Logo

Essay on Computer Virus

Students are often asked to write an essay on Computer Virus in their schools and colleges. And if you’re also looking for the same, we have created 100-word, 250-word, and 500-word essays on the topic.

Let’s take a look…

100 Words Essay on Computer Virus

What is a computer virus.

A computer virus is a bad program that can copy itself and spread to other computers. It can damage your computer’s normal work, delete files, or steal information. Just like a cold virus makes people sick, a computer virus harms computers.

How Do Viruses Spread?

Viruses spread when you download infected files, click on bad links, or use USB drives with the virus. They can come from the internet or from other computers that already have the virus.

Protecting Your Computer

To keep your computer safe, use antivirus software. It’s like a medicine that finds and removes viruses. Also, don’t click on unknown links or download files from untrusted websites.

250 Words Essay on Computer Virus

A computer virus is a type of bad software. It is like a flu virus for computers. Just as a flu virus can spread from one person to another, a computer virus spreads from one computer to another. It can copy itself and move through networks or via USB drives. When it gets into a computer, it can cause problems, such as deleting files or making the computer run slowly.

How Does a Virus Spread?

Types of viruses.

There are many kinds of computer viruses. Some just show messages, while others can delete all the files on a computer. There are even types that can steal your personal information. It is important to know that not all viruses do the same thing.

To keep your computer safe, you should use antivirus software. This software looks for viruses and stops them. It is also good to update your computer and programs often, as updates fix security problems. Be careful when downloading files or clicking on links, and do not use USB drives that you do not trust.

Remember, being careful and using the right protection can keep your computer healthy, just like washing hands and eating well can keep you from getting the flu.

500 Words Essay on Computer Virus

Imagine you have a cold. You sneeze, and your friend catches it. A computer virus is a bit like that, but for computers. It is a sneaky program that can spread from one computer to another, causing harm. Just like a real virus can make people sick, a computer virus can make a computer act weirdly or even damage it.

Viruses spread in many ways. Sometimes, when you download a game or an app from the internet, a virus might come with it. Other times, it could be hidden in an email. When you open the email or run the program, the virus gets to work. It can copy itself onto your computer or even jump to other computers when you share files.

Types of Computer Viruses

Signs of a virus.

How do you know if your computer has a virus? Some signs include your computer being slower than usual, programs starting on their own, or files disappearing. If your computer starts acting strangely, it might be infected with a virus.

Protecting Against Viruses

To protect your computer from viruses, you should use antivirus software. This is a special program that looks for viruses and gets rid of them. It’s like medicine for your computer. You should also be careful about what you download and open, especially if it’s from someone you don’t know.

What to Do If You Get a Virus

A computer virus can be a big problem, but by being careful and using antivirus software, you can keep your computer healthy. Remember to update your antivirus regularly and be smart about what you click on and download. With these precautions, you can help stop the spread of computer viruses.

That’s it! I hope the essay helped you.

Happy studying!

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Encyclopedia Britannica

  • History & Society
  • Science & Tech
  • Biographies
  • Animals & Nature
  • Geography & Travel
  • Arts & Culture
  • Games & Quizzes
  • On This Day
  • One Good Fact
  • New Articles
  • Lifestyles & Social Issues
  • Philosophy & Religion
  • Politics, Law & Government
  • World History
  • Health & Medicine
  • Browse Biographies
  • Birds, Reptiles & Other Vertebrates
  • Bugs, Mollusks & Other Invertebrates
  • Environment
  • Fossils & Geologic Time
  • Entertainment & Pop Culture
  • Sports & Recreation
  • Visual Arts
  • Demystified
  • Image Galleries
  • Infographics
  • Top Questions
  • Britannica Kids
  • Saving Earth
  • Space Next 50
  • Student Center

computer chip. computer. Hand holding computer chip. Central processing unit (CPU). history and society, science and technology, microchip, microprocessor motherboard computer Circuit Board

  • What is a computer?
  • Who invented the computer?
  • What can computers do?
  • Are computers conscious?
  • What is the impact of computer artificial intelligence (AI) on society?

Internet http://www blue screen. Hompepage blog 2009, history and society, media news television, crowd opinion protest, In the News 2009, breaking news

computer virus

Our editors will review what you’ve submitted and determine whether to revise the article.

  • Khan Academy - Intro to viruses
  • BCcampus Open Publishing - Current and Emerging Computing Technology - Malware and Viruses
  • University of Maryland - Department of Computer Science - A History Of Computer Viruses -The Famous ‘Trio’
  • International Journal of Engineering Research and Technology - Computer Viruses
  • Academia - Computer Viruses
  • Workforce LibreTexts - Computer Viruses
  • University of Wollongon Australia - Computer Viruses: an Introduction
  • computer virus - Student Encyclopedia (Ages 11 and up)

computer virus , a portion of a computer program code that has been designed to furtively copy itself into other such codes or computer files. It is usually created by a prankster or vandal to effect a nonutilitarian result or to destroy data and program code or, in the case of ransomware , to extort payment.

A virus consists of a set of instructions that attaches itself to other computer programs, usually in the computer’s operating system , and becomes part of them. In most cases, the corrupted programs continue to perform their intended functions but surreptitiously execute the virus’s instructions as well. A virus is usually designed to execute when it is loaded into a computer’s memory . Upon execution, the virus instructs its host program to copy the viral code into, or “infect,” any number of other programs and files stored in the computer . The infection can then transfer itself to files and code on other computers through memory-storage devices, computer networks , or online systems. The replicating viruses can multiply until they destroy data or render other program codes meaningless. A virus may simply cause a harmless joke or cryptic message to appear on a computer user’s monitor when the computer is turned on. A more damaging virus can wreak havoc on an extremely large computer system within a matter of minutes or hours, causing it to crash and thereby destroy valuable data, or can disable a computer system until a ransom is paid.

Essay Service Examples Technology Computer

Essay on Computer Viruses and How to Protect Against Them

  • Proper editing and formatting
  • Free revision, title page, and bibliography
  • Flexible prices and money-back guarantee

document

Four Section of Virus

  • Mark : it can provide a defense mechanism against antivirus.
  • Infection : this mechanism helps the virus to spread into many files in the hard drive or floppy disk.
  • Trigger : it is preparing a condition for sending the payload.
  • Payloads : it is conceivable harm to damage the computer.

Type of Viruses

  • Directory virus : directory viruses are infected files or floppy disk by changes their actual location of the path and converted an executable code such as.EXE or.COM file. These directory viruses stay in the floppy or hard drive which are infected to other program or files. It is the memory residence. For example, sometime companion viruses are creating a PNG.COM file and it is run first.
  • Master booted record : it is fundamentally same as with the booted sector virus. Master boot virus infects to the MBR which is master boot record. The main difference between the two viruses is a collation of the viral code. Master boot record specifically saves an authentic copy of MBR from a different location. For example, NBR is the best example of the master boot virus.
  • Boot sector virus : all computes have a boot program and that is run when the computer is starting. Boot sector viruses are infected to boot program on the hard drive, files, pen drive, floppy disk, etc. Boot sector virus is joining with the drive and it is run when computer user trying to start the computer. For example, disk killer, stoned.
  • Worms : it is a malicious program that can expand by self to different PCs by utilizing PC system. Worms often expend an enormous measure of resources by imitating itself and at last the assets are depleted and administrations are denied to the clients. A worm, as a rule, reproduces itself via mailing a duplicate of itself to an enormous number of clients or by utilizing remote login office through which its logon to the remote framework and execute directions to recreate itself.
  • Trojan horse : it is a program that holds unsafe code and direction methods which at the point when executed performs unsafe and undesirable capacities like burglary or loss of information. It is a security rupturing program which follows up on the rule of permitting unapproved programming into the PC framework and permitting other approved clients to run it. A Trojan pony doesn't imitate itself. To spread Trojan pony a client must welcome it onto their PC. To spread these projects, they can be put over the web as a music document, game, motion picture or as an email connection with the goal that the client can undoubtedly download it. It can without much of a stretch harm the security framework by altering, erasing or scrambling records.

Viruses Come From

Virus detection techniques.

  • Signature scanning techniques : this technique is to find out the special significance of the virus in the form of hexadecimal code from the database of signature. So, the database of signature code has been up to date for virus detection from vendor or scanning techniques.
  • Check to sum : a trustworthiness check program with inherent knowledge is the main arrangement that can deal with every one of the dangers to your information just as infections. Honesty checkers additionally give the main dependable approach to find what harm an infection has done. These techniques require programming update at explicit interim.
  • Memory detection techniques : software is mainly depending on the identification of the virus's location and code in the memory and it is generally successful in this technique.
  • Heuristic or rule-based scanning techniques : this technique is behavioral characterizes of viruses. It is used to combine with the previous experiences and find malicious viruses. Heuristic techniques detect many new or unknown viruses within a static file on special command before virus will be activated.
  • Interruption scanning techniques : according to the name, virus interrupt the system when it detects by antivirus software. Then it must be removed from the memory by antivirus software.

