Our website is a unique platform where students can share their papers in a matter of giving an example of the work to be done. If you find papers
matching your topic, you may use them only as an example of work. This is 100% legal. You may not submit downloaded papers as your own, that is cheating. Also you
should remember, that this work was alredy submitted once by a student who originally wrote it.
The essay "Top Ten Most Destructive Viruses" focuses on the critical analysis of the top ten most destructive viruses that have been detected in the IT system. At the moment, computer viruses are being introduced at a very fast rate. Viruses are the main threat to computer security today…
Download full paperFile format: .doc, available for editing
Extract of sample "Top Ten Most Destructive Viruses"
Top 10 Virus
Name
Class
Unit
Introduction
At the moment, computer viruses are being introduced at a very fast rate. Viruses are the main threat to computer security today. Each day, there is emergent of new viruses leading to loss of data and privacy. Virus is a deliberate written program with an aim to harm a computer or use it in unauthorized manner. The activities of a virus in a computer involve replicating itself in single computer files doing harm (OECD, 2009). The categorization of viruses is based on the manner in which they affect a computer. Most of the new viruses at the moment are variations of the existing ones through code modification. Antivirus software has been able to handle most of the viruses though in some instances, new viruses come up. Most of the antivirus software are not able to detect new viruses (Henderson, 2006). This essay will look at top ten most destructive viruses that have been detected.
Stuxnet (2009-2010)
Stuxnet was a virus designed to work and cause damage in the real world. The virus was designed with an intention to cause damage to the software installed in the industrial systems. It was claimed that the main intention of the virus was to damage the uranium enrichment program that was being implemented by the Iranian government. The virus was believed to have caused immense damage to the Iranian nuclear enrichment facilities. The virus was discovered in 2010 but its first use was in 2009 in Iran (Sharon, 2012).
Conflicker virus (2009)
In 2009, conflicker virus was able to affect a lot of windows PC. The virus worked through creating boot net computers which were controlled remotely. The main aim of the boot net computers was to steal information and the financial data of the users. The virus was so complex that it took a long time to stop. The virus affected millions of computers and lead to formation of a coalition by experts with intent of stopping it. Though the virus was capable of stealing data, it was never established what was its specific purpose (Sharon, 2012).
Agent.btz
Agent.btz is a virus that attacked pentagon in 2008 and led to the temporally ban on thumb drive. The virus was spread through thumb drives. Agent.btz installed malware that stole the data from the computers (OECD, 2009). The virus was a major threat to data security as it could be transferred easily without control. The virus led to cyber war becoming a part of the US military strategy (Sharon, 2012).
Zeus (2007)
Zeus is a virus that targets personal information which is readily sold by the cyber criminals. The virus is used to pilfer the passwords and files that can be used to compromise the identity and help in cyber crimes. Cybercriminals uses the virus to steal identity and sell it (OECD, 2009). Due to internet banking and shopping, the virus has been popular for phishing. The information that is mostly stolen using the malware is email address, city of residence, secret security questions and date of birth (Sharon, 2012).
Poison ivy (2005)
Poison ivy is a computer virus that was designed with an aim of controlling the infected computer remotely. The perpetrator can be able to gain full control of the computer. Once the perpetrator has installed the virus, they can be able to do what they want with the target company. The virus was used in coordinating sophiscated attacks on firms. The perpetrator could also be able to use computer hardware such as mouse through the virus (Sharon, 2012).
My doom (2004)
The virus was programmed with an aim of denial of service. The virus worked through flooding the target computer with information from different sources. The main mean of spread for the virus was through a bounced email. Once the mail was opened, the code downloaded and affected the user address book. The rate of spread was very high leading to all the victim friends being infected (Sharon, 2012).
Fizzer (2003)
This was a worm that was created for financial gains. The virus used the target mail book to send spam. The virus spread fast and was threatening leading to ransom being offered for information on the creator. Unlike other viruses that used the address book for the sake of spreading, Fizzer used it for financial gains making it more unique (Sharon, 2012).
Slammer (2003)
This is a virus that was created in 2003 with an aim of disrupting services and leading to mayhem. The virus released data packets which through the internet and affected servers leading to their halt. The virus was able to succeed in bringing a halt to the services through denial of services. The virus was able to infect bank ATMs and emergency services (Sharon, 2012).
Code Red (2001)
Though the virus was not complicated, it was able to cause mayhem when it was introduced in 2001. The virus exploited a flaw in Microsoft which enabled disabling and taking down several websites. The virus was able to affect then Whitehouse website. The virus rapid spread acted as a major lesson for antivirus manufacturers (Sharon, 2012).
