Viruses And Internet Security Essay

2763 words - 11 pages

Viruses and Internet Security

Since the creation and development of the Internet, hackers and intelligent software developers have been able to spread viruses that cause great harm to corporations and households. The Internet has been the gateway for hackers into their journey of obstruction. For example, through the loopholes of Microsoft’s IIS services on its server operating system packages, hackers have been able to open “backdoors” into some of the most complex intranet firewall protected networks of the world. Once the access has been made available, hackers have the opportunity to manipulate data, retrieve confidential data, and destroy systems containing critical data with the help of their developed viruses. The fact of the matter is, hackers and other cyber criminals cause great amounts of financial damage to corporations and other smaller scaled victims. The ethical question to consider when dealing with virus control is: Is it unethical to take extreme measures to avoid hacker attacks, even when we are taking away people’s autonomy and obstructing their privacy?

What is a Computer Virus?

In order to consider the ethical issues involved with Internet security, we need to understand exactly how computer viruses work and how they can affect their victims. A computer virus is a small, yet highly sophisticated, piece of software that attaches itself onto real programs. Once the program is executed, the virus is brought to life in the system. Computer viruses are called viruses because they share some of the traits as biological viruses. Biological viruses use humans as their mode of transportation and infection, while computer viruses use home computers, servers, and handheld devices.

At a microscopic level, there are quite a few similarities that make a “virus” such a perfect name for the technological nuisances. A biological virus is not a living organism. It is a fragment of DNA that uses a cell to cause its damage. Once inserted into a human cell, the DNA virus uses the powers of the cell to reproduce itself and spread within the body. A computer virus has to “piggyback” onto an existing program to use the execution of the program as a transport mechanism to spread within the machine it is infecting.

Computer viruses were first introduced into the cyber-world during the late 80’s. The spread of personal computers, the popular usage of “bulletin boards”, and the creation of the floppy disk are historically the primary reasons for the spread of computer viruses. Now that our computer systems, processor speeds, RAM, compilers, software languages, and bandwidth technologies have improved, computer virus developers have found faster and more sophisticated mechanisms to use for destruction. So why do people take the time to create these nasty cyber infections?

Why Are Viruses Created?

Ask a graffiti artist why they spray paint walls! Their primary response will most likely be, “we want to...

Find Another Essay On Viruses and Internet Security

Cryptography and the Issue of Internet Security

937 words - 4 pages questioning the fact that both the growth of the Internet and the number of sensitive transactions which occur on it are exponential. In order to ensure the safety of Internet transactions, whether public or private, methodologies must be identified to safely and effectively encrypt information. Two methodologies are particularly associated with the issue of Internet security and deserve both an explanation and a contrast. These two methods are TCP/IP

Influence and affect the Internet places on IT Security

784 words - 3 pages Influence and affect the Internet places on IT Security Organizations in today's high technological atmospheres, are becoming ever more reliant on their information systems. The threats are steadily increasing toward information systems from criminals and terrorists. Information is an area that many organizations will identify in their operation as needing protection as part of their system of internal control.The news is filled with articles

What are the security problems and solutions of the Internet?

1356 words - 5 pages education, publication and article postings allow us learn more than what we get from text book, and a lot more. As Internet plays more important role in our daily life comparing to its initiation, some keen groups are ringing our bell, hackers, and theft of data, crackers. These people are all associated with a term ¡§security¡¨. It is not difficult for general publics to point out two of the security issues, security of online transaction and

The threat of internet security and its effects on electronic commerce

2078 words - 8 pages The threat of Internet security is an issue of growing concern. In the last decade, the number of people using computers on a regular basis has exploded. For quite some time now, computers and the Internet have been a source of entertainment and education, and not until recently have become a means of doing business. At the same time the Internet has also been a fertile ground for fraud. The absence of global regulation, a general lack of