The Structure of the Antivirus

How antivirus works, antivirus application or software.

  • Avast antivirus;
  • Avira Antivirus;
  • Kaspersky Antivirus;
  • Microsoft security program;
  • AVG antivirus.
  • B. V. Patil and M. J. Joshi, 'Computer Virus and Methods of Virus Detection Using Performance Parameter', International Journal of Advanced Research in Computer Science, vol. 3, no 1, 2012. Available: https://search.proquest.com/docview/1443715966?accountid=175624.
  • M. Kumar et al, 'Different Security Threats and its Prevention in Computer Network', International Journal of Advanced Research in Computer Science, vol. 7, no 6, 2016. Available: https://search.proquest.com/docview/1912514655?accountid=175624.
  • N. Patnaik, 'The Best Antivirus, Antimalware Solution for Homeowners and Corporates', International Journal of Advanced Research in Computer Science, vol. 6, no 7, 2015. Available: https://search.proquest.com/docview/1751100336?accountid=175624.
  • P. Sounak and B. K. Mishra, 'Selection of Next Generation Anti-Virus against Virus Attacks in Networks Using AHP', International Journal of Computer Network and Information Security, vol. 5, no 2, pp. 29-35, 2013. Available: https://search.proquest.com/docview/1623631594?accountid=175624. DOI: http://dx.doi.org/10.5815/ijcnis.2013.02.04.
  • R. Khan and M. Hasan, 'NETWORK THREATS, ATTACKS AND SECURITY MEASURES: A REVIEW', International Journal of Advanced Research in Computer Science, vol. 8, no 8, 2017. Available: https://search.proquest.com/docview/1953785415?accountid=175624.
  • S. S. Nicula, 'Generating Antivirus Evasive Executables Using Code Mutation', Informatica Economica, vol. 22, no 2, pp. 81-86, 2018. Available: https://search.proquest.com/docview/2067321338?accountid=175624. DOI: http://dx.doi.org/10.12948/issn14531305/22.2.2018.08.

Our writers will provide you with an essay sample written from scratch: any topic, any deadline, any instructions.

reviews

Cite this paper

Related essay topics.

Get your paper done in as fast as 3 hours, 24/7.

Related articles

Essay on Computer Viruses and How to Protect Against Them

Most popular essays

  • Effects of Technology

In nowadays, the technology that has more impact on human beings is the computer. The computer had...

  • Effects of Computers

Nowadays everyone interacts with the computer science. The multiple exposure to technology makes...

The first electro-mechanical programmable computer was made by German Konrad Zuse, during the 30s....

It is impossible to imagine the modern world without computers. Today’s computers help the work...

The computers are increasing day after day, their capabilities and features are developing day...

We all know that computers are a very important part of our modern life, but they do have a...

  • Digital Era

Despite being a relatively new technology the advancement of the computer, which is defined by...

Computers are generally utilized things in numerous fields in our present world as will be later....

The current trend implies that the computers are used nearly everywhere. Firstly, in the...

Join our 150k of happy users

  • Get original paper written according to your instructions
  • Save time for what matters most

Fair Use Policy

EduBirdie considers academic integrity to be the essential part of the learning process and does not support any violation of the academic standards. Should you have any questions regarding our Fair Use Policy or become aware of any violations, please do not hesitate to contact us via [email protected].

We are here 24/7 to write your paper in as fast as 3 hours.

Provide your email, and we'll send you this sample!

By providing your email, you agree to our Terms & Conditions and Privacy Policy .

Say goodbye to copy-pasting!

Get custom-crafted papers for you.

Enter your email, and we'll promptly send you the full essay. No need to copy piece by piece. It's in your inbox!

Essays on Computer Virus

Computer Viruses Essays

Revenge, negativity, and cheap thrills: the three reasons why people create computer viruses, popular essay topics.

  • American Dream
  • Artificial Intelligence
  • Black Lives Matter
  • Bullying Essay
  • Career Goals Essay
  • Causes of the Civil War
  • Child Abusing
  • Civil Rights Movement
  • Community Service
  • Cultural Identity
  • Cyber Bullying
  • Death Penalty
  • Depression Essay
  • Domestic Violence
  • Freedom of Speech
  • Global Warming
  • Gun Control
  • Human Trafficking
  • I Believe Essay
  • Immigration
  • Importance of Education
  • Israel and Palestine Conflict
  • Leadership Essay
  • Legalizing Marijuanas
  • Mental Health
  • National Honor Society
  • Police Brutality
  • Pollution Essay
  • Racism Essay
  • Romeo and Juliet
  • Same Sex Marriages
  • Social Media
  • The Great Gatsby
  • The Yellow Wallpaper
  • Time Management
  • To Kill a Mockingbird
  • Violent Video Games
  • What Makes You Unique
  • Why I Want to Be a Nurse
  • Send us an e-mail

Home — Essay Samples — Information Science and Technology — Computer — Computer Viruses

test_template

Computer Viruses

  • Categories: Computer Viruses

About this sample

close

Words: 1837 |

10 min read

Published: Jan 29, 2019

Words: 1837 | Pages: 4 | 10 min read

Table of contents

The anna kournikova worm, the melissa virus, crypto locker.

Image of Alex Wood

Cite this Essay

Let us write you an essay from scratch

  • 450+ experts on 30 subjects ready to help
  • Custom essay delivered in as few as 3 hours

Get high-quality help

author

Prof. Kifaru

Verified writer

  • Expert in: Information Science and Technology Science

writer

+ 120 experts online

By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy . We’ll occasionally send you promo and account related email

No need to pay just yet!

Related Essays

3 pages / 1161 words

2 pages / 812 words

2 pages / 1077 words

2 pages / 718 words

Remember! This is just a sample.

You can get your custom paper by one of our expert writers.

121 writers online

Still can’t find what you need?

Browse our vast selection of original essay samples, each expertly formatted and styled

Internet of Things (IoT) is a system of integrated technology that authorizes interaction of distinctively connected computing devise which could be rooted with other interfaces like humans or machines, associated via wired and [...]

It was a time when personal computer was a set consisting of monitor and single choice of technology, but it wasn’t good like using only one thing on technology. And after that was a revolutionary change of different computing [...]

The ASUS VivoBook F510UA FHD is a laptop with nice esthetics and a solid feature set, easily rivaling some of its premium competitors. The design and build quality of the laptop are really good. It’s easily one of the best [...]

Though most students use computers for video games and social media, computers also hold a huge role in education in today’s world. Most high schools prepare students for college by having computer labs; where students can gain [...]

The term "virus" has been used as a catchall phrase for many threats. Essentially, a virus is a computer program that, like a medical virus, has the ability to replicate and infect other computers. Viruses are transmitted over [...]

With the advent of computers and Internet technology, the scopes for collecting data and using them for various purposes has exploded. The possibilities are especially alluring when it comes to textual data. Converting the vast [...]

Related Topics

By clicking “Send”, you agree to our Terms of service and Privacy statement . We will occasionally send you account related emails.

Where do you want us to send this sample?

By clicking “Continue”, you agree to our terms of service and privacy policy.

Be careful. This essay is not unique

This essay was donated by a student and is likely to have been used and submitted before

Download this Sample

Free samples may contain mistakes and not unique parts

Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

Please check your inbox.

We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!

Get Your Personalized Essay in 3 Hours or Less!

We use cookies to personalyze your web-site experience. By continuing we’ll assume you board with our cookie policy .

  • Instructions Followed To The Letter
  • Deadlines Met At Every Stage
  • Unique And Plagiarism Free

conclusion computer virus essay

We use cookies to enhance our website for you. Proceed if you agree to this policy or learn more about it.

  • Essay Database >
  • Essay Examples >
  • Essays Topics >
  • Essay on Software

Computer Virus And Its Prevention Essay Examples

Type of paper: Essay

Topic: Software , Technology , Viruses , Internet , Bible , Company , Security , Computers

Words: 2000

Published: 12/08/2019

ORDER PAPER LIKE THIS

Small and large businesses alike are rallying to keep up with the new trends in technology. A business that is up-to-date in the implementation and usage of the various technologies offered to businesses has been a way of measuring the economic position of the company. However, computer viruses are keeping up with the every new technology that arises. This paper provides a discussion of the different functions of a computer virus and the degree of damage these viruses are able to inflict in a company’s computer system. It also looks into some well-known viruses and what damage these were able to do to these organizations. This paper also examines types of computer viruses and its corresponding behavior, the types of files they usually infect and how they propagate. The relatively short life-cycle of a computer virus is also presented. Likewise, it also tries to study the different preventive mechanisms available in combating computer viruses in a company. To help a company determine the type of security they need, suggestions on what to consider are offered based on a study made by Jacobson. A system wide virus defense mechanism is suggested to be implemented in companies especially companies that have data networks and companies that relies on computers for their daily operations. Benefits of implementing such system wide defense mechanisms through a an anti-virus software company compared to hiring specialized people by the company to attend to these matters are also examined. Financial benefits and overall benefits of implementing such system are also presented.

