to update the antivirus software from its web based platform. Thus, we need to install and download the updates regularly in order to establish effective system security. Figure 11- Antivirus system updates- Source- [http://d.emule.com/avg-anti-virus-system-virus-update-090108-espanol/avg-anti-virus-system-virus-update-090108-espanol-1.jpg] 7- How to Clean a Virus-Infected Computer This section covers the discussion on how to clean and make a computer virus free. After you suspect that your computer has disturbing you, it means it can have some virus. At that time you need to remove your system from any networks it might be on, as well as from the internet. In this way, you would not unconsciously spread the bug to others. After that you need to take following steps to make a computer virus free (eHow, Inc., 2010): Initially you need to stop all the working and save all the important files. It is significant to take back-up of important data on some external devices The next step is about running anti-virus software’s virus-scanning option if you are having some virus-scanning system installed If you do not have anti-virus software then don’t worry because there are various anti-virus applications available on the web free of cost. For example, you can use Avira-Antivir-Personal anti-virus software that is freely available from the web. This software can be downloaded from this website link: http://www.avira.com After downloading this application you need to install this software by running it through its installation procedure. This wizard will guide you in a step by step fashion to complete the overall installation as shown in below image: Figure 12- Installing program After completing the installation you need to update the anti-virus software that will download some new virus definitions for the anti-virus software, in this way the system will be able to detect latest types of virus in the system. The image given below shows the procedure of updating the antivirus. Figure 13- Updating antivirus After completing antivirus software update you need to run the complete system virus scan. In this way the software will detect and delete any viruses in your system. The procedure of performing complete system virus scan in shown below: Figure 14- Performing complete system scan When antivirus completes its system scan you need to restart the system. In this way your system will be free from all type of viruses and you could continue your daily working. 8- Conclusion This report has presented a detailed overview of the computer virus and its effects on the computers. This report has discussed various areas those can be affected through virus. This report has also outlined the ways to protect your system from viruses. I hope this manual will be helpful to you in making your system virus free. 9- Bibliography 1. eHow, Inc., 2010. How to Clean a Virus-Infected Computer. [Online] Available at: http://www.ehow.com/how_113706_clean-virus-infected.html [Accessed 28 March 2010]. 2. Kroll Ontrack Inc., 2010. Computer Virus Information. [Online] Available at: http://www.ontrackdatarecovery.com/computer-virus-information/ [Accessed 29 March 2010]. 3. Microsoft Corporation, 2010. What is a computer virus? [Online] Available at: http://www.microsoft.com/nz/protect/computer/basics/virus.mspx [Accessed 29 March 2010]. 4. Microsoft, 2007. Computer viruses: description, prevention, and recovery. [Online] Available at: http://support.microsoft.com/kb/129972 [Accessed 28 March 2010]. 5. Myron, H., n.d. What is a Computer Virus? [Online] Available at: http://www.newton.dep.anl.gov/teachers/compvir.htm [Accessed 29 March 2010]. 6. Norton, P., 2001. Introduction to Computers, Fourth Edition. Singapore: McGraw-Hill. 7. Ray, R., 2004. Technology Solutions for Growing Businesses. New York: American Management Association (AMACOM). 8. Shelly, Cashman & Vermaat, 2005. Discovering Computers 2005. Boston: Thomson Course Technology. 9. The How-To Network, 2001. Computer Viruses: How-To Protect Against Computer Viruses. [Online] Available at: http://www.how-to.com/Operations/how_to_protect_against_computer_viruses.htm [Accessed 28 March 2010]. Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(Basic Concepts of the Computer Virus Report Example | Topics and Well Written Essays - 1500 words, n.d.)
Basic Concepts of the Computer Virus Report Example | Topics and Well Written Essays - 1500 words. https://studentshare.org/information-technology/1735252-introduction-to-computing
(Basic Concepts of the Computer Virus Report Example | Topics and Well Written Essays - 1500 Words)
Basic Concepts of the Computer Virus Report Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/information-technology/1735252-introduction-to-computing.
“Basic Concepts of the Computer Virus Report Example | Topics and Well Written Essays - 1500 Words”. https://studentshare.org/information-technology/1735252-introduction-to-computing.
  • Cited: 0 times

CHECK THESE SAMPLES OF Basic Concepts of the Computer Virus

Information Security in Technology

Employers preserve information about their companies, employees, and other important documents on the computer systems.... This provides consistent concepts, and set of terminologies, which professionals can refer to when security issues arise.... Information security has three primary concepts that are confidentiality, integrity, and availability triad since it focuses on security in relation to available data....
5 Pages (1250 words) Research Paper

Data Security Policy and Effective W5 Security System

The following pages present an analysis of Data Security Policy and comprise detailed analysis and recommendations regarding the improvements to our department's data security policy.... Business and client information security and privacy are the leading concern in any… This report deals with the preservation of business and client information as well as other confidential information by improving Modern technology poses a threat in terms of ease of access to data and information which is exchanged over the Internet, which can compromise the privacy of both individuals as well as confidential information pertaining to business activities (Laudon & Laudon, 1999)....
5 Pages (1250 words) Essay

Security Risks on the Web: Problems and Solutions

In 1989, the World Wide Web was pioneered by Sir Tim Berners-Lee, an English physicist and is now serving as the director of the WWW consortium together with a Belgian computer scientist named Robert Cailliau (Marine, 1999).... One day you check your mail and receive a collections letter stating you have an outstanding balance for a company named ABC, which you have never heard of....
9 Pages (2250 words) Essay

Security Strengths and Weaknesses of the Internet

“A basic knowledge of internet security is essential for anyone who uses the web for tasks such as email, networking and shopping” (Paul).... In the essay “Security Strengths and Weaknesses of the Internet” the author sought to provide the purposes behind implementing internet security measures....
6 Pages (1500 words) Essay

Difference between Data Redundancy and Backup

It is most suitable for backing up music, photos, and other data from the computer's memory.... t has a relatively high capacity to provide adequate backup for music and video files, pictures and other unused data from the computer memory.... elatively small capacity for large files that need to be backed up thus requiring several Disks to successfully backup files from the computer memory.... This media of backup is not easily affected by computer failure or viruses as is the case with other storage media....
9 Pages (2250 words) Essay

EBusiness and Ethics

Several decades ago, it was safe to store data in the computer since there… However, in the contemporary society, several security concerns about data held on computers have arisen.... Several decades ago, it was safe to store data in the computer since there were no cases of hacking and data theft.... Setting up security for the data and cell phone will include activating the firewalls, blocking any spyware attacks, as well as using valid malware software or anti-virus....
2 Pages (500 words) Essay

Law of Electronic Commerce and the Internet

For instance, according to the terms of the Uniform computer Information Transactions Act (UCITA), clickwrap agreements that allow a user to indicate his agreement to the terms before clicking on “I accept” it will be legally enforceable, so long as the user had a chance to review the terms of the agreement before signing2....
11 Pages (2750 words) Assignment

Analysis of Disaster Recovery Planning

But it cannot be considered a reliable source of backup in case of a company-wide virus spread or server crash.... These services use software that facilitates the uploading of the desired files to a remote computer and the capability of restoring files whenever needed through the internet.... Since it is a software company, therefore, their basic asset and source of profit is the code of the products and their documentation....
3 Pages (750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us