674 words - 3 pages Internet privacyThe concise oxford dictionary defines privacy as being withdrawn from society or public interest. Privacy is the claim of individuals, groups or institutions to determine for themselves when and to what extent information is communicated to others. In the past two years, the world of communications has experienced a revolution as computers across the world have learned to speak with one another.The impact of personal privacy is

Computer Viruses

2313 words - 9 pages the new Internet Worm Protection feature gives added security to those not using a firewall. The only complaint is that it doesn't distinguish between live viruses and those "killed" by a server-side antivirus tool.McAfee Virus Scan 2006Pros:Certified by ICSA, and reports 100 percent detection. Easy scheduling. Blocks unknown e-mail worms. Scans inbound e-mail, outbound e-mail, and IM attachments. Has detailed virus database and

Computer Hackers

1155 words - 5 pages Computer Hackers Hackers are popularly defined as computer experts who spend enormous amounts of time trying to breach the security of networks, web servers and email servers. Usually they use a selection of specialist software to identify any weaknesses, which they are then able to exploit. There are basically two main types of hackers, the first type is mainly consistent of intelligent adolescents who acquire their

Topic: Web Security (Internet Banking)

1054 words - 4 pages In our society today, web security has enhanced rapidly, especially in internet banking. Internet banking is a new method for individuals to view their financial information online. Although this new integrated method is more convenient, it also has risks. In the past, databases for banks were only accessible to employees and threats damaging the databases were rare. However, society has changed since then and technology is continuously

Truth and Lies about the Computer Virus

1139 words - 5 pages fromoutside. As Internet becomes more popular and spreads ever wider,criminals can break into an increasing number of systems easily andwithout a real risk of being caught.'Then the next paragraph stated:'Even at their initial stages, Data Fellows Ltd's F-Secure products meet many of these demands. It is the goal of our continuing product development to eventually address all such information security needs.' In other words nothing is safe unless

Network Security

1735 words - 7 pages therefore can enter your computer or network and then get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk. Sometimes a Trojan horse is disguised as a program that is supposed to find and destroy computer viruses, but instead introduces viruses onto your system (Barrett). With all these different types of threats, many security and defense programs have been developed to help fight these

Computer Viruses

533 words - 2 pages a backup plan and adhere to its guidelines. Check all programs downloaded from the Internet or bulletin boards for viruses. Keep backup copies of files in fireproof safes or vaults or off-site If your system becomes virus infected and you have questions, contact the National Computer Security Association (NCSA) for low-cost assistance (Elmhurst, 6 Nov. 1998).Works Cited Chambers, Anita R., and Zachary W. Peters. "Protecting Against Virus Attacks

Similar Essays

Internet And Internet Security Essay

1127 words - 5 pages about Internet security because over 53% of America's households are now connected to the Internet. America has been altered by the Internet because it opens up new dimensions or communication. It is much faster and much more efficient then going to a library. I selected this event because nobody knows very much about it. People need to be informed!

Internet Privacy And Security Essay

1113 words - 5 pages Technology is great in so many ways. It has provided us with more communication access, access to knowledge at our finger tips, and so much more. Technology has overall made life easier, but maybe too easy, and has made things a lot less private. This results in us having to be extra careful with security on the internet. Internet security is important to protect our privacy, protect us from fraud, and from viruses that could destroy a piece

Internet Security And Confidentiality Essay

2102 words - 8 pages voice recorder or a signature. Anti-virus protection: How can I protect my computer against virus when people is online, make sure don’t click on anything if you don’t know what it about because that might cause a virus. Fortunately, preventing or getting rid of computer viruses is usually quicker than recovering from the chills-and-fever rollercoaster, and can be usually skilful by simply remaining watchful. However, the internet security

Security And Privacy On The Internet

1470 words - 6 pages Many users are subject of Security and Privacy on the Internet issue. The term "information" now is more used when defining a special product or article of trade which could be bought, sold, exchanged, etc. Often the price of information is higher many times than the cost of the very computers and technologies where it is functioning. Naturally it raises the need of protecting information from unauthorized access, theft, destruction, and