Computer Virus and Its Prevention

Introduction Businesses are rallying to stay at par with the new trends in technology. Almost every second, a new technology is introduced claiming to help businesses either in their daily operations or in specialized fields. However, even with these updates, software that is meant to harm the implementation of these new technologies cannot be helped. Computer viruses almost coexist with each new software addition intended to make the lives of the costumers easier. Fred Cohen first used the term computer virus in 1964 (Bocij, 2006). It is a small software program that has the capability to multiply from one computer to another interfering with the computers normal operations. It behaves like a biological virus. The functions of a computer virus can either be self – replication, latency of destruction. A self-replicating is a behavior of a virus where it produces copies of itself into other programs. Latency of the other hand is when the virus infection is delayed due to some programmed constraints like the virus shall take effect within a time frame or only for a specific number of executions. Destruction is when the virus destroys data or systems to function differently from what it is intended to do. Most computer viruses are made only for the purpose of exasperating users and non-threatening but other viruses which are destructive which could leave your computer inoperable also exists. It could destroy, delete or corrupt your data and files in your hard drives (IPA Japan, 2011).

Types of Viruses and their Behavior

The yearly new inventions by technology developers surprise the world, however, what surprises the world more is the ability of virus writers to come up with new viruses to keep up with these newest technology trends. The following are the most common type of viruses written by virus writers: 1. Boot sector viruses This type of virus works by replacing the boot code of your master boot sector with an infected boot code. It moves the original boot sector information in another disk sector to be marked as a bad sector. It loads itself in boot sector before any execution occurs in your computer, thus making it very hard to detect. McAffee claims that 75% of virus infection are boot sector viruses (McAffee, 2011).

Boot sector viruses propagate by using external boot disks.

2. File infecting viruses Based from the name of this type of virus, it infects files. The most common type of files infected by this type of virus are executable and operating system files. This type of virus operates by replacing program instruction with its own instruction moving the original program instructions to other parts of the file. Effect of this virus usually increases file size making detection a bit easier ( McAffee, 2011 ). 3. Polymorphic viruses This type of virus is very hard to detect since its behavior includes changing its appearance each time a new infection is produced. Anti-virus software finds it difficult for this type of virus due to the encryption they used. This takes anti-virus producer s to a new level of computer virus detection ( McAffee, 2011 ). 4. Stealth viruses Stealth viruses are memory resident type of virus. It uses several ways to avoid detection by antivirus software. This virus is good at hiding from detection as it also hides the changes it has made. When accessing an infected file, it redirects you to the original, transferred file( McAffee, 2011 ). 5. Multi-partite viruses The most destructive virus is the multi-partite type of virus because of its ability to infect both executable and boot sectors. It is also the hardest to detect because of its ability to combine with other types of viruses ( McAffee, 2011 ).

Computer Virus Life-Cycle

Most computer viruses pop out, do some damage and disappear. The life-cycle of computer viruses is typically short. Listed below is the typical life cycle of a virus (McAfee, 2011). 1. Creation

A virus writer creates a computer virus program.

2. Replication

The virus program transferred from one computer to another.

3. Activation

The virus does the destruction it is intended to do.

4. Discovery

Computer scientists discover the virus and study their behavior.

5. Assimilation

Anti-virus software is updated by anti-virus companies to include the new virus detected.

6. Eradication

Users make use of updated anti-virus software of companies to eradicate the virus.

Virus Prevention Damages to businesses caused by viruses are inevitable when businesses take precautions in protecting their computer systems. The Iloveyou virus, a worm (file-infecting) type of virus the spread in May 2000, has proven to be a destructive type of virus which affected both big and small organizations. Damage done by this specific type of virus includes overwriting image files and damages on local machine. It replicates itself by copying and sending itself to addresses in Windows Address Book which proved to have caused millions of loses in infected companies. In October 10, 2011, Cable News Network (CNN) reported that US Military drones are infected with a certain type of virus, which can affect the security of the country and its operations. It also reported that cyber thieves were also able to get specification of some parts of US Military submarines and tanks (Cable News Network, 2011). During this time, when almost everything important to world like security of people relies on the computer technology, it is a must that utmost computer virus prevention should be made. As they say, prevention is better than cure. Viruses can infect your computers in several ways. The most common of which is through file sharing and through the internet. There are several ways of preventing computer viruses to infect your computers system. Traditional ways of preventing your computers from getting infected by viruses is to provide rules on the use of computers especially when you are connected to the internet. Such rules could include examining filed before opening them, anti-virus software installations, keeping programs up-to-date and scheduling weekly scans (Jin, 2012). In order to minimize computer virus infections in your workplace, Jacobson suggests the following to considerations on what type of security fits your company: 1) if the most of your employees works with computers, then one should set an extensive security, 2) if there is constant data sharing (either manually or through a network), then extensive security of data is a must, 3) what is the physical distance of your computers with one another? 4) Is your operation fast paced? This can affect the way the computer network a company is set-up (Jacobson, 1992). An excellent virus defense system must be present in companies especially those companies heavily relying on computer systems for their daily operations. Computer users must be kept up-to-date and educated of the ways the system can be protected from being attacked by viruses. The most susceptible part of a company’s security efforts are its human factor .They must be well educated with the policies and company guidelines and end-user must knows. If the company is not capable of conducting the continuous updating of its human resources, they can partner with different organizations that specialize in this field. Aside from placing virus defenses in the server and network, each individual computer must also be installed with anti-virus software that is regularly updated. Likewise, a centrally manage virus-defense system must also be implemented.

While implementing this security system, identified weak points must be well documented to be able to address these properly.

Computer virus companies specializing in computer security can do all the planning and installation of the needed equipment to provide these security measures. These companies also provide the necessary trainings needed by the users. Tapping these companies cost less than having the company hire skilled workers to do this. Aside from this, the anti-virus company would be responsible in updating the antivirus software installed and keeping the users updated. In this way, the burden of constantly updating both the software and users will be removed from the company. These companies would also be responsible in creating and maintaining a virus control policy and procedures manual of the company. Due to the importance of a company security system, a company must implement one immediately, before it will be attacked by viruses.

Financial Cost

Companies tapping anti-virus software company specialist will realize lesser financial cost compared to hiring their own anti-virus technicians. These anti-virus companies give the whole package including trainings/ staff development needed for the company’s employees. With this cost for trainings and virus updates will be eliminated.

Benefits of a Virus-Defense System

Using the virus-defense system provided by a specialized anti-virus company will not only give you less burden with regards to its maintenance but will also provide the computer security that your company needs. It will ensure that the company data is protected, secrets of the company are secured and you network is protected from intrusions. This will also prevent the installation of programs that are not authorized by the company.

Ahmad, W. (2008). Computer Viruses as a Threat to Home Users. International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 10 No: 03. Retrieved from http://www.ijens.org/100403-5959%20IJECS-IJENS.pdf Cable News Network. (October 10, 2011). Virus Infects US Military Drones. CNN International. Retrieved from http://edition.cnn.com/video/#/video/bestoftv/2011/10/10/lawrence-drone-virus.cnn?iref=allsearch IPA Japan. (2011). Computer Virus Prevention Guidelines. Information-Technology Promotion Agency Japan. Retrieved 9 January 2012 from http://www.ipa.go.jp/security/english/virus/virus-guidelin-e.html Jacobson, Robert. (1992). Using McAfee Associates Software for Safe Computing, ISBN 0-9627374-1-0. New York: International Security Technology, Inc. Jin, Weiguio. Applying Epidemiology in Computer Virus Prevention: Prospects and Limitations. The University of Auckland Website. Retrieved from http://www.cs.auckland.ac.nz/courses/compsci725s2c/archive/termpapers/wjin.pdf McAffee. (2011). Introduction to Computer Viruses (and Other Destructive Programs). HackerzVoice. Retrieved from http://www.thehackademy.net/madchat/vxdevl/library/An%20Introduction%20to%20Computer%20Viruses%20(and%20other%20Destructive%20Programs).pdf Microsoft. (2012). What is a Computer Virus? Microsoft Support. Retrieved from http://support.microsoft.com/kb/129972 Miller, Michael. (2002). Understanding Computer Viruses. In Absolute Computer Security and Privacy (Chapter 1). Retrieved from http://media.wiley.com/product_data/excerpt/77/07821412/0782141277-2.pdf

double-banner

Cite this page

Share with friends using:

Removal Request

Removal Request

Finished papers: 2049

This paper is created by writer with

ID 287174183

If you want your paper to be:

Well-researched, fact-checked, and accurate

Original, fresh, based on current data

Eloquently written and immaculately formatted

275 words = 1 page double-spaced

submit your paper

Get your papers done by pros!

