0% found this document useful (0 votes)
42 views5 pages

Essay On Computer Viruses

The document discusses computer viruses, detailing their origins, types, and effects on computer systems. It highlights the importance of understanding how viruses operate, their methods of spread, and the potential damage they can cause. Additionally, it emphasizes the need for protective measures, such as antivirus software and user awareness, to safeguard against these threats.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views5 pages

Essay On Computer Viruses

The document discusses computer viruses, detailing their origins, types, and effects on computer systems. It highlights the importance of understanding how viruses operate, their methods of spread, and the potential damage they can cause. Additionally, it emphasizes the need for protective measures, such as antivirus software and user awareness, to safeguard against these threats.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

CHIMBORAZO POLYTECHNIC HIGHER SCHOOL

FACULTY OF COMPUTER SCIENCE AND ELECTRONICS


SCHOOL OF TELECOMMUNICATIONS

ORAL, WRITTEN AND DIGITAL


LANGUAGE
TOPIC: Essay on computer viruses.

MEMBERS:
 Carlos Bayas (11)
 Keven Manzano (58)

LEVEL: Second “A”

ACADEMIC PERIOD:
March - August 2018
COMPUTER VIRUSES:
INTRODUCTION:
Nowadays, computers are not only used as auxiliary tools in our lives, but as an
effective means of obtaining and distributing information. Today, computing is
present in all areas of modern life, greatly facilitating our performance by
systematizing tasks that we previously performed manually.

This computer expansion has not only brought us advantages but also very
important problems in the security of information systems in businesses,
homes, companies, governments, in short, in all aspects related to society. And
among the problems are computer viruses whose purpose is to cause harm to
computer users. They can cause minor problems such as messages appearing
on the screen or even formatting the computer's hard drives, and this can
actually be one of the biggest damages a virus can do to your computer.

The main objective of this work is to show the topic of viruses, from their origins,
their creators, the reason for their existence, among other things. The work will
consist of descriptions of the categories in which viruses are grouped, as well
as the differences between what is a virus and what is falsely considered a
virus.
We will also describe the methods available on the market to counteract
viruses, such as antivirus software, user awareness, and policies for using
technologies in terms of computer security and viruses.

DEVELOPMENT:

Regarding what a virus is, we can say that it is a malware that has the following
purpose:
object to alter the normal operation of the computer, without the permission or
the
user knowledge. Viruses usually replace files
executable by others infected with its code. Viruses can destroy,
intentionally, the data stored on a computer, although also
There are other more "benign" ones, which are only characterized by being
annoying.

About computer viruses, they basically have the function of spreading to


through software, they do not replicate themselves because they do not have
that ability
Like the computer worm, they are very harmful and some also contain a
malicious payload with different objectives, from a simple joke to
cause significant damage to systems, or block computer networks
generating useless traffic.

