This website uses cookies to ensure you have the best experience. Learn more

Viruses And Internet Security Essay

2763 words - 11 pages

Viruses and Internet Security

Since the creation and development of the Internet, hackers and intelligent software developers have been able to spread viruses that cause great harm to corporations and households. The Internet has been the gateway for hackers into their journey of obstruction. For example, through the loopholes of Microsoft’s IIS services on its server operating system packages, hackers have been able to open “backdoors” into some of the most complex intranet firewall protected networks of the world. Once the access has been made available, hackers have the opportunity to manipulate data, retrieve confidential data, and destroy systems containing critical data with the help of their developed viruses. The fact of the matter is, hackers and other cyber criminals cause great amounts of financial damage to corporations and other smaller scaled victims. The ethical question to consider when dealing with virus control is: Is it unethical to take extreme measures to avoid hacker attacks, even when we are taking away people’s autonomy and obstructing their privacy?

What is a Computer Virus?

In order to consider the ethical issues involved with Internet security, we need to understand exactly how computer viruses work and how they can affect their victims. A computer virus is a small, yet highly sophisticated, piece of software that attaches itself onto real programs. Once the program is executed, the virus is brought to life in the system. Computer viruses are called viruses because they share some of the traits as biological viruses. Biological viruses use humans as their mode of transportation and infection, while computer viruses use home computers, servers, and handheld devices.

At a microscopic level, there are quite a few similarities that make a “virus” such a perfect name for the technological nuisances. A biological virus is not a living organism. It is a fragment of DNA that uses a cell to cause its damage. Once inserted into a human cell, the DNA virus uses the powers of the cell to reproduce itself and spread within the body. A computer virus has to “piggyback” onto an existing program to use the execution of the program as a transport mechanism to spread within the machine it is infecting.

Computer viruses were first introduced into the cyber-world during the late 80’s. The spread of personal computers, the popular usage of “bulletin boards”, and the creation of the floppy disk are historically the primary reasons for the spread of computer viruses. Now that our computer systems, processor speeds, RAM, compilers, software languages, and bandwidth technologies have improved, computer virus developers have found faster and more sophisticated mechanisms to use for destruction. So why do people take the time to create these nasty cyber infections?

Why Are Viruses Created?

Ask a graffiti artist why they spray paint walls! Their primary response will most likely be, “we want to...

Find Another Essay On Viruses and Internet Security

Threats to Internet Privacy and Security

950 words - 4 pages operation system. But Java applets can be used as a covert means for the installation of malware on a computer. Viruses are the most prevalent threat currently on the Internet (Joseph Migga Kizza, 2011p.90). A virus is malicious code that relies on a user action to carry out an unwanted malicious payload. There are also threats that come from trusted sources such as one’s own government. The threats to privacy and security from the US government

Internet and a Business' Information Security

1945 words - 8 pages business. Customers would also be concerned that any of their personal information could be sold to other companies, with whom they have no business relationship whatsoever. As a result, the need for privacy policies has become an integral part of a company’s network security. One of the most common lines of defense that are incorporated in our world today, for both personal and commercial internet connection is firewalls. Firewalls are a type

Cryptography and the Issue of Internet Security

937 words - 4 pages questioning the fact that both the growth of the Internet and the number of sensitive transactions which occur on it are exponential. In order to ensure the safety of Internet transactions, whether public or private, methodologies must be identified to safely and effectively encrypt information. Two methodologies are particularly associated with the issue of Internet security and deserve both an explanation and a contrast. These two methods are TCP/IP

Lack of Internet Security and Privacy

1035 words - 4 pages Internet privacy and security has become the concern of many individuals throughout recent years. There are a very limited amount of laws that have been enacted to combat computer or cyber related crimes. This has become an issue because as the internet grows increasingly popular so does the criminal and immoral behavior that abounds on it. With these crimes gaining in impact, effectiveness, and frequency, there needs to be more repercussions

Influence and affect the Internet places on IT Security

784 words - 3 pages Influence and affect the Internet places on IT Security Organizations in today's high technological atmospheres, are becoming ever more reliant on their information systems. The threats are steadily increasing toward information systems from criminals and terrorists. Information is an area that many organizations will identify in their operation as needing protection as part of their system of internal control.The news is filled with articles

What are the security problems and solutions of the Internet?