Other Pages

Manifestation theses, cap business plans, example of hong kong film study essay, education and political participation research paper, essay on twiggy in 1960s the supermodel influence, human resource management business plan example, paper review of articles article review, free article review about partnership strategy, free essay about campbell, the affordable care act course works examples, hr managers power case study sample, photographs article review example, good sap talk at uhd by jeff word essay example, free essay on dove campaign for real beauty, good essay about how memory and representation work together, good essay about the three branches of the criminal justice system, good term paper on property rights, essay on thoughtful questions, the gilded age and the economic integration of the american west essay examples, free essay about young women in juvenile justice, example of essay on ethical dilemmas in auditing process unintentional bias or dishonesty, boundary permeability essay sample, patellofemoral essays, tsutsugamushi essays, phen essays, poverty in canada essays, cursus essays, topaz essays, medical research essays, female characters essays, harpo essays, mammy essays, all talk essays, fiore essays, service industry essays, bent essays, dimples essays, chuckle essays, lyricism essays, naughton essays, physical characteristics essays, indole essays, catalase essays.

Password recovery email has been sent to [email protected]

Use your new password to log in

You are not register!

By clicking Register, you agree to our Terms of Service and that you have read our Privacy Policy .

Now you can download documents directly to your device!

Check your email! An email with your password has already been sent to you! Now you can download documents directly to your device.

or Use the QR code to Save this Paper to Your Phone

The sample is NOT original!

Short on a deadline?

Don't waste time. Get help with 11% off using code - GETWOWED

No, thanks! I'm fine with missing my deadline

Solutions to Computer Viruses Analytical Essay

  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

Introduction

Solutions to computer viruses, works cited.

As much as technology is useful to human beings, it comes with its challenges. One of such challenge that has troubled technology users for a long period of time is computer viruses. They refer to computer programs that are created by malicious software developers or computer programmers to harm other people’s computers.

Computer viruses are a great problem as they cause damage to data and they can potentially lead to system malfunction (Brain 1). Other viruses can be used by hackers to get information from other people’s computers without permission.

The best solution for the problem of computer viruses is installation of antivirus software on computer systems. Once antivirus software is installed in a computer system, it protects the computer system from such malicious software and ensures that any program that runs in the computer system is authorized.

Examples of antivirus software include Kaspersky, McAfee, Norton, Avast etcetera. The only down side of antivirus software is that they are also programs and thus they are not intrinsically perfect.

The antivirus software is thus frequently updated in order for it to efficiently protect a computer system (Brain 1). This may prove to be expensive to the user although the cost of updating antivirus software is not as high as the initial cost of acquiring the antivirus software.

The computer system user should also be extra careful while using his/her computer. This is especially crucial when the user is working with online application since the World Wide Web has many viruses. Sometimes hackers and virus developers may even develop an application that will ask the user to click on a window to see what it contains.

On clicking the window, the virus is permitted to run in the users computer systems and, this way, it may lead to performance bottlenecks or cause serious loss of data. It is thus of essence for users to ensure that they do not run applications that they are not sure about.

Users should also avoid being gullible while viewing high risk sites like entertainment sites in which such applications are found. Other links and images that may be sent as spam messages by hackers and virus developers should also be avoided. This is because most computers get infected with viruses though the use of the internet.

With the continued use of, and advancement in, technology, a lot of technology-related problems have arisen. Viruses are more destructive than ever. Organizations are continually losing important and costly information.

This calls for keener and greater care of our computer systems against the effects of viruses. Other measures that people can take to mitigate the effects of viruses are ensuring that files are properly backed-up so that once information is lost the organization does not go back to the drawing board.

Efforts should also be made to ensure that once a computer system is infected with viruses, the information saved in it is salvaged.

For instance, files and information in a computer system operating a Windows Operating System can be salvaged by running a live CD of the Linux OS.

This is done by booting the computer system from the Linux OS CD and finding the files that are not part of the Windows System files, and are not created by the user. The only disadvantage of this kind of operation is that it requires a highly intelligent IT (Information Technology) professional.

Brain, Marshall. “ How Computer Viruses Work ”. 2010. Web.

  • Case Project Information Security
  • Computer Viruses: Spreading, Multiplying and Damaging
  • Much Lighter: Talking to Andrew McAfee
  • McAfee Labs Threats Report: August 2015
  • Linux, the Operating System of Choice
  • Security Threats in Social Sites
  • Reasons why developing software for wireless devices is challenging
  • Moral and Ethical Issues in Science and Technology
  • Database Application at Amazon
  • Club IT's Data Management
  • Chicago (A-D)
  • Chicago (N-B)

IvyPanda. (2018, May 22). Solutions to Computer Viruses. https://ivypanda.com/essays/technology-issue/

"Solutions to Computer Viruses." IvyPanda , 22 May 2018, ivypanda.com/essays/technology-issue/.

IvyPanda . (2018) 'Solutions to Computer Viruses'. 22 May.

IvyPanda . 2018. "Solutions to Computer Viruses." May 22, 2018. https://ivypanda.com/essays/technology-issue/.

1. IvyPanda . "Solutions to Computer Viruses." May 22, 2018. https://ivypanda.com/essays/technology-issue/.

Bibliography

IvyPanda . "Solutions to Computer Viruses." May 22, 2018. https://ivypanda.com/essays/technology-issue/.

