-
Essay / Virus - 2617
Computers have become much more important and popular in our society in recent decades. The computer's ability to perform many tasks quickly and reliably makes it useful for a wide variety of purposes. A lot of important information is therefore stored on computers. Since people and organizations rely on computers every day for various important tasks, it is imperative that the systems used are protected against loss, damage and misuse. This essay identifies some potential risks to computer systems and software and protective measures that can be taken to minimize these risks. An IT security risk is defined as any event or action that could result in loss or damage to IT equipment, software, data and information, or processing capacity. Some of these risks, such as viruses, unauthorized access and use, and theft of information, involve deliberate acts contrary to the law. Any illegal act involving a computer is generally called a computer crime. With the advent of the modern digital computer, a new methodology of crime has been created. Electronic crime is partly responsible for the havoc wreaked in the financial world. Computer systems today are attacked by a multitude of sources. These range from human threats such as hackers to malicious code such as viruses and worms. The term hacker, although initially positive, has come to be associated with people who attempt to break into computer systems. Hackers typically break into systems by connecting to them via modems and logging in as a user. Some do not cause any damage, but simply browse the system before logging out, while others leave traces of their presence by leaving a message or modifying data. Unauthorized use is the use of a computer system or computer data for unapproved or possibly illegal purposes. . This could range from an employee using the database for personal purposes to accessing a banking system and making an unauthorized transfer. Human threats are perpetrated by an individual or groups of individuals who attempt to penetrate computer systems through computer networks, public switched telephone networks, or other means. sources. These attacks typically attack known security vulnerabilities in systems. These vulnerabilities are mainly due to software configuration errors. Methods used by hackers to gain unauthorized access...... middle of paper ......vity. Society is still seeing the early stages of computers, not only in their general growth, but also in their ability to control every facet of our normal lives. If we do not try to expand our knowledge of computers, we will continue to be victims of electronic attacks. The virus problem is getting worse. Increasing pressures to connect to the outside world, exchange information, and do everything quickly, decrease control over what is exchanged and increase the potential for malicious code to penetrate even the most well-protected environments. The underworld of virus writers is determined to cause as much damage and trouble as possible, using the Internet to its fullest to spread quickly without putting themselves in any danger of being caught. Antivirus companies are finding it increasingly difficult to maintain their research efforts and have recently.