A virus is a computer program that affects other computer programs by replicating itself. Additionally, a virus has the capability to duplicate itself by activation, with the intention that it is able to grow, always looking for latest host platforms. The majority risk-free viruses carry out operation in a way that they make their copies as well as extend to more computers. In addition, a computer virus code may perhaps affect additional computer software or it can totally change the data, conceivably self-devastating as performed. However, the only proof computer virus similar to this is the devastation they have caused on the affected PCs. Just because of this capability it becomes extremely hard to offer protection beside virus programs.
Moreover, during the last few decades, it is observed that computer viruses have been in action with the development of computer technology. A virus is perceived as “a self-copying computer code or program which multiplies by copying it into further documents or .exe files.” Similar to an actual virus, a computer virus changes the system of an available computer program to “control” it as well as starts its replication. Frequently computer viruses have a special task or attention, for example removing definite data files or causing harm to a computer system.
A computer worm is a type of infection which has the capability to extend itself to one or more computer systems with no need to be transmitted as an element of a host message. Additionally, a computer worm has the potential to destroy the hosted data on a computer, practical performance, or affect network utilization, at the moment it gets run. In most cases a worm does not really damage either the computer programs or hardware, as a minimum in assumption. In addition, at the present, mostly PCs are linked to the local area networks and web based technology like internet, helping the distribution of wicked programs. In addition, a number of sources utilize a substitute term in which a virus is declared as some type of self-duplicating malware program. Most well-known examples of worms comprise Melissa, Sobig, ILoveYou, Sasser and MyDoom worm.
There are many types of viruses, some of which comprise:
Polymorphic viruses: Polymorphic viruses alter their form with every attack. Additionally, these types of encrypted viruses are typically hard to perceive as they are superior at concealing themselves from anti-virus programs (Conklin,arthur et al., 2018).
Boot Sector Viruses: These viruses are the oldest kind of virus. The influence of these viruses is observed on startup programs of computer and the virus activates itself with the startup of computer. Boot sector viruses are the type of viruses that spoil the boot sector (known as master boot record) of an infected system. These viruses initially change or over-write the actual boot code, by swapping it with devastated boot code. They will then move the actual boot sector data to an additional hard disk sector, then declaring that particular disk sector like a spoiled mark on the storage disk with the intention that it will become useless for future (Conklin, White, Williams, Davis, & Cothren, 2016).
Macro Viruses: This kind of viruses utilizes commands known as macros those are fixed in further computer programs to cause harm and extend to additional related files used by that definite computer program. For example Microsoft applications such as Word and Excel use macros, and macros viruses are able to grow through the utilization of these certain commands.
File Viruses: File viruses have the capability to join themselves to further computer software programs. As the program is executed, the file virus makes its way to the memory locations so that it could be able to affect other executable files or start destructing the computer system (Easttom & Taylor, 2011).
Multi-partite viruses: These viruses affect both .exe files and boot sector of hard disk. They are the nastiest types of viruses since they are able to merge a few or all of stealth virus methodologies, through polymorphism practice to avert its exposure to various antivirus programs.
Stealth viruses: These types of viruses try to conceal from both the operating system capabilities and antivirus program. However, to perform this activity, they have to reside in computer memory so that they could be able to interrupt every effort to employ the operating system (Easttom, 2016). Additionally, a stealth virus is able to conceal alterations it usually creates to directory framework, file sizes, and further features related to an operating system. Because portion of the virus stays in memory, resultantly users will experience less memory usage.
Few cases which spread viruses are:
There are a number of prime factors that reveal that a computer system has been infected with a virus program. Some of them are outline below: (Walker, 2013)
Once a computer is infected with virus, it is important to remove the virus from the system so that the system may work properly and without bugs. However, confiscating a computer virus program is regarded as a complicated job lacking the support of computer virus deletion programs (Walker, 2013). For facilitating the process of virus removal, it is necessary that we keep our computer system up-to-date with the newest windows and antivirus updates, fixes, antivirus tools, and patches as well as we must be aware about the most modern threats and vulnerabilities, run our computer system as a regular user (not like an administrator), and afterward we have to take into account a security policy while we use the internet, download multiple files, and send files over the network. When we come to know that our system has a virus, its category or the way it came to our system is not much significant like deleting it and applying proper policies to stop its entrance into your system (In Munir, 2017).