  • Search Menu

Sign in through your institution

  • Browse content in Arts and Humanities
  • Browse content in Archaeology
  • Anglo-Saxon and Medieval Archaeology
  • Archaeological Methodology and Techniques
  • Archaeology by Region
  • Archaeology of Religion
  • Archaeology of Trade and Exchange
  • Biblical Archaeology
  • Contemporary and Public Archaeology
  • Environmental Archaeology
  • Historical Archaeology
  • History and Theory of Archaeology
  • Industrial Archaeology
  • Landscape Archaeology
  • Mortuary Archaeology
  • Prehistoric Archaeology
  • Underwater Archaeology
  • Zooarchaeology
  • Browse content in Architecture
  • Architectural Structure and Design
  • History of Architecture
  • Residential and Domestic Buildings
  • Theory of Architecture
  • Browse content in Art
  • Art Subjects and Themes
  • History of Art
  • Industrial and Commercial Art
  • Theory of Art
  • Biographical Studies
  • Byzantine Studies
  • Browse content in Classical Studies
  • Classical Numismatics
  • Classical Literature
  • Classical Reception
  • Classical History
  • Classical Philosophy
  • Classical Mythology
  • Classical Art and Architecture
  • Classical Oratory and Rhetoric
  • Greek and Roman Papyrology
  • Greek and Roman Archaeology
  • Greek and Roman Epigraphy
  • Greek and Roman Law
  • Late Antiquity
  • Religion in the Ancient World
  • Social History
  • Digital Humanities
  • Browse content in History
  • Colonialism and Imperialism
  • Diplomatic History
  • Environmental History
  • Genealogy, Heraldry, Names, and Honours
  • Genocide and Ethnic Cleansing
  • Historical Geography
  • History by Period
  • History of Emotions
  • History of Agriculture
  • History of Education
  • History of Gender and Sexuality
  • Industrial History
  • Intellectual History
  • International History
  • Labour History
  • Legal and Constitutional History
  • Local and Family History
  • Maritime History
  • Military History
  • National Liberation and Post-Colonialism
  • Oral History
  • Political History
  • Public History
  • Regional and National History
  • Revolutions and Rebellions
  • Slavery and Abolition of Slavery
  • Social and Cultural History
  • Theory, Methods, and Historiography
  • Urban History
  • World History
  • Browse content in Language Teaching and Learning
  • Language Learning (Specific Skills)
  • Language Teaching Theory and Methods
  • Browse content in Linguistics
  • Applied Linguistics
  • Cognitive Linguistics
  • Computational Linguistics
  • Forensic Linguistics
  • Grammar, Syntax and Morphology
  • Historical and Diachronic Linguistics
  • History of English
  • Language Evolution
  • Language Reference
  • Language Variation
  • Language Families
  • Language Acquisition
  • Lexicography
  • Linguistic Anthropology
  • Linguistic Theories
  • Linguistic Typology
  • Phonetics and Phonology
  • Psycholinguistics
  • Sociolinguistics
  • Translation and Interpretation
  • Writing Systems
  • Browse content in Literature
  • Bibliography
  • Children's Literature Studies
  • Literary Studies (Romanticism)
  • Literary Studies (American)
  • Literary Studies (Modernism)
  • Literary Studies (Asian)
  • Literary Studies (European)
  • Literary Studies (Eco-criticism)
  • Literary Studies - World
  • Literary Studies (1500 to 1800)
  • Literary Studies (19th Century)
  • Literary Studies (20th Century onwards)
  • Literary Studies (African American Literature)
  • Literary Studies (British and Irish)
  • Literary Studies (Early and Medieval)
  • Literary Studies (Fiction, Novelists, and Prose Writers)
  • Literary Studies (Gender Studies)
  • Literary Studies (Graphic Novels)
  • Literary Studies (History of the Book)
  • Literary Studies (Plays and Playwrights)
  • Literary Studies (Poetry and Poets)
  • Literary Studies (Postcolonial Literature)
  • Literary Studies (Queer Studies)
  • Literary Studies (Science Fiction)
  • Literary Studies (Travel Literature)
  • Literary Studies (War Literature)
  • Literary Studies (Women's Writing)
  • Literary Theory and Cultural Studies
  • Mythology and Folklore
  • Shakespeare Studies and Criticism
  • Browse content in Media Studies
  • Browse content in Music
  • Applied Music
  • Dance and Music
  • Ethics in Music
  • Ethnomusicology
  • Gender and Sexuality in Music
  • Medicine and Music
  • Music Cultures
  • Music and Media
  • Music and Culture
  • Music and Religion
  • Music Education and Pedagogy
  • Music Theory and Analysis
  • Musical Scores, Lyrics, and Libretti
  • Musical Structures, Styles, and Techniques
  • Musicology and Music History
  • Performance Practice and Studies
  • Race and Ethnicity in Music
  • Sound Studies
  • Browse content in Performing Arts
  • Browse content in Philosophy
  • Aesthetics and Philosophy of Art
  • Epistemology
  • Feminist Philosophy
  • History of Western Philosophy
  • Metaphysics
  • Moral Philosophy
  • Non-Western Philosophy
  • Philosophy of Language
  • Philosophy of Mind
  • Philosophy of Perception
  • Philosophy of Action
  • Philosophy of Law
  • Philosophy of Religion
  • Philosophy of Science
  • Philosophy of Mathematics and Logic
  • Practical Ethics
  • Social and Political Philosophy
  • Browse content in Religion
  • Biblical Studies
  • Christianity
  • East Asian Religions
  • History of Religion
  • Judaism and Jewish Studies
  • Qumran Studies
  • Religion and Education
  • Religion and Health
  • Religion and Politics
  • Religion and Science
  • Religion and Law
  • Religion and Art, Literature, and Music
  • Religious Studies
  • Browse content in Society and Culture
  • Cookery, Food, and Drink
  • Cultural Studies
  • Customs and Traditions
  • Ethical Issues and Debates
  • Hobbies, Games, Arts and Crafts
  • Natural world, Country Life, and Pets
  • Popular Beliefs and Controversial Knowledge
  • Sports and Outdoor Recreation
  • Technology and Society
  • Travel and Holiday
  • Visual Culture
  • Browse content in Law
  • Arbitration
  • Browse content in Company and Commercial Law
  • Commercial Law
  • Company Law
  • Browse content in Comparative Law
  • Systems of Law
  • Competition Law
  • Browse content in Constitutional and Administrative Law
  • Government Powers
  • Judicial Review
  • Local Government Law
  • Military and Defence Law
  • Parliamentary and Legislative Practice
  • Construction Law
  • Contract Law
  • Browse content in Criminal Law
  • Criminal Procedure
  • Criminal Evidence Law
  • Sentencing and Punishment
  • Employment and Labour Law
  • Environment and Energy Law
  • Browse content in Financial Law
  • Banking Law
  • Insolvency Law
  • History of Law
  • Human Rights and Immigration
  • Intellectual Property Law
  • Browse content in International Law
  • Private International Law and Conflict of Laws
  • Public International Law
  • IT and Communications Law
  • Jurisprudence and Philosophy of Law
  • Law and Society
  • Law and Politics
  • Browse content in Legal System and Practice
  • Courts and Procedure
  • Legal Skills and Practice
  • Legal System - Costs and Funding
  • Primary Sources of Law
  • Regulation of Legal Profession
  • Medical and Healthcare Law
  • Browse content in Policing
  • Criminal Investigation and Detection
  • Police and Security Services
  • Police Procedure and Law
  • Police Regional Planning
  • Browse content in Property Law
  • Personal Property Law
  • Restitution
  • Study and Revision
  • Terrorism and National Security Law
  • Browse content in Trusts Law
  • Wills and Probate or Succession
  • Browse content in Medicine and Health
  • Browse content in Allied Health Professions
  • Arts Therapies
  • Clinical Science
  • Dietetics and Nutrition
  • Occupational Therapy
  • Operating Department Practice
  • Physiotherapy
  • Radiography
  • Speech and Language Therapy
  • Browse content in Anaesthetics
  • General Anaesthesia
  • Clinical Neuroscience
  • Browse content in Clinical Medicine
  • Acute Medicine
  • Cardiovascular Medicine
  • Clinical Genetics
  • Clinical Pharmacology and Therapeutics
  • Dermatology
  • Endocrinology and Diabetes
  • Gastroenterology
  • Genito-urinary Medicine
  • Geriatric Medicine
  • Infectious Diseases
  • Medical Toxicology
  • Medical Oncology
  • Pain Medicine
  • Palliative Medicine
  • Rehabilitation Medicine
  • Respiratory Medicine and Pulmonology
  • Rheumatology
  • Sleep Medicine
  • Sports and Exercise Medicine
  • Community Medical Services
  • Critical Care
  • Emergency Medicine
  • Forensic Medicine
  • Haematology
  • History of Medicine
  • Browse content in Medical Skills
  • Clinical Skills
  • Communication Skills
  • Nursing Skills
  • Surgical Skills
  • Medical Ethics
  • Browse content in Medical Dentistry
  • Oral and Maxillofacial Surgery
  • Paediatric Dentistry
  • Restorative Dentistry and Orthodontics
  • Surgical Dentistry
  • Medical Statistics and Methodology
  • Browse content in Neurology
  • Clinical Neurophysiology
  • Neuropathology
  • Nursing Studies
  • Browse content in Obstetrics and Gynaecology
  • Gynaecology
  • Occupational Medicine
  • Ophthalmology
  • Otolaryngology (ENT)
  • Browse content in Paediatrics
  • Neonatology
  • Browse content in Pathology
  • Chemical Pathology
  • Clinical Cytogenetics and Molecular Genetics
  • Histopathology
  • Medical Microbiology and Virology
  • Patient Education and Information
  • Browse content in Pharmacology
  • Psychopharmacology
  • Browse content in Popular Health
  • Caring for Others
  • Complementary and Alternative Medicine
  • Self-help and Personal Development
  • Browse content in Preclinical Medicine
  • Cell Biology
  • Molecular Biology and Genetics
  • Reproduction, Growth and Development
  • Primary Care
  • Professional Development in Medicine
  • Browse content in Psychiatry
  • Addiction Medicine
  • Child and Adolescent Psychiatry
  • Forensic Psychiatry
  • Learning Disabilities
  • Old Age Psychiatry
  • Psychotherapy
  • Browse content in Public Health and Epidemiology
  • Epidemiology
  • Public Health
  • Browse content in Radiology
  • Clinical Radiology
  • Interventional Radiology
  • Nuclear Medicine
  • Radiation Oncology
  • Reproductive Medicine
  • Browse content in Surgery
  • Cardiothoracic Surgery
  • Gastro-intestinal and Colorectal Surgery
  • General Surgery
  • Neurosurgery
  • Paediatric Surgery
  • Peri-operative Care
  • Plastic and Reconstructive Surgery
  • Surgical Oncology
  • Transplant Surgery
  • Trauma and Orthopaedic Surgery
  • Vascular Surgery
  • Browse content in Science and Mathematics
  • Browse content in Biological Sciences
  • Aquatic Biology