First of all, the operation of a computer virus is conceptually


simple. A program that is infected is executed, in most cases
sometimes due to user ignorance. The virus code remains resident
(stored) in the computer's RAM, even when the program that contained it has
finished running. The virus then takes control of the
basic services of the operating system, subsequently infecting files
executables that are called for execution. Finally the code is added
from the virus to the infected program and is recorded on disk, thus the process
of
replicated is completed.
In addition, computer viruses are small software programs designed
to spread from one computer to another and to interfere with the operation of
the
equipment.
A virus can damage or delete data on your computer, use the email program
electronic to spread to other computers or even erase all the content of the
hard drive.
Viruses are most easily spread through attachments included in emails.
email or instant messaging messages. For this reason it is
It is essential to never open email attachments unless
know who it comes from and are waiting for you.
Viruses can be disguised as funny picture attachments, greeting cards,
greeting cards or audio and video files.
Viruses also spread as downloads on the Internet. They can be hidden in
illegal software or other files or programs that you may download.
For example, there are different types of viruses, they vary according to their
function or the way
in which it runs on our computer, altering its activity,
Among the most common are:
Trojan
2
: which consists of stealing information or altering the hardware system or
An extreme case allows an external user to control the computer.
Worm: has the property of duplicating itself. Worms use the
automatic parts of an operating system that are usually invisible to the
user.
Logic or Time Bombs: These are programs that are activated when a problem
occurs.
specific event. The condition is usually a date (Pumps
Time), a key combination, or certain technical conditions (Bombs
Logical). If the condition does not occur it remains hidden from the user.
Hoax: Hoaxes are not viruses nor do they have the ability to reproduce on their
own. Are
messages with false content that encourage the user to make copies and send
them to their
contacts. They often appeal to moral feelings ("Help a sick child")
cancer") or the spirit of solidarity ("Warning of a new and very dangerous virus")
and,
In any case, they try to take advantage of the lack of experience of the
novice internet users.
Bug-Ware: Bug-ware is the term given to legal computer programs
designed to perform specific functions. Due to inadequate
Error checking or confusing programming causes damage to hardware
or to the system software.
Macro: According to the International Security Association,
3
macro viruses
They make up 80% of all viruses and are the ones that have grown the fastest
in
the entire history of computers in the last 5 years. Unlike others
types of viruses, macro viruses are not exclusive to any operating system and
are
They are easily spread via email attachments, diskettes, downloads
Internet, file transfer and application sharing.
Mirc: It is not considered a virus as such, but they are identical and have many
common features.
Mirc Viruses are the new generation of infection, they take advantage of the
benefits
provided by the Network and the millions of users connected to any
IRC via Mirc. It consists of a script for the Mirc IRC client. When
accesses an IRC channel, receives via DCC a file called "script.ini". By
By default, the subdirectory where the files are downloaded is the same as
where this
installed the program, this causes the original "script.ini" to be overwritten by the
"malicious" script.ini.
Multi-Part: Multi-part viruses can infect both the boot sector and the
Like executable files, they are usually a combination of all types
existing viruses, their destructive power is far superior to others and high
risk to our data, its size is larger in exchange for having many
more chances to spread and infect any system.

In short, a virus is a dangerous agent that must be handled with extreme


caution.
Be careful, it is generally a computer program, which is
find on the web.

A program, written by one or more people, in a language


programming, the purpose of which is to cause some kind of damage or
problem to the
computer on which it is hosted.
Viruses are inserted into executable files that are made available to them,
slightly increasing their size. These executable files
include any file whose extension is "EXE", "COM", "OVL", "SYS" or
"BIN". Other viruses use free parts of the hard drives where they install
themselves.

Some symptoms and effects that indicate that your computer has a virus are:
Increase the size of the files
Reduce available memory
Delete files from hard drive
Modify programs
They make the computer slower
Send messages, etc.

CONCLUSIONS:
In conclusion we can say A virus is a program designed to be able to
reproduce and replicate itself, inserting itself into other programs
executables or in reserved areas of the disk or memory. Its effects may not
be harmful, but in many cases they cause significant damage to the computer
where they act. They can remain inactive without causing damage such as
formatting disks, destroying files, etc.
Always have a clean boot disk on hand. This boot disk is
created by formatting a diskette with FORMAT/S so that files are included
boot IO.SYS, MSDOS.SYS and COMMAND.COM. This disk will allow
start the computer. Have a list with the equipment configuration, that is, the
parameters of all cards, disks and other devices.
The issues of protection of operating systems are worrying for the
following reasons: The most obvious is the need to prevent rape
intentional and malicious restriction of access by a user of the
system. Of more general importance, however, is the need to ensure
that each component of a program only uses the resources of the same
according to the criteria established by the operating system.
To build a protection system, it is necessary to define; on the one hand, the
protection strategy (from which failures the system must be protected) and on
the other hand, the
protection mechanisms (how to achieve the protection defined by
the strategy).

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy