• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  • Level: GCSE
  • Subject: ICT
  • Word count: 3404

Defining computer viruses

Extracts from this document...

Introduction

In defining computer viruses Parsons and Oja wrote that the technical definition of a computer virus is a set of program instructions that attaches itself, and spreads to other files. Viruses corrupt files, destroy data, displays irritating messages, or otherwise disrupt computer operations. (185) In continuing, Parsons and Oja explained that there is a common misconception that viruses contain program codes to spread themselves from one computer to another. They do not. The reason viruses spread is because people redistribute infected files by exchanging disks and compact discs, sending e-mail attachments and downloading software from the Web. (185) For the book titled Computer Concepts, it is learned that a computer virus generally infects the files executed by your computer such as those with .exe, .com or .vbs extensions. When a computer executes an infected program, it also executes the attached virus instructions. These instructions then remain in the Random Access Memory, waiting to infect the next program that the computer runs or the next disc it accesses. (185) In addition to replicating itself, a virus might perform a trigger event, sometimes referred to as payload. The resulting effects can range from displaying an annoying message to corruption of data on the computer's hard disk. Trigger events are often keyed to a specific date. The Michelangelo virus, for example was designed to damage hard disks on March 6, the birthday of artist Michelangelo. (185) A key characteristic of viruses is their ability to lurk in a computer for days or months, quietly replicating themselves. While this is taking place, a user might not even know that his or her computer has a virus; therefore it is easy to inadvertently spread infected files to other people's computers. (185) According to CNN.com Technology, there are thousands of variations of viruses, most falls into one of the following six general categories, each of which works its magic slightly differently. ...read more.

Middle

This type of e-commerce is known as Business to Business and it account for some 80% of the total value of all e-commerce operations. However, individuals have also been drawn to the internet for commercial reasons. For example, many individuals are using the Internet to buy directly from retailers in e-commerce. Examples include amazon.com and dell.com. The reasons for the emergence of such activity include convenience, greater choice and savings. There's no doubt the adoption of Web technology provides a company with the opportunity to change its relationships with the organizations and individuals with which it does business--from trading partners to suppliers, from internal customers to end customers. Perhaps the greatest opportunity for change lies in the collaborative capabilities the Internet provides. The Internet supports the transition of transacting business through discrete, predictable, serial processes to a more cyclical, dynamic approach. The Internet provides a means to readily adapt technology that lets all parties work from the same system, using the same information, in a real-time environment. Communication is integral part of businesses. Communicating status and changes regarding product-development schedules is just one way in which the Internet is changing business relationships. The Internet has given businesses the ability to increase their communication to their internal and external customers and break down perceived barriers to management. For example, business associates can receive updates from the chairman via the Internet, as well as talk directly with him through regular Web chats. Through broadcasts over the Web, we hear the message delivered at financial-analyst meetings at the same time the analysts are receiving it. In addition, a manufacturer alerting everyone immediately of a delay and reflecting this delay on the shipment schedule in real time gives retailers, transportation companies, and importers the opportunity to take corrective measures. The Internet also permits retailers to become more customer focused and responsive. External customers now have the power to determine when they shop, what they want to shop for, and how they want to receive the goods (by mail, by truck, or for pickup at the nearest store). ...read more.

Conclusion

However it must be noted that a virus can store itself on a backup disk, therefore is necessary to run a virus check before backing up data or you may reinstall infected files. In continuation, businesses which engage in e-business may find it prudent to engage in a full time, on staff security specialist. In addition, businesses should have access to, or contact with, firms that specialise in cyber security. Cyber security requires daily attention in order to keep up with and stay ahead of the threats that emerge almost daily. In relation to e-mail viruses, users at businesses should consider deleting, unexpected or unrequested e-mail, or e-mail from someone they don't know. This is because many viruses are sent in e-mail attachments. It must be noted also, that if you receive a suspicious e-mail from someone you know, it is possible that their computer is infected with a virus. Though many view viruses negatively, there are viruses that could be considered "good." The Potassium Hydroxide (KOH) virus has the unique distinction of being a beneficial virus. The virus asks the user for permission to encrypt all the data on the user's hard disk or floppy disk once infecting a machine. If the user chooses not to accept, the virus simply deletes itself. Aside from this beneficial behavior, the virus has the same infection methods as any other virus. Currently, viruses like any other program need the intervention of a process or someone to run. Also, like any other program viruses usually contain bugs that could inactive their destructive behaviors. Viruses are limited to certain vehicles of transference like the Internet or a floppy disk. However, with improving technology, viruses can circumvent some or all of these limitations. Cellular phones, Pocket Personal Computers (PC), and other handheld devices that use wireless communication and email may become infected with a new strain. Because of the pervasiveness of technology, it encompasses much of the good -- and plenty of the bad -- of the whole wide world. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. ICT Systems in Everyday Life: Your Local Community

    It has been proved effective in both cutting and detecting crime and because of this people now feel safer when they are out and about. CCTV is not just used for crime, problems and the 'bad' side of society. Kings Lynn CCTV is used for many 'good' things, such as

  2. Information Security.

    Since the connection is always up, your computer's IP address will change less frequently , thus making it more of a fixed target for attack. Many broadband service providers use well-known IP addresses for home users. So while an attacker may not be able to single out your specific computer

  1. SK-II has already established as a leading brand within its' skin-care industry. By empowering ...

    Another form of one-to-one haggling is called "name your price" or demand pricing model where SK-II can let consumers name their own prices for cosmetic products while SK-II provide cosmetic products that suit to these consumers on a trade-off that the consumer may get old stock or must buy other complimentary products as well.

  2. Development of a set of marketing recommendations, marketing mix campaign and customer care initiatives.

    So it gives opportunities for businesses to use this as its advertising tool, advertising on interactive is likely to increase. * Wep phones This enables mobile phones to access the Internet. This may be the technology for the future for shopping, advertising campaigns.

  1. Unit 23: Investigating Communications and Networks

    have got broadband internet connection then you need the broadband installation CD. If you have got dial up internet connection then you need your ISP setup CD. Without the installation CD's for both broadband and dial up you will not be able to connect to the internet.

  2. ICT in society.

    Without personal computers life would be unimaginably different now they have become so prominent in peoples everyday lives. The programs on personal computers are extremely useful to everyone who needs them, without these programs life would be a lot harder. The main packages used are word processing and spreadsheet packages.

  1. Bussines and Communication Systems

    * Message can be sent to a mass group of users * Emails can be sent at any time and the message then awaits the receiver. * A printout of the message on the email can be made. 7 disadvantages of Email are: * Computer Viruses can corrupt files sent

  2. Computer Networks and Distributed Systems - Wireless network of devices: General packet radio services ...

    3.3 INTERNET AWARENESS For the first time, GPRS fully enables Mobile Internet functionality by allowing inter-working between the internet and the new GPRS network. Because of GPRS, Any service that is used over the fixed Internet today like for example; File Transfer Protocol (FTP), web browsing, chat, email, and

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work