  • Biochemistry
  • Bioinformatics and Computational Biology
  • Developmental Biology
  • Ecology and Conservation
  • Evolutionary Biology
  • Genetics and Genomics
  • Microbiology
  • Molecular and Cell Biology
  • Natural History
  • Plant Sciences and Forestry
  • Research Methods in Life Sciences
  • Structural Biology
  • Systems Biology
  • Zoology and Animal Sciences
  • Browse content in Chemistry
  • Analytical Chemistry
  • Computational Chemistry
  • Crystallography
  • Environmental Chemistry
  • Industrial Chemistry
  • Inorganic Chemistry
  • Materials Chemistry
  • Medicinal Chemistry
  • Mineralogy and Gems
  • Organic Chemistry
  • Physical Chemistry
  • Polymer Chemistry
  • Study and Communication Skills in Chemistry
  • Theoretical Chemistry
  • Browse content in Computer Science
  • Artificial Intelligence
  • Computer Architecture and Logic Design
  • Game Studies
  • Human-Computer Interaction
  • Mathematical Theory of Computation
  • Programming Languages
  • Software Engineering
  • Systems Analysis and Design
  • Virtual Reality
  • Browse content in Computing
  • Business Applications
  • Computer Games
  • Computer Security
  • Computer Networking and Communications
  • Digital Lifestyle
  • Graphical and Digital Media Applications
  • Operating Systems
  • Browse content in Earth Sciences and Geography
  • Atmospheric Sciences
  • Environmental Geography
  • Geology and the Lithosphere
  • Maps and Map-making
  • Meteorology and Climatology
  • Oceanography and Hydrology
  • Palaeontology
  • Physical Geography and Topography
  • Regional Geography
  • Soil Science
  • Urban Geography
  • Browse content in Engineering and Technology
  • Agriculture and Farming
  • Biological Engineering
  • Civil Engineering, Surveying, and Building
  • Electronics and Communications Engineering
  • Energy Technology
  • Engineering (General)
  • Environmental Science, Engineering, and Technology
  • History of Engineering and Technology
  • Mechanical Engineering and Materials
  • Technology of Industrial Chemistry
  • Transport Technology and Trades
  • Browse content in Environmental Science
  • Applied Ecology (Environmental Science)
  • Conservation of the Environment (Environmental Science)
  • Environmental Sustainability
  • Environmentalist Thought and Ideology (Environmental Science)
  • Management of Land and Natural Resources (Environmental Science)
  • Natural Disasters (Environmental Science)
  • Nuclear Issues (Environmental Science)
  • Pollution and Threats to the Environment (Environmental Science)
  • Social Impact of Environmental Issues (Environmental Science)
  • History of Science and Technology
  • Browse content in Materials Science
  • Ceramics and Glasses
  • Composite Materials
  • Metals, Alloying, and Corrosion
  • Nanotechnology
  • Browse content in Mathematics
  • Applied Mathematics
  • Biomathematics and Statistics
  • History of Mathematics
  • Mathematical Education
  • Mathematical Finance
  • Mathematical Analysis
  • Numerical and Computational Mathematics
  • Probability and Statistics
  • Pure Mathematics
  • Browse content in Neuroscience
  • Cognition and Behavioural Neuroscience
  • Development of the Nervous System
  • Disorders of the Nervous System
  • History of Neuroscience
  • Invertebrate Neurobiology
  • Molecular and Cellular Systems
  • Neuroendocrinology and Autonomic Nervous System
  • Neuroscientific Techniques
  • Sensory and Motor Systems
  • Browse content in Physics
  • Astronomy and Astrophysics
  • Atomic, Molecular, and Optical Physics
  • Biological and Medical Physics
  • Classical Mechanics
  • Computational Physics
  • Condensed Matter Physics
  • Electromagnetism, Optics, and Acoustics
  • History of Physics
  • Mathematical and Statistical Physics
  • Measurement Science
  • Nuclear Physics
  • Particles and Fields
  • Plasma Physics
  • Quantum Physics
  • Relativity and Gravitation
  • Semiconductor and Mesoscopic Physics
  • Browse content in Psychology
  • Affective Sciences
  • Clinical Psychology
  • Cognitive Psychology
  • Cognitive Neuroscience
  • Criminal and Forensic Psychology
  • Developmental Psychology
  • Educational Psychology
  • Evolutionary Psychology
  • Health Psychology
  • History and Systems in Psychology
  • Music Psychology
  • Neuropsychology
  • Organizational Psychology
  • Psychological Assessment and Testing
  • Psychology of Human-Technology Interaction
  • Psychology Professional Development and Training
  • Research Methods in Psychology
  • Social Psychology
  • Browse content in Social Sciences
  • Browse content in Anthropology
  • Anthropology of Religion
  • Human Evolution
  • Medical Anthropology
  • Physical Anthropology
  • Regional Anthropology
  • Social and Cultural Anthropology
  • Theory and Practice of Anthropology
  • Browse content in Business and Management
  • Business Ethics
  • Business History
  • Business Strategy
  • Business and Technology
  • Business and Government
  • Business and the Environment
  • Comparative Management
  • Corporate Governance
  • Corporate Social Responsibility
  • Entrepreneurship
  • Health Management
  • Human Resource Management
  • Industrial and Employment Relations
  • Industry Studies
  • Information and Communication Technologies
  • International Business
  • Knowledge Management
  • Management and Management Techniques
  • Operations Management
  • Organizational Theory and Behaviour
  • Pensions and Pension Management
  • Public and Nonprofit Management
  • Social Issues in Business and Management
  • Strategic Management
  • Supply Chain Management
  • Browse content in Criminology and Criminal Justice
  • Criminal Justice
  • Criminology
  • Forms of Crime
  • International and Comparative Criminology
  • Youth Violence and Juvenile Justice
  • Development Studies
  • Browse content in Economics
  • Agricultural, Environmental, and Natural Resource Economics
  • Asian Economics
  • Behavioural Finance
  • Behavioural Economics and Neuroeconomics
  • Econometrics and Mathematical Economics
  • Economic History
  • Economic Methodology
  • Economic Systems
  • Economic Development and Growth
  • Financial Markets
  • Financial Institutions and Services
  • General Economics and Teaching
  • Health, Education, and Welfare
  • History of Economic Thought
  • International Economics
  • Labour and Demographic Economics
  • Law and Economics
  • Macroeconomics and Monetary Economics
  • Microeconomics
  • Public Economics
  • Urban, Rural, and Regional Economics
  • Welfare Economics
  • Browse content in Education
  • Adult Education and Continuous Learning
  • Care and Counselling of Students
  • Early Childhood and Elementary Education
  • Educational Equipment and Technology
  • Educational Strategies and Policy
  • Higher and Further Education
  • Organization and Management of Education
  • Philosophy and Theory of Education
  • Schools Studies
  • Secondary Education
  • Teaching of a Specific Subject
  • Teaching of Specific Groups and Special Educational Needs
  • Teaching Skills and Techniques
  • Browse content in Environment
  • Applied Ecology (Social Science)
  • Climate Change
  • Conservation of the Environment (Social Science)
  • Environmentalist Thought and Ideology (Social Science)
  • Management of Land and Natural Resources (Social Science)
  • Natural Disasters (Environment)
  • Pollution and Threats to the Environment (Social Science)
  • Social Impact of Environmental Issues (Social Science)
  • Sustainability
  • Browse content in Human Geography
  • Cultural Geography
  • Economic Geography
  • Political Geography
  • Browse content in Interdisciplinary Studies
  • Communication Studies
  • Museums, Libraries, and Information Sciences
  • Browse content in Politics
  • African Politics
  • Asian Politics
  • Chinese Politics
  • Comparative Politics
  • Conflict Politics
  • Elections and Electoral Studies
  • Environmental Politics
  • Ethnic Politics
  • European Union
  • Foreign Policy
  • Gender and Politics
  • Human Rights and Politics
  • Indian Politics
  • International Relations
  • International Organization (Politics)
  • Irish Politics
  • Latin American Politics
  • Middle Eastern Politics
  • Political Behaviour
  • Political Economy
  • Political Institutions
  • Political Theory
  • Political Methodology
  • Political Communication
  • Political Philosophy
  • Political Sociology
  • Politics and Law
  • Politics of Development
  • Public Policy
  • Public Administration
  • Qualitative Political Methodology
  • Quantitative Political Methodology
  • Regional Political Studies
  • Russian Politics
  • Security Studies
  • State and Local Government
  • UK Politics
  • US Politics
  • Browse content in Regional and Area Studies
  • African Studies
  • Asian Studies
  • East Asian Studies
  • Japanese Studies
  • Latin American Studies
  • Middle Eastern Studies
  • Native American Studies
  • Scottish Studies
  • Browse content in Research and Information
  • Research Methods
  • Browse content in Social Work
  • Addictions and Substance Misuse
  • Adoption and Fostering
  • Care of the Elderly
  • Child and Adolescent Social Work
  • Couple and Family Social Work
  • Direct Practice and Clinical Social Work
  • Emergency Services
  • Human Behaviour and the Social Environment
  • International and Global Issues in Social Work
  • Mental and Behavioural Health
  • Social Justice and Human Rights
  • Social Policy and Advocacy
  • Social Work and Crime and Justice
  • Social Work Macro Practice
  • Social Work Practice Settings
  • Social Work Research and Evidence-based Practice
  • Welfare and Benefit Systems
  • Browse content in Sociology
  • Childhood Studies
  • Community Development
  • Comparative and Historical Sociology
  • Disability Studies
  • Economic Sociology
  • Gender and Sexuality
  • Gerontology and Ageing
  • Health, Illness, and Medicine
  • Marriage and the Family
  • Migration Studies
  • Occupations, Professions, and Work
  • Organizations
  • Population and Demography
  • Race and Ethnicity
  • Social Theory
  • Social Movements and Social Change
  • Social Research and Statistics
  • Social Stratification, Inequality, and Mobility
  • Sociology of Religion
  • Sociology of Education
  • Sport and Leisure
  • Urban and Rural Studies
  • Browse content in Warfare and Defence
  • Defence Strategy, Planning, and Research
  • Land Forces and Warfare
  • Military Administration
  • Military Life and Institutions
  • Naval Forces and Warfare
  • Other Warfare and Defence Issues
  • Peace Studies and Conflict Resolution
  • Weapons and Equipment