1356 words - 5 pages education, publication and article postings allow us learn more than what we get from text book, and a lot more. As Internet plays more important role in our daily life comparing to its initiation, some keen groups are ringing our bell, hackers, and theft of data, crackers. These people are all associated with a term ¡§security¡¨. It is not difficult for general publics to point out two of the security issues, security of online transaction and

The threat of internet security and its effects on electronic commerce

2078 words - 8 pages The threat of Internet security is an issue of growing concern. In the last decade, the number of people using computers on a regular basis has exploded. For quite some time now, computers and the Internet have been a source of entertainment and education, and not until recently have become a means of doing business. At the same time the Internet has also been a fertile ground for fraud. The absence of global regulation, a general lack of

INTERNET PRIVACY A DETAILED RESEARCH PAPER ABOUT INTERNET SECURITY AND ITS LOOP HOLES...A COMPUTER SCEINECE ENGINEERING COURSE ESSAY WITH WORK CITED PAGES

674 words - 3 pages Internet privacyThe concise oxford dictionary defines privacy as being withdrawn from society or public interest. Privacy is the claim of individuals, groups or institutions to determine for themselves when and to what extent information is communicated to others. In the past two years, the world of communications has experienced a revolution as computers across the world have learned to speak with one another.The impact of personal privacy is

My Internet Security Suite Application

673 words - 3 pages There so many malicious software on the internet. It is important to have software that can block and remove this malicious software. The name of the software would be called iSecurity Suite. I would develop a mobile internet security suite application for iPad. I want to protect the iPad against viruses, spyware, and use a firewall to prevent other people from gaining access to your iPad. The first part of the application internet security

The Evolution of the Computer Virus

2030 words - 9 pages viruses for staying up-to date security inaccuracies and for finding vulnerabilities in the antivirus software. This helps them to stay aware and acquainted against the people who write viruses with the main motive of procuring damages.[2] The creation of virus involves not only the coding phase but also a testing phase, in order to check the capability of virus to spread itself. Then the virus attack phase also needs to be developed. ‘Diverse

Computer Viruses

2313 words - 9 pages the new Internet Worm Protection feature gives added security to those not using a firewall. The only complaint is that it doesn't distinguish between live viruses and those "killed" by a server-side antivirus tool.McAfee Virus Scan 2006Pros:Certified by ICSA, and AV-Test.org reports 100 percent detection. Easy scheduling. Blocks unknown e-mail worms. Scans inbound e-mail, outbound e-mail, and IM attachments. Has detailed virus database and

Similar Essays

Internet And Internet Security Essay

1127 words - 5 pages about Internet security because over 53% of America's households are now connected to the Internet. America has been altered by the Internet because it opens up new dimensions or communication. It is much faster and much more efficient then going to a library. I selected this event because nobody knows very much about it. People need to be informed!

Internet Privacy And Security Essay

1113 words - 5 pages Technology is great in so many ways. It has provided us with more communication access, access to knowledge at our finger tips, and so much more. Technology has overall made life easier, but maybe too easy, and has made things a lot less private. This results in us having to be extra careful with security on the internet. Internet security is important to protect our privacy, protect us from fraud, and from viruses that could destroy a piece

Internet Security And Confidentiality Essay

2102 words - 8 pages voice recorder or a signature. Anti-virus protection: How can I protect my computer against virus when people is online, make sure don’t click on anything if you don’t know what it about because that might cause a virus. Fortunately, preventing or getting rid of computer viruses is usually quicker than recovering from the chills-and-fever rollercoaster, and can be usually skilful by simply remaining watchful. However, the internet security

Security And Privacy On The Internet

1470 words - 6 pages Many users are subject of Security and Privacy on the Internet issue. The term "information" now is more used when defining a special product or article of trade which could be bought, sold, exchanged, etc. Often the price of information is higher many times than the cost of the very computers and technologies where it is functioning. Naturally it raises the need of protecting information from unauthorized access, theft, destruction, and