StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Project on Spyware and Viruses - Essay Example

Cite this document
Summary
This essay "Project on Spyware and Viruses" discusses the rapid advancement in information and communication technology the individuals and organizations have become completely dependent on computers and other software for the day-to-day running of the organizations…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.1% of users find it useful
Project on Spyware and Viruses
Read Text Preview

Extract of sample "Project on Spyware and Viruses"

Project on Spyware and Viruses Introduction With the rapid advancement in the information and communication technology cyber-security has become a global issue which needs to be addressed in a focused way for the users to survive in the technological era. However with every step in the advancement of the technology there have been an increasing number of fraudsters who thrive on the weaknesses in the software and make use of the data base of other people for illegitimate purposes. Thus any organization or individual who is a user of the internet for commercial or other purposes has been made the potential target of these fraudsters who indulge in spreading computer viruses, identity theft, phishing for information and data and several other forms of electronic crimes. This has necessitated the internet users to safeguard the data stored in their computers by installing anti spyware and anti virus software for protecting their valuable information and data. However it is to be noted that technology solutions alone can not act to protect the information and data. Arthur Wong (2004) observes, “Education and awareness of the individual, whether in the largest multinational corporation, small business or the home user, is critical. Security is more than just installing a piece of software it is using best practices, updating your antivirus, and practicing safe and secure computing” With this background, this project studies the problem of spyware and viruses and presents a report on the issue of spyware and viruses and their impact on the security of the information stored. The paper also discusses the possible future dimensions of the protection through anti spyware and anti virus software. Description of the Problem The project is to create awareness among the community of a University about the adverse effects of spyware and viruses on the information and data stored by the administration, staff, faculty and students of the University, as most of the users in the particular University have not considered the security of data on their computers important. In the process of creating this awareness the project describes the various ways in which the spyware and viruses can enter the data bases of the different users and the potential harm it may create to the information and data stored in the respective computers. The project also reports on the ways in which the information and data can be protected from the impact of such spyware and viruses. Purpose of the Project The major purpose of this project is to identify the relevance of the security of the electronic information to the users. The other purpose of the project is to detail the awareness about cyber security and the adverse consequences of its failures. The overall objective of the project is to enlighten the readers about the consequences of cyber crimes and threats and the necessity of awareness for securing the network, information, and data bases of individual and organizational users of internet. Making cyber security a habit in such a way that it becomes a natural tool will enable the users protect the confidentiality, integrity, and availability of various information and data online (Katherine Egan, 2007). Literature Review Although there is no abundance of literature on the spyware and viruses and the relevance of cyber security through applying anti-spyware and anti-virus software, there are quite a few articles that describe the nature and effect of the spyware and the viruses on the data and information stored in the personal computers. Ed Titte (2005) points out that spyware, adware and viruses commonly known as ‘Malware’ has been the subject matter of several research studies undertaken recently by media, scholars and research students in the Universities and also the vendors of various hardware and software. He further adds that the studies have proved that while the anti-virus programs can ensure hundred percent success in removing the viruses, the anti-spyware software have proved less successful with only 90 percent efficacy. Difference between Spyware and Viruses The term ‘malware’ has been coined as the combination of two different terms – ‘malicious’ and ‘software’. This word encompasses threats to the software, information, and data stored in the personal computers which may take the form of viruses, worms, Trojan horses, spyware, adware, and other malicious software installed by hackers and fraudsters (Zac Mutrux, 2006). Though both are considered as malicious software that takes up uninvited residence in the personal computers, there are quite a number of differences between spyware and viruses. Some of the important differences are: Viruses are self contained that they send themselves to the personal computers and have the required code to reproduce themselves. Spyware on the other hand requires the running of active web content or other transient programs by the users for their reproduction. Viruses can be identified by their contents. Whereas spyware can be identified only from the traces left behind after it has affected the active web content. Viruses can be sent to another location for inspection and analysis. But the analysis and identification of spyware can be done only on the particular system. Viruses can transport themselves freely and are able to reproduce in several ways, while, spyware need some visitors to visit the websites and then run on a user’s machine to get downloaded. Adverse Effect of Spyware and Viruses The spyware not only hacks the information stored in the personal computer but also obstructs the proper running of the system and thus make the computer irreparable. The spyware once entered into the computer directly attack the hard disc. By crawling into the memory and registry of the computer system, it infects the memory of the computer and prevents the other programs to run in the way they should normally run. The ultimate effect is that the computer becomes unusable permanently and all the information and data stored in it are gone for ever. (John Porter, 2007) Philip and Rembert point out “similar to biological viruses, computer viruses are small, destructive programs that spread surreptitiously from machine to machine. A virus on the other hand is a parasite program evolved with a malicious intention of being sent to another person’s computer without the knowledge or permission of the user. The virus thus sent to another computer attaches itself to the files or boot sectors present in the computer and replicates itself. Then it starts spreading to other programs. While some virus no further harm except spreading to