Managing Computer Viruses

  • < Previous chapter

7 Conclusion

  • Published: August 1992
  • Cite Icon Cite
  • Permissions Icon Permissions

In Chapter 1 we set specific objectives for this book. It is appropriate at this stage to consider how these objectives have been met. The overriding purpose was to take a management view of computer viruses, since this does not appear to have been done and the importance of doing so is crucial to any meaningful attempt to counter the virus threat. How well this has been accomplished is best judged by management readers. A review of the other objectives follows. 1. To present a concise but comprehensive account of what is known about computer viruses. This was done mostly in Chapter 2, where the nature of computer viruses was explained and various aspects of the problem were discussed.

Personal account

  • Sign in with email/username & password
  • Get email alerts
  • Save searches
  • Purchase content
  • Activate your purchase/trial code
  • Add your ORCID iD

Institutional access

Sign in with a library card.

  • Sign in with username/password
  • Recommend to your librarian
  • Institutional account management
  • Get help with access

Access to content on Oxford Academic is often provided through institutional subscriptions and purchases. If you are a member of an institution with an active account, you may be able to access content in one of the following ways:

IP based access

Typically, access is provided across an institutional network to a range of IP addresses. This authentication occurs automatically, and it is not possible to sign out of an IP authenticated account.

Choose this option to get remote access when outside your institution. Shibboleth/Open Athens technology is used to provide single sign-on between your institution’s website and Oxford Academic.

  • Click Sign in through your institution.
  • Select your institution from the list provided, which will take you to your institution's website to sign in.
  • When on the institution site, please use the credentials provided by your institution. Do not use an Oxford Academic personal account.
  • Following successful sign in, you will be returned to Oxford Academic.

If your institution is not listed or you cannot sign in to your institution’s website, please contact your librarian or administrator.

Enter your library card number to sign in. If you cannot sign in, please contact your librarian.

Society Members

Society member access to a journal is achieved in one of the following ways:

Sign in through society site

Many societies offer single sign-on between the society website and Oxford Academic. If you see ‘Sign in through society site’ in the sign in pane within a journal:

  • Click Sign in through society site.
  • When on the society site, please use the credentials provided by that society. Do not use an Oxford Academic personal account.

If you do not have a society account or have forgotten your username or password, please contact your society.

Sign in using a personal account

Some societies use Oxford Academic personal accounts to provide access to their members. See below.

A personal account can be used to get email alerts, save searches, purchase content, and activate subscriptions.

Some societies use Oxford Academic personal accounts to provide access to their members.

Viewing your signed in accounts

Click the account icon in the top right to:

  • View your signed in personal account and access account management features.
  • View the institutional accounts that are providing access.

Signed in but can't access content

Oxford Academic is home to a wide variety of products. The institutional subscription may not cover the content that you are trying to access. If you believe you should have access to that content, please contact your librarian.

For librarians and administrators, your personal account also provides access to institutional account management. Here you will find options to view and activate subscriptions, manage institutional settings and access options, access usage statistics, and more.

Our books are available by subscription or purchase to libraries and institutions.

  • About Oxford Academic
  • Publish journals with us
  • University press partners
  • What we publish
  • New features  
  • Open access
  • Rights and permissions
  • Accessibility
  • Advertising
  • Media enquiries
  • Oxford University Press
  • Oxford Languages
  • University of Oxford

Oxford University Press is a department of the University of Oxford. It furthers the University's objective of excellence in research, scholarship, and education by publishing worldwide

  • Copyright © 2024 Oxford University Press
  • Cookie settings
  • Cookie policy
  • Privacy policy
  • Legal notice

This Feature Is Available To Subscribers Only

Sign In or Create an Account

This PDF is available to Subscribers Only

For full access to this pdf, sign in to an existing account, or purchase an annual subscription.

ADVERTISEMENTS:

Essay on Computer Viruses (507 Words)

Here is your essay on Computer Viruses !

The age of information has essentially made communication faster with advent of computer and internet. Human interaction has revolutionized with information including data, pictures, emails, programs etc. being sent within milliseconds from one part of the world to another.

But every technology howsoever secure and protected does have some loopholes. So is the network of computers which can also communicate malicious programs superfluously without the knowledge and intent of the users of the computer system. Such an attack is called as virus attack and is an electronic infection affecting your system and destroying useful information.

A computer virus is basically a software program that transfers from one system to another connected on a common network. Computer operations like use of email system, stored information on the hard disk, accessibility to other resources on the desktop can get difficult or corrupted after a virus attack as the program renders some or the other functionality in your computer useless.

Most often it is email attachments with unusual extensions that are used to spread such viruses. Any funny images, greetings, audio files that come in as attachments from suspicious sources should never be opened as they may be viruses. Not all malware that affect your computer are viruses. Some like adware and spyware cannot reproduce and thus cannot be termed as computer viruses. Active threats affecting your computer are generally trojans or worms and not viruses. A virus is able to damage the information and cause harm to your computer only after it is able to execute the code and write information to the memory. Code injection wherein executable files have some malicious codes written inside is one common way in which virus is sent over to spread on multiple computers over internet. It is the very nature of the virus to multiply by replication.

Even FTP for downloading can lead to a virus attack which can come maliciously along with an otherwise harmless software program. A virus attaches itself to an executable program so that it gets executed without the user even knowing it.

Events that can result from virus attack can range from harmless to extremely destructive.

Irritable messages on the computer screen, pop-up windows that continue to come and not go even when trying to exit, data modified on your computer, corrupted or erased hard disk, damage to files etc. are some symptoms of virus attack.

Since the use of internet cannot be stopped and you can also not determine if the information downloaded contained any viruses, it is advisable to use credible anti-virus software with latest updates. It warns you about any threats that a file or any information downloaded from the internet or a copied over infected file contains.

Removing a virus and undoing the damage it causes to your computer can be more stressful than preventing attack by using strong anti-virus program that can detect malware as well as Trojans, worms and viruses and also eliminate them before replication. Effective anti-viruses are available which help to detect and remove viruses that may attack your computer.

Related Essays:

  • Essay on Pollution
  • Summary of “The Tyger” by William Blake
  • Rising Prices in India – Causes, Consequences and Remedies
  • Short Essay on Nuclear Waste Disposal

Essay on Computer , Essay on Computer Virus

Privacy Overview

CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.

Essays on Computer virus

We found 16 free papers on computer virus, essay examples, advantages and disadvantages of internet.

Computer virus

The telephone was invented to facilitate communication beyond our immediate surroundings. However, technological advancements gave rise to the Internet, which is now extensively utilized. The Internet is a valuable resource enabling swift and effortless communication among individuals. It can be accessed via computers or mobile phones, enabling connection regardless of geographical location. Furthermore, the Internet…

Internet: Our New World

The use of the Internet has sparked controversy, with different opinions on its advantages and disadvantages. This article delves into the origins of the Internet, including its founders and pioneers, as well as its benefits and drawbacks. It also explores suggestions for enhancing Internet protection and functionality. The Internet, commonly known as “the Net,” is…

Fraud on the Internet: Hacking

. Hacking in it self is not a crime. It is otherwise known asunauthorised access. . There are clubs devoted to hacking. In Germany, Holland etc, discusstechniques etc. . Much of hacking is treated as intellectual training. Costs us a lot ofexpenses to protect our computers. Companies spend millions of poundsprotecting themselves. . A lot…

Intro to hate crimes

Think once again about FaceTABLE, Twitter, Papal, Google and many more, these services are like breath to us today and we cannot really survive without them. But it also true that along with these facilities our cyber world have problems, very serious problems, problems with security, problem with privacy and information. I am spending my…

The Best Way to Protect is by Encrypting Information

Information

Policies and training are also necessary because they can be used as evidence when taking administrative action against a user or intruder in the event the system or data information is compromised. Laptops and workstations have their own set of security risks associated with them. They are vulnerable to being compromised by mallard, spare, or…

IT: Access Control Mechanisms

Access control is the ability to allow or deny the usage of a peculiar resource by a peculiar entity. Access control mechanisms can be used in pull offing physical resources, logical resources or digital resources. Access control is the same as controlled entree and limited entree. They assist in internet security and on-line security. User…

Virus Research Paper

General Virus Information A virus is a piece of package designed and written to adversely impact your computing machine by changing the manner it works without your cognition or permission. In more proficient footings, a virus is a section of plan codification that implants itself to one of your feasible files and spreads consistently from…

Computer Viruses, its Classification and Removing Method

A virus is a program that copies itself without the knowledge of the computeruser. Typically, a virus spreads from one computer to another by adding itselfto an existing piece of executable code so that it is executed when its hostcode is run.If a virus if found, you shouldn’t panic or be in a hurry, andyou…

Definition of Computer Security Risks

Computer Security

A computer security risk is really anything on your computer that may damage or steal your data or allow someone else to access your computer, without your knowledge or consent. There are a lot of different things that can create a computer risk, including malware, a general term used to describe many types of bad…

Effect of Computer Virus

Different Types of Computer Viruses Computer virus is a software program written with malicious intentions. There are number of computer viruses that can impede the functioning of your computer system. Let us find out the different types of computer viruses. Did You Know? In 2010, Stuxnet virus targeted Siemens Industrial Software and Equipment. There are…

Frequently Asked Questions about Computer virus

Don't hesitate to contact us. We are ready to help you 24/7

conclusion computer virus essay

Hi, my name is Amy 👋

In case you can't find a relevant example, our professional writers are ready to help you write a unique paper. Just talk to our smart assistant Amy and she'll connect you with the best match.

