.

Sunday, February 17, 2019

Computer Viruses :: essays research papers fc

IntroductionIn the past decade, computer and networking engine room has seen enormous growth. This growth however, has not come without a price. With the advent of the " tuition Highway", as its coined, a new methodology in plague has been created. Electronic crime has been responsible for some of the most financially crushing victimizations in society. In the recent past, society has seen malicious editing of the rightness Department web page (1), unauthorized access into classified government computer files, phone card and credit card fraud, and electronic embezzlement. tout ensemble these crimes ar committed in the name of "free speech." These new embrace of criminals claim that intercommunicateation should not be suppressed or protected and that the crimes they commit are really not crimes at all. What they choose to recall is that the nature of their actions are slowly consuming the fabric of our countrys moral and estimable trust in the information age.Federal law enforcement agencies, as well as commercial computer companies, have been scrambling around in an attempt to " uprise" the public on how to prevent computer crime from happening to them. They inform us whenever there is an attack, provide us with mostly ineffective anti-virus software, and we are left disembodied spiriting isolated and vulnerable. I do not feel that this defensive posture is effective because it is not pro-active. Society is still beingness attacked by highly skilled computer criminals of which we know very small about them, their motives, and their tools of the trade. Therefore, to be effective in defense, we must understand how these attacks form place from a technical stand-point. To some degree, we must learn to perish a computer criminal. Then we will be in a better position to defend against these victimizations that affect us on two the financial and emotional level. In this paper, we will explore these areas of which we know so little, and will also see that computers are really extensions of people. An attack on a computers vulnerabilities are really an attack on peoples vulnerabilities. Today, computer dusts are under attack from a multitude of sources. These range from malicious code, such(prenominal) as viruses and worms, to human threats, such as hackers and phone "phreaks." These attacks target varied characteristics of a system. This leads to the possibility that a particular system is more hypersensitised to certain kinds of attacks. Malicious code, such as viruses and worms, attack a system in one of two ways, either internally or externally.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.