other files or programs some of them are very harmful that they cause serious damages and affect the proper function of the programs as well as the system itself. There are some known and identified viruses like cookie monster, the brain virus, the Lehigh virus, and the Jerusalem Virus. (Rob Wentworth, 1996) Removal of Spyware Anti-spyware programs follow the method of completely scanning the total contents of a computer. During such scanning, all the files and programs in the computer are compared against the data base covering the known spyware. In case there are some files or programs that resemble a known spyware, the anti-spyware instructs the user to remove the detected entries or some specific files or items. However it must be remembered that each anti-spyware program uses its own base programs to detect the application which may be a potential threat to the user database. Hence a single anti-spyware may not be able to effectively detect all the spyware. Therefore it is important for the users to install a few freely downloadable anti-spyware applications. In case of necessity the user must also install some paid application of anti-spyware to remain completely protected (Zac Mutrux, 2006). Removal of Viruses There is different anti-virus software available online either on payment or as free downloads that can combat the menace created by the viruses. Most of the anti-virus programs act continuously and monitor the personal computer for the potential attack from viruses. By such continuous monitoring of the system, the anti-virus software automatically act to quarantine any suspected virus and starts destroying it. It is usual for an anti-virus program to notify the user when it has prevented a threat of any virus entering the system. In most other cases the removal of viruses is simple in that the antivirus software has to be updated for all kinds of viruses and a complete system scan is to be performed after the installation of the anti-virus software. All the anti-virus software contains detailed instructions for removal of the viruses. It may so happen that the existing anti-virus program may not be effective in removing a particular virus in which case the user may have to install additional anti-virus software (Zac Mutrux, 2006). Discussion From a review of the available literature one should be able to ascertain the kind of security threats to their data bases, and the manner in which they can be protected. In my opinion, the entire University community that this project considers for educating about the security threats from spyware and viruses should view the cyber-security as a part and parcel of the computer literacy. This is very important in view of the fact that such awareness will enable them to understand the ways in which they can interact with the internet. It would also educate them to know where and when they can provide their personal data base information and also to differentiate between genuine and fraudulent websites and the ways in which they can hinder the performance of the system. The University being an educational institution stores personal, academic, health and financial data and information about the present and past students, their parents, research associates, vendors and other suppliers of products and services to the University. Moreover there are a number of published articles and E books stored in the electronic library of the University. Hence it becomes important that whoever is using the system which is well connected internally must be aware of the potential danger of spyware and viruses affecting one system may easily enter other systems and the main computer system of the University which will be disastrous. A detailed information about various spyware and viruses and their adverse effects on the computers once they enter the system as well as the information of the various anti-spyware and anti-virus software available for free downloading and also on pay-for basis will enable the users to be fully aware of the necessity of the cyber security and the way in which this can be achieved. Recommendations for Future Course of Action In view of the seriousness of the problem being faced by the University because of its exposure to the spyware and virus attack to its compute system the following recommendations may be considered for implementation which may have the effect of improving the effectiveness of the security of information stored in the computers. (1) At the start of every academic session, there must be an orientation program for all the people including staff, faculty, and students about the adverse impact of Spyware and Viruses and the ways in which the data and information can be protected. (2) As a part of the University Manual a Compact Disc (CD) consisting of the detailed information on different spyware and viruses and the ways in which the users can protect their data and information from such spyware and viruses can be handed over to all the new entrants to the University whether for pursuing studies or for any other purpose. (3) A committee of experts from the students and the faculty on removing the spyware and viruses can be formed at the start of every academic session and the contact details of the members of the committee be communicated to every member of the University for accessing them in case of their encounter with any spyware or virus. Conclusion Thus with the rapid advancement in the information and communication technology the individuals and organizations have become completely dependent on the computers and other software for the day to day running of the organizations, and also for the processing of various other data. In such a situation it is vitally important that all the users are aware of the ill effects of some of the malware like spyware and viruses which are common forms of techniques that affect the functioning of the computers and make them useless. It is also important that the users are also made aware of the ways of mitigating the problems of spyware and viruses by installing proper software in their computers. References Arthur Wong (2004) "Prescription for protection" Communications News Vol. 41.Issue 1 Communication & Mass Media Complete Ed Titte (2005) ‘Spyware vs. Viruses: Two Different Fights’ John Porter (2007) ‘Permanent Problems Caused by Spyware: Beware’ Katherine Egan (2007) ‘Cyber Security Awareness @ Fordham University’ Philip Scorgie and Rembert Meyer-Rochow ‘Review: Viruses’ Rob Wentworth (1996) ‘Computer Virus’ Zac Mutrux (2006) Removing Spyware, Viruses, and Other Forms of Malware’ Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Project Essay Example | Topics and Well Written Essays - 2000 words”, n.d.)
Project Essay Example | Topics and Well Written Essays - 2000 words. Retrieved from https://studentshare.org/miscellaneous/1543888-project
(Project Essay Example | Topics and Well Written Essays - 2000 Words)
Project Essay Example | Topics and Well Written Essays - 2000 Words. https://studentshare.org/miscellaneous/1543888-project.
“Project Essay Example | Topics and Well Written Essays - 2000 Words”, n.d. https://studentshare.org/miscellaneous/1543888-project.
  • Cited: 0 times

