Explain the key differences between viruses and other malicious codes. Identify at least three different types of viruses and describe the main differences between each one. Next, explain both the potential threat posed by viruses and other malicious codes and their main effects on computers and productivity.
Discuss the fundamental lesson(s) that we can learn from the attacks of viruses and other malicious codes. Speculate on the main steps that both individuals and businesses can take in order to protect themselves from attacks that may occur in the future.
Once that section is completed, respond in one paragraph to the post below. State if you agree or disagree and the reasoning why. You may also add on to the conversation.
The main difference between viruses and other malicious codes is that viruses attach themselves to programs and propagate copies of itself. Other malicious codes trigger other systems to happen, replicate other codes, and allow other codes to enter. Three types of viruses can be viruses that surround a program that they will not attach but will enclose an application until they can enter. Another kind of infection is integrated viruses and replacements in which they will take another disease. The last type of virus is document viruses that will come to your computer when a document is already corrupted enters your network.
Next, explain both the potential threat posed by viruses and other malicious codes and their main effects on computers and productivity.
On the whole, the potential threat and effects on the computer and its productivity of each type of computer virus are as follows: Trojans – Hidden purpose and program once triggered can open a back door for the virus writer, destroy files or disks, or display a message. The infection occurs simultaneously and silently. Moreover, Adware/Spyware manifests itself by changing the browser, redirecting start-up pages on the internet, and generating pop-up ads. Usually installed through cookies and can be damaged when used with spyware. Lastly, DOS Attack sends phony requests to the server, overloading it and preventing legitimate traffic, and it can affect a user’s interdependency to the internet and its security.
Discuss the fundamental lesson(s) that we can learn from the attacks of viruses and other malicious codes. Speculate on the main steps that both individuals and businesses can take to protect themselves from attacks that may occur in the future.
Notwithstanding, malicious attacks seek to exploit vulnerabilities in a network. These threats can be passive or active and have very negative consequences. Accordingly, the difference between active and passive attacks are that active attacks make changes or modification to the data or attempt to gain some access to the network. In contrast, passive attacks do not make changes to the system at all. That being said, we can agree that many malicious attacks and threats are being carried out daily against the network.
Submitted are a few main steps that individuals and businesses can take to protect themselves from attacks. Firstly, they must install software that will counter malware attacks. Secondly, update systems with a new operating system, establish password entry with encryption; thirdly, firewall; and, lastly, knowledge on malware and viruses attacks; and hire computer experts for assistance and maintenance of security.