In order to attain maximum security against viruses, we should have to consider the following steps:
File-sharing Networks Worms: A shared folder is used to hold the replication of this worm; almost certainly this folder is placed on the local computer. Then the replica of the worm is added into the shared folder with the name of file that looks to be secure. At this time the file sharing worm is prepared for download using the Peer to Peer network as well as makes the continuous sharing of infected file over the network (Kanopy (Firm), 2014).
Email Worms: In this type worm distribution is performed using sullied messages of electronic mail. In this scenario, any type of website link or attachment within an email message might include a degraded website link (Walker, 2013).
Internet Worms: These worms are considered as the malevolent worms. These worms will scrutinize the entire accessible resources of the network with the help of neighboring OS services or look into the wireless network like internet for defenseless computers. These vulnerable computer systems then attempt to connect in order to obtain full control over these computers (Kizza, 2015).
IRC Worms: In this type of worm chatting channels are the prime objective as well as the similar distribution or contagion technique is employed like I have mentioned earlier i.e. transferring tainted files or besmirched websites links (Stallings & Brown, 2015). In this scenario, transmitting an infected file is considered as less successful since the receiver needs to validate delivery, save the received file and open the file earlier than the infectivity will occur on the computer.
Instant Messaging Worms: In IM worms the distribution is performed using instant messaging application programs by transferring violated website connection to each one whining the local contact list. The technique selected to send the link matters a lot in this type of worm spreading (Kizza, 2017).
Identity Theft: A large number of worms have been developed to duplicate on a computer with the purpose of stealing that computer information and returning all this valuable information to a user.
Spam Channels: A number of computer worms execute with the intention to share web proxies’ information to a user at inaccessible site. This user is able to afterward "capture" our email message otherwise Internet access as well as employ this information to send a spam to the host websites that participate in illegitimate actions (Lehtinen & Sr, 2011).
Disturbing harms: Similar to any other task of stealing or destruction, these types of worm not only take control of private resources and time to repair any harm, but as well makes the casualty experience exposed and insecure.
Destruction and Data Decay: A few worms are planned to basically or erratically offer destruction during their replication on a computer, as well as damage or remove vital data and information on a computer (Stallings & Brown, 2015).
Computer worms those extend via weaknesses in network services could excellently be defended by installing most modern patches offered by operating systems (Stallings & Brown, 2015). This comprises computer worms for instance SQL Blaster and SQL Slammer. On the other hand computer worms those extend like Trojan horses are able to superbly be defended by deleting unwanted emails or not to download any electronic mail attachment. These attachments include more than executable files. In this scenario, Microsoft Word and Excel files include macros which can provide huge harm to the data and information lying on a specific computer (Mohanta, Velmurugan, & Hahad, 2018).
At present, there exist a number of highly developed spyware remover programs those have the potential to examine the computer in the same manner antivirus program carries out the scanning process. In addition, these programs’ widespread signature databases are able to as well distinguish and delete harmful computer worms and related nasty codes. The dominant and most leading antispyware software like that Ad-Aware SE, eTrust PestPatrol, Microsoft AntiSpyware Beta, SpyHunter, and Spyware Doctor are recognized as extremely reliable worm detection and deletion tools. Moreover, these software programs have the capability to strongly detect malicious type of computer worms and spywares and then remove them from the computer (Panko & Panko, 2015).
The major difference between a virus and a worm is that a virus needs a user to execute it on a computer which activates it to offer damages and troubles, whereas a computer worm distributes as well as brings about a lot of harm without any involvement of a person. Thus more generally, for our system to be affected through a computer virus code, we usually have to perform a task, for instance open an infected file, even as by means of computer worms our computer system is able to be collapsed yet we don’t execute any software or open an email attachment (Pantels, 2017).
SECTION 1 - REVIEW
Questionnaire is a strategy for information accumulation that is both subjective and quantitative; contingent upon the kind of inquiries utilized. It is subjective once open-finished inquiries are utilized while it is quantitative once close-finished inquiries. The information from respondents is regularly dissected utilizing programming, for example, SPSS (Statistical Package for the Social Sciences) that is custom worked to investigate such information. Questionnaires, once finished, are submitted for examination through a few methods. The most prevalent is the utilization of a scale or record, because of its effortlessness (Rami?rez, 2017).