IMAGES

  1. Intro To Computer Virus Essay

    conclusion computer virus essay

  2. What is a Computer Virus? Free Essay Example

    conclusion computer virus essay

  3. Sources Of Computer Virus Free Essay Example

    conclusion computer virus essay

  4. Computer Software for Virus and Malware Protection Free Essay Example

    conclusion computer virus essay

  5. conclusion to a project on computer virus and its types

    conclusion computer virus essay

  6. Computer Virus And Antivirus Essay In English

    conclusion computer virus essay

VIDEO

  1. Essay on Coronavirus in English

  2. ||Essay on corona virus 🦠 in English||🐼

  3. Virus 😍 Scan Without Antivirus #computer #shortcut #mstricks #education #viralshort #neit

  4. Korona virus essay in urdu

  5. Essay Dengue virus and preventions with quotes|12th ,10th class urdu| 12 pg comprehensive essay|easy

  6. कोरोना वायरस पर निबंध संस्कृत में। Corona virus essay in sanskrit। Essay on covid 19 in sanskrit

COMMENTS

  1. Computer Viruses

    The hackers who design most common computer viruses usually come up with the names (US-CERT, 2012). Some of these viruses include Melissa, the Anna Kournikova, MyDoom, Sasser & Netsky, the ILOVEYOU virus, The Klez Virus, Code Red and Code Red II, Nimda virus, SQL Slammer/Sapphire virus, Leap-A/Oompa-A virus, and Storm Worm (US-CERT, 2012).

  2. Essay on Computer Virus

    Students are often asked to write an essay on Computer Virus in their schools and colleges. And if you're also looking for the same, we have created 100-word, 250-word, and 500-word essays on the topic. ... Conclusion. A computer virus can be a big problem, but by being careful and using antivirus software, you can keep your computer healthy. ...

  3. (PDF) The Impact of Computer Virus

    Conclusions and Recommendations ... This document focuses on papers that give information about techniques and systems detecting malicious code. ... A computer virus is a program that can infect ...

  4. Computer Viruses, Their Types and Prevention Research Paper

    A worm is a self-replicating virus that focuses on creating adverse effects on your computer. This can consist of deleting critical system files, overwriting program protocols, and taking up valuable CPU processing space. Worm infections are identifiable based on process errors happening all of a sudden as well as a noticeable decline in the ...

  5. Computer virus

    computer virus, a portion of a computer program code that has been designed to furtively copy itself into other such codes or computer files. It is usually created by a prankster or vandal to effect a nonutilitarian result or to destroy data and program code or, in the case of ransomware, to extort payment. A virus consists of a set of ...

  6. Introduction of Computer Virus

    Introduction of Computer Virus. Computer Virus is a program that copies itself, Computer virus can infect your computer and slowing down your computer. And virus also can spreads computer to computer. The person who sends out the computer virus may use networking of the internet. The computer virus also can be spread by via disk, CD, thauDVD or ...

  7. Essay on Computer Viruses and How to Protect Against Them

    Boot sector virus: all computes have a boot program and that is run when the computer is starting. Boot sector viruses are infected to boot program on the hard drive, files, pen drive, floppy disk, etc. Boot sector virus is joining with the drive and it is run when computer user trying to start the computer. For example, disk killer, stoned.

  8. Computer Viruses Essays: Examples, Topics, & Outlines

    This essay will compare three different computer models for the organization to meet its needs. It is assumed that the computer chosen will have a high need for portability and performance, so the focus is going to be on three high-end lightweight laptops. They are the MacBook Air, the Toshiba Portege R830 and the Samsung Series 9.

  9. Essays About Computer Virus ️ Free Examples & Essay Topic Ideas

    Essays on Computer Virus. Free essays on computer virus provide detailed information on the different types of computer viruses, their characteristics, and how they can harm computers. These essays explain the ways in which computer viruses spread, the symptoms of a virus infection, and measures that can be taken to prevent and eliminate viruses.

  10. Computer Viruses Essay Examples

    Computer Viruses Essays Revenge, Negativity, and Cheap Thrills: The Three Reasons Why People Create Computer Viruses In 2002, the Caric-A Worm virus spread all across computers in the United States of America, but the file itself was really funny for the damage it was trying to do (Help Net Security, 2002).

  11. Computer Viruses: [Essay Example], 1837 words GradesFixer

    Chernobyl. CIH, also known as Chernobyl or Space filler, is a Microsoft Windows 9x computer virus which first emerged in 1998. Its payload is highly destructive to vulnerable systems, overwriting critical information on infected system drives, and in some cases destroying the system BIOS. The virus was created by Chen Ing-hau, pinyin: Chén ...

  12. Viruses And Antivirus Computer Science Essay

    5- To keep multiple backup copies of all your files before installing any new programs. 6- Processing computer with an anti-virus and always updated to ensure that detect new viruses. 7- Always updated operating system and support it by the windows defender .

  13. computer viruses essay

    Computer Viruses And Its Effects On A Computer System. A computer virus is a malware program that, when executed copies itself into other data files, computer programs, or the boot sector of the hard drive with 95% of viruses doing no more than that. (1) (2). A virus might attach itself to a program such as a word document program.

  14. Conclusion

    Conclusion. In document Computer Viruses From Theory to Applications pdf (Page 97-103) The formalization of viruses and of the viral detection problem allows us to get a relatively clear view of what computer infection programs (or malware) really are. The reader is able now to seize all the implications from a prac- tical point of view, and ...

  15. Computer Virus And Its Prevention Essay Examples

    Computer Virus and Its Prevention. Introduction. Businesses are rallying to stay at par with the new trends in technology. Almost every second, a new technology is introduced claiming to help businesses either in their daily operations or in specialized fields. However, even with these updates, software that is meant to harm the implementation ...

  16. Solutions to Computer Viruses

    Examples of antivirus software include Kaspersky, McAfee, Norton, Avast etcetera. The only down side of antivirus software is that they are also programs and thus they are not intrinsically perfect. The antivirus software is thus frequently updated in order for it to efficiently protect a computer system (Brain 1).

  17. Anti Virus Uses And Benefits Computer Science Essay

    The Antivirus (or anti-virus) software is a program that used to prevent, detect, and remove malware, including computer viruses, worms, and Trojan horses. Such programs may also prevent and remove adware, spyware, and other forms of malware. These software scan throw the PC of the computer looking for viruses to remove it before the virus ...

  18. Conclusion

    A review of the other objectives follows. 1. To present a concise but comprehensive account of what is known about computer viruses. This was done mostly in Chapter 2, where the nature of computer viruses was explained and various aspects of the problem were discussed. Keywords: senior managers, technical managers. Subject.

  19. Essay on Computer Viruses (507 Words)

    Essay on Computer Viruses (507 Words) Here is your essay on Computer Viruses ! The age of information has essentially made communication faster with advent of computer and internet. Human interaction has revolutionized with information including data, pictures, emails, programs etc. being sent within milliseconds from one part of the world to ...

  20. Essays on Computer virus

    What is a computer virus essay? Computer Virus is a program that copies itself, Computer virus can infect your computer and slowing down your computer. And virus also can spreads computer to computer. ... Usually, a virus is written to target a network file system or shared filet in order to spread from computer to computer using network.

  21. A Case Study On Computer Viruses Information Technology Essay

    The computer virus was so named as it has similar properties as a human virus in the way they can pass form computer to computer and in that they need a host to survive. The first viruses were created during the 1980's, although there programs that worked on the same principle created maybe as early as the late 1960's.

  22. Computer Virus Essay Example

    Viruses do not infect computer hardware, such as monitors or computer chips; they only infect software. In addition, Macintosh viruses do not infect DOS / Window computer software and vice versa. For example, the Melissa virus incident of late 1998 and the ILOVEYOU virus of 2000 worked only on Window based machines and could not operate on ...

  23. Conclusion of computer virus Free Essays

    SOURCES OF COMPUTER VIRUS Virus infection in Computers can be contacted through different means. Below are the commonest causes of Computer Virus attack. 1. Through the internet: The easiest and quickest means of spreading Computer Virus is through the internet. Basically through downloaded files and documents.