Computer Viruses


In the past decade, computer and networking technology has seen enormous growth. This growth however, has not come without a price. With the advent of the "Information Highway", as it’s coined, a new methodology in crime has been created. Electronic crime has been responsible for some of the most financially devastating victimizations in society.
In the recent past, society has seen malicious editing of the Justice Department web page (1), unauthorized access into classified government computer files, phone card and credit card fraud, and electronic embezzlement. All these crimes are committed in the name of "free speech." These new breed of criminals claim that information should not be ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

mostly ineffective anti-virus software, and we are left feeling isolated and vulnerable. I do not feel that this defensive posture is effective because it is not pro-active. Society is still being attacked by highly skilled computer criminals of which we know very little about them, their motives, and their tools of the trade. Therefore, to be effective in defense, we must understand how these attacks take place from a technical stand-point. To some degree, we must learn to become a computer criminal. Then we will be in a better position to defend against these victimizations that affect us on both the financial and emotional level. In this paper, we will explore these areas of which we know so little, and will also see that computers are really extensions of people. An attack on a computer’s vulnerabilities are really an attack on peoples’ vulnerabilities.

Today, computer systems are under attack from a multitude of sources. These range from malicious code, such as viruses and ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login

to personal computers, while worms have attacked only multi-user systems.

A careful examination of the histories of viruses and worms can highlight the differences and similarities between these classes of malicious code. The characteristics shown by these histories can be used to explain the differences between the environments in which they are found. Viruses and worms have very different functional requirements; currently no class of systems simultaneously meets the needs of both.

A review of the development of personal computers and multi-tasking workstations will show that the gap in functionality between these classes of systems is narrowing rapidly. In the future, a single ...

Succeed in your coursework without stepping into a library.
Get access to a growing library of notes, book reports,
and research papers in 2 minutes or less.


CITE THIS PAGE:

Computer Viruses. (2005, April 21). Retrieved July 21, 2018, from http://www.essayworld.com/essays/Computer-Viruses/25725
"Computer Viruses." Essayworld.com. Essayworld.com, 21 Apr. 2005. Web. 21 Jul. 2018. <http://www.essayworld.com/essays/Computer-Viruses/25725>
"Computer Viruses." Essayworld.com. April 21, 2005. Accessed July 21, 2018. http://www.essayworld.com/essays/Computer-Viruses/25725.
"Computer Viruses." Essayworld.com. April 21, 2005. Accessed July 21, 2018. http://www.essayworld.com/essays/Computer-Viruses/25725.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 4/21/2005 09:12:33 PM
Category: Computers
Type: Free Paper
Words: 1753
Pages: 7

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
» Polymorphic & Cloning Computer ...
» Computer Viruses
» Are "Good" Computer Viruses Sti...
» Computer Viruses: Infection Vec...
» Computer Viruses
» Computer Viruses
» Computer Viruses
» Computer Viruses
» Computer Viruses
» Computer Viruses: Past, Present...
Copyright | Cancel | Contact Us

Copyright © 2018 Essayworld. All rights reserved