Copyright © infotec016 . Powered by Blogger.

Wednesday, June 6, 2018

Computer and internet crimes


Why computer incidents are so prevalent

In today's computing environment of increasing complexity, higher user expectations, expanding and changing systems, and changing systems, and growing reliance on software with known vulnerabilities, it is no wonder that the number, variety, and impact of security incidents are increasing dramatically. Computer security incidents occur around the world with personal computer users in developing countries being exposed to the greatest risk of their computers being infected by malware.

  • Increasing complexity increasing vulnerability
  • virtualization
  • higher computer user expectation
  • Expanding and changing systems introducing new risks

Types of Exploits

There are numerous types of attacks, with new varieties being invented all the time.

Viruses

  Computer virus has become an umbrella term for many types of malicious code. Technically, a virus is a piece of programming code, usually disguised as something else, that causes a computer to behave an an unexpected and usually undesirable manner. Often a virus is attached to a file, so that when the infected file is opened, the virus executes.Other viruses sit in a computer's memory and infect files as the computer opens, modifies, or creates them. Most viruses deliver a "play load" or malicious software that causes the computer to perform in an unexpected way.For example, the virus may be programmed to display a certain message on the computer's display screen ,delete, delete or modify a certain document or reformat the hard drive.

A true virus does not spread  itself from computer to computer. A virus is spread to other machines when a computer user opens an infected email attachment, downloads an infected program, or visits infected program, or visits infected web sites.

Macro viruses have become a common and easily created form of virus.Attackers use an application macro language to create programs that infect documents and templates. After an infected document is opened, the virus is executed and infects the user's application templates. Macros can inset unwanted words , numbers, or phrases into document or alter command functions.

Worms

It is a harmful program that resides in the active memory of the computer and duplicates itself. Worms differ from virus in that they can propagate without human intervention, often  sending copies of themselves to other computers by email.
The negative impact of worms

  • Lost data and programs
  • Lost productivity due to workers being unable to use their computers
  • Additional lost productivity as workers attempt to recover  data and programs

0 comments:

Post a Comment