The initial phase in breaking down questionnaire information is to make a basic lattice that examines every one of the information in the questionnaire. The lattice is valuable since it makes it less demanding to store, and in the meantime translate, the information from the questionnaire. The lattice is typically inquiries against the reactions from the respondents. Outlining a basic coding framework takes after straightaway. The framework is reliant on the sort of inquiries utilized as a part of the examination. On account of shut inquiries, a straightforward numerical scale is utilized. The scale utilized as a part of the questionnaire will likewise be utilized as a part of the lattice. Amid the coding method, there ought to be recompense for missing information or respondents choosing different classifications (Piessens & Vigano?, 2016).
SECTION 2 – SELECTION
In this research, Online Survey will be the methodology that will be utilized. This will be done by creating an account with SurveyMonkey and then designing a survey. After designing a complete survey then a web link is generated. This web link is sent via SMS, email or any chat services that my target population can use. They will be required to click on the link and in less than five minutes fill in the questions.
Some advantages of using online surveys include:
In this report I have presented a deep analysis of computer viruses and computer worms at the present age of technology. Progressively, it is observed that computer viruses and worms are turning out to be more widespread. The modern technology and programming techniques have massively helped computer programmers and hackers to write malicious code to bring devastation to computer system. In this report I have presented types of viruses and worms, techniques of dispersion, their potential harm to the computer, possible protection techniques and afterward methods of removal of computer viruses and worms. With the passage of time we are expected to have deep knowledge of computer viruses and worms and their potential influences on computer technology. I hope this research will facilitate effectively in gaining knowledge of computer viruses and worms and their potential impact in the field of computing.
Brown, B. C. (2011). How to stop e-mail spam, spyware, malware, computer viruses, and hackers from ruining your computer or network: The complete guide for your home and work. Ocala, FL: Atlantic Pub. Group.
Conklin,arthur, White, Greg, Cothren, Chuck, Davis, … Dwayne. (2018). Principles of Computer Security: Comptia Security+ and Beyond. McGraw-Hill College.
Conklin, W. A., White, G. B., Williams, D., Davis, R., & Cothren, C. (2016). Principles of computer security.
Easttom, C., & Taylor, J. (2011). Computer crime, investigation, and the law. Boston, MA: Course Technology.
Easttom, W. I. (2016). Computer security fundamentals. Place of publication not identified: Pearson It Certification.
Gollmann, D. (2011). Computer security. Chichester: Wiley.
Gregory, P. H. (2015). CISSP guide to security essentials.
Hess, M. (2015). Online survey about current use of 3D imaging and its user requirements in cultural heritage institutions. 2015 Digital Heritage. doi:10.1109/digitalheritage.2015.7419517
In Munir, K. (2017). Security management in mobile cloud computing.
Kanopy (Firm). (2014). Application security principles.
Kizza, J. M. (2015). Guide to computer network security.
Kizza, J. M. (2017). Guide to computer network security.
Lehtinen, R., & Sr, G. (2011). Computer Security Basics. Sebastopol: O'Reilly Media.
Mohanta, A., Velmurugan, K., & Hahad, M. (2018). Preventing Ransomware: Understand, prevent, and remediate ransomware attacks.
Panko, R. R., & Panko, J. L. (2015). Business Data Networks and Security.
Pantels, T. (2017). Windows Performance Toolkit: Virus Analysis. Carpinteria, Calif.: Lynda.com.
Piessens, F., & Vigano?, L. (2016). Principles of Security and Trust. (Lecture Notes in Computer Science ; 9635.) Berlin, Heidelberg: Springer Berlin Heidelberg.
Poulsen, K., Summerer, E. M., & Tantor Media. (2015). Kingpin: How one hacker took over the billion-dollar cybercrime underground. Place of publication not identified: Tantor Media.
Rami?rez, L. E. (2017). Distributed Resource Allocation and Optimization Algorithms Applied to Virus Spread Minimization.
Stallings, W., & Brown, L. (2015). Computer Security. Pearson Education UK.