CHECK THESE SAMPLES OF Project on Spyware and Viruses

Profit Implications of Malware

viruses are small software programs that are designed to spread replicate from one computer to another.... There are several categories of viruses these are macro virus, email virus, multi-variant virus.... Malware refers to any program or file that can harm a computer system....
15 Pages (3750 words) Annotated Bibliography

Spyware and Adware

For the safe working of the computer it is very necessary that the computer has some antidotes for such malicious soft wares and viruses.... Because these malwares and viruses are very harmful for your computer as it can completely make your computer useless.... [Instructor Name] spyware and Adware Task 1 A spyware is malicious software that gets installed on a computer without the prior knowledge of the owner.... On the other hand antivirus software is software that scans the computer for any viruses, hackers or malicious soft wares such as Trojans and worms and removes it from the computer....
4 Pages (1000 words) Essay

Security in Computer Networks

Some of the threats facing computer networks include spyware, viruses, and hacking codes or programs that expose the users to potential dangers of data loss and fraud activities.... Programs like spyware, adware, viruses, or hacking software can be prevented from being downloaded into the computer system through the use of firewalls, adjusting browser settings, and installing anti-spyware protection applications....
5 Pages (1250 words) Research Paper

Spyware and Implementing Network Security

This essay "spyware and Implementing Network Security" is a compilation of resources that explain what spyware is, how it attacks, and most importantly what you can do to win the war on spyware.... As spyware continues to threaten the stability of corporate infrastructures, it's crucial to understand how this malicious software works and how to defend against it.... spyware may collect different types of information.... The scourge of spyware is going to be here for quite a while, simply because the attacker makes so much money from it....
19 Pages (4750 words) Essay

Security Is a Major Problem with the Internet

Sometimes viruses are not noticeable while sometimes they can destroy the hard drive.... Markus Hanhisalo) In 2003, $55 billion was spent on the cost of computer viruses by businesses.... (Cyberoam, 2004) There are different anti-viruses nowadays that deal with all sorts of viruses.... These emails were only a nuisance but now viruses are spread through this and phishing is also becoming common because of this....
3 Pages (750 words) Essay

Spyware and Implementing Network Security to Prevent it

This assignment is a compilation of resources that explain what spyware is, how it attacks and most importantly what you can to do to win the war on spyware.... Purposes range from overtly criminal (theft of passwords and financial details) to the merely annoying (recording Internet search history for spyware may collect different types of information.... he scourge of spyware is going to be here for quite a while, simply because the attacker make so much money from it....
20 Pages (5000 words) Essay

Spywares as Viruses

spyware is the software that transfers the vital information surreptitiously from the user's system to any other intended system.... A spyware can attack your system if you install a freeware that has a spy ware as an application or your browser automatically installs program without seeking your permission and ends up installing a spyware or you click on a pop up and that triggers a program to install a spyware onto your machine....
7 Pages (1750 words) Essay

Viruses and Worms

This research paper aims to discuss the computer viruses and worms, that are considered as a very serious computer security threats today.... The researcher focuses on the analysis of the types, symptoms and methods of computer viruses, that affects other computer programs by replicating itself.... The majority risk-free viruses carry out operation in a way that they make their copies as well as extend to more computers and also may affect additional computer software....
9 Pages (2250 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us