I love you/love bug (2000)
The virus sent messages to the target with a subject line “I love you”. When the message was opened, the virus was capable of using the address book and forwarding itself. The virus could steal information and corrupt files in the target computer (Henderson, 2006). The virus just required several hours to cause a lot of damage. Through playing with human emotions, it was easy for the virus to spread from one user to another (Sharon, 2012).
At the moment, computer viruses are being developed at a fast rate. The antivirus programs are readily available in the market and enhance computer security. Despite this, not all computer ant viruses are able to fully offer the required protection. Some of the virus still finds way and infects a machine. The lists of the top ten viruses have shown viruses that were developed and caused great damage to computers. These viruses helped the antivirus companies to improve and came up with better programs.
References
Henderson, H. (2006). Computer viruses. Detroit: Lucent Books.
OECD. (2009). Computer viruses and other malicious software: A threat to the Internet economy. Paris: OECD.
Sharon, W. (2012). Top Ten Most-Destructive Computer Viruses, smithsonian.com, Retrieved August 8, 2014, from http://www.smithsonianmag.com/science-nature/top-ten-most-destructive-computer-viruses-159542266/?%20Page=1&webSyncID=258b4a2a-2c73-0c88-9072-9903a84ca175&sessionGUID=52d9a386-63a2-18ed-d97c-a05d83184104
Read
More
Share:
CHECK THESE SAMPLES OF Top Ten Most Destructive Viruses
Hepatitis C virus is the most dangerous of all the hepatitis viruses.... Hepatitis C Introduction: Hepatitis C is a viral disease caused by hepatitis C virus which leads to the inflammation of liver and cirrhosis and eventually liver cancer.... Cirrhosis is chronic diseased condition in which the tissues of liver are destroyed, forming scars and thus making the liver nonfunctional....
There are many antivirus software applications available to stop these viruses from entering a system.... Additionally, it is believed that care is better than cure so it is essential for businesses and individuals that they regularly update their antivirus programs to fight the latest emerging viruses.... An antivirus program stops and removes the viruses entering the system but it must be upgraded regularly.... But it is not effective for all viruses and threats (Norton, 2001; Shelly, Cashman, & Vermaat, 2005; Turban, Leidner, McLean, & Wetherbe, 2005)....
From the paper "The H7N9 Group of viruses" it is clear that infection with the H7N9 virus warrants immediate treatment considering the increased virulence nature of the virus, mortality rate, and the possibility of stably adapting in humans which could give rise to pandemic disease.... The H7N9 group of viruses is a subgroup of a larger group of avian influenza virus A H7.... These viruses are usually found in birds and the source for the H7N9 virus is currently being investigated with many studies pointing to infected birds from poultry houses....
hese can be breached in a number of ways, for example by theft or computer viruses.... This threat can be minimized by the use of anti-virus software and through online scanning for viruses on weekly basis.... New viruses are constantly being produced and the effects can be most alarming.... However, there were a number of cases reported where viruses entered the organization via authorized software updates and in one case on a new PC, direct from the suppliers (Bhimani 1996).
...
HIV fit in to the retrovirus family of viruses.... The virus commandeers the genetic material of the host cell, instructing the cell to replicate more viruses.... The newly formed viruses rupture free from the host, destroying the cell in the process.... The new viruses continue to infect and destroy other lymphocytes.... Some people who have HIV infection may be asymptomatic, which means they do not develop any of the clinical illnesses that define the full-blown disease of AIDS for ten years or more....
This research paper aims to discuss the computer viruses and worms, that are considered as a very serious computer security threats today.... The researcher focuses on the analysis of the types, symptoms and methods of computer viruses, that affects other computer programs by replicating itself.... The majority risk-free viruses carry out operation in a way that they make their copies as well as extend to more computers and also may affect additional computer software....
The cyber attack can take the form of malice; this is so with the viruses that is designed to immobilize the functioning of the network or the single computer that is connected to the internet (Tatum, 2011).... In most cases, these attacks are undetectable to the network administrator or the end user or it can lead to disruption of the network in such a way that the end user is unable to perform some of the rudimentary tasks....
viruses involved in the etiology of diabetes 1 includes; rubella, mumps and Coxsackie (Chandalia et al.... arious factors in the environment like dietary factors and some viruses are capable of starting the autoimmune process leading pancreatic beta cells destruction.... Diabetes and viruses.... most experts agreed of the risks being around 5%-10%.... There has been the study of several genes towards the exploration of diabetes 1; however the most important is the HLA complex, also known as histocompatibility complex....
5 Pages(1250 words)Coursework
sponsored ads
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Top Ten Most Destructive Viruses"
with a personal 20% discount.