Walker, H. M. (2013). The tao of computing. Boca Raton, FL: CRC Press/Taylor & Francis.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2020). IMAT5262 Research Ethics And Professionalism In Computing. Retrieved from https://myassignmenthelp.com/free-samples/imat5262-research-ethics-and-professionalism-in-computing/e-monitoring-and-surveillance-of-employees.html.
"IMAT5262 Research Ethics And Professionalism In Computing." My Assignment Help, 2020, https://myassignmenthelp.com/free-samples/imat5262-research-ethics-and-professionalism-in-computing/e-monitoring-and-surveillance-of-employees.html.
My Assignment Help (2020) IMAT5262 Research Ethics And Professionalism In Computing [Online]. Available from: https://myassignmenthelp.com/free-samples/imat5262-research-ethics-and-professionalism-in-computing/e-monitoring-and-surveillance-of-employees.html
[Accessed 27 January 2021].
My Assignment Help. 'IMAT5262 Research Ethics And Professionalism In Computing' (My Assignment Help, 2020) <https://myassignmenthelp.com/free-samples/imat5262-research-ethics-and-professionalism-in-computing/e-monitoring-and-surveillance-of-employees.html> accessed 27 January 2021.
My Assignment Help. IMAT5262 Research Ethics And Professionalism In Computing [Internet]. My Assignment Help. 2020 [cited 27 January 2021]. Available from: https://myassignmenthelp.com/free-samples/imat5262-research-ethics-and-professionalism-in-computing/e-monitoring-and-surveillance-of-employees.html.
In search of quality English education, many students travel all the way to Australia. However, unfamiliar with the education style, they end up in an unpleasant situation. This is where MyAssignmenthelp.com comes into the picture. We provide swift assignment help in Australia, with minimal pay for essay writing. If you are not aware of the various types of essays, do not panic. Over 5000 qualified and experienced native writers in our team provide narrative, argumentative, and even college application essay help around the clock to fulfil your requirements. Furthermore, our hassle-free essay editors provide proofreading service to get rid of the grammatical errors.
Answers: 1. The qualities as a leader which Darwin had, clearly justifies that he was a level 5 leader. Some of the qualities which Smith possessed are as follows: Focus on achieving goals: He was really focused and had an aim in his mind that he wanted to make the company great from good. He would not expect no for an answer as what he needed, he achieved. No Mediocrity: The level 5 leaders clearly know that there are three things which ...
Read MoreAnswer: Introduction: The legal system of the United States is the largest in the world (Brewer and Heitzeg, pg 53). In 2015 there were more than 6.7 million people in the United States, including 2.2 million US, state or local prisons. The detailed figures of the US Department of Criminal Law and especially the racial developments affecting African Americans reveals that the African Americans were often arrested when compared to white A...
Read MoreAnswer: 1. Various Types of the Biometric System The various kinds of the biometric authentication system are given below: i) Face Recognition Systems: The most significant kind of the biometric system is the respective face recognition system that helps in the verification or better identification of the person from several digital images, by the analysis or comparison of the patterns (Anisi et al., 2017). The few techniques that are utili...
Read MoreAnswer: Introduction Foreign direct investment involves the ownership of assets or having a share of a company or a business in a foreign country. The ownership gives the foreigner a chance to decide on matters concerning the business since he or she is recruited to the business management. In the current world, FDI is growing tremendously all over the world. The growth is associated with the globalization aspect adopted by the business...
Read MoreAnswer: Part A What components make up an Educational Program? There are three components of a good educational program; personalized unbiased evaluation, IEP progress and enactment, and LRE placement founded on research and high prospects. How does Rowley address Educational Program? Rowley address educational program in a way that the Local Education Agencies (LEAs) must emphasize the Individuals with Disabilities Educa...
Read MoreJust share requirement and get customized Solution.
Orders
Overall Rating
Experts
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat. If you are unable to calculate word count online, ask our customer executives.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
I am writing to you to let you know that I am extremely impressed with your recent work. You\'ve dedicated years of service to this company, and your work exemplifies and principles now more than ever. Thank you for all that you have done to help us ...
Australia
Very good experience, so happy with the result. Very highly and strongly recommend this website.
Australia
I got a good price and quality work was provided to me in a short period of time. I scored really well in my assignment. All the rework was done in time which is great.
Australia
They have provided me with work having 0% plagiarism which really helped me to score well in my assignment.
Australia