Warning: Use of undefined constant referer - assumed 'referer' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 102

Warning: Use of undefined constant host - assumed 'host' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 105

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 106

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 109
Computer Viruses - School Essays

Computer Viruses


Explain the difference between viruses, worms and Trojan horses in the context of computer and data security. Discuss the measures that need to be taken in order to maintain security.
There is a type of computer program that is designed and written to destroy, alter or damage data stored on computers without your knowledge or permission. These are some of the problems that these programs cause
? Your computer displays annoying messages
? Your computer develops strange visual and sound effects
? Files on your computer mysteriously disappear
? Your computer starts working very slowly
? Your computer reboots unexpectedly

These programs are typically referred to as viruses although ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

other programs (such as your word processing or spreadsheet programs). Then when a file with a virus attached to it is executed the virus will also be executed. Viruses can also attach themselves to system files the computer uses every time it is switched on, these are called boot sector viruses, and can cause persistent and widespread disruption to the computer. Viruses can also infest documents such as those created with a word processor. Infested documents are stored with a list of instructions called a macro, which is essentially a mini program. Then when the document is viewed the macro is activated. These viruses are called macro viruses and actually account for 67.5% of all virus damage.

Worms are very similar to viruses but are technically different in the way that they replicate and spread through the system. The difference is that programs or files don’t need to be run in order to activate the spreading of a worm. Because of this worms can be very dangerous when ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login


CITE THIS PAGE:

Computer Viruses. (2006, May 9). Retrieved December 23, 2024, from http://www.essayworld.com/essays/Computer-Viruses/45648
"Computer Viruses." Essayworld.com. Essayworld.com, 9 May. 2006. Web. 23 Dec. 2024. <http://www.essayworld.com/essays/Computer-Viruses/45648>
"Computer Viruses." Essayworld.com. May 9, 2006. Accessed December 23, 2024. http://www.essayworld.com/essays/Computer-Viruses/45648.
"Computer Viruses." Essayworld.com. May 9, 2006. Accessed December 23, 2024. http://www.essayworld.com/essays/Computer-Viruses/45648.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 5/9/2006 09:04:58 AM
Category: Miscellaneous
Type: Premium Paper
Words: 692
Pages: 3

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
» Computer Viruses: Past, Present...
» Are "Good" Computer Viruses Sti...
» Computer Viruses
» Polymorphic & Cloning Computer ...
» Computer Viruses
» Computer Viruses
» Computer Viruses
» Computer Viruses
» Computer Viruses
» Computer Viruses
Copyright | Cancel | Contact Us

Copyright © 2024 Essayworld. All rights reserved