+ 1-888-787-5890  
   + 1-302-351-4405  
 
 
 
 

Essay/Term paper: Computer viruses: infection vectors, and feasibility of complete protection

Essay, term paper, research paper:  Information Technology

Free essays available online are good but they will not follow the guidelines of your particular writing assignment. If you need a custom term paper on Information Technology: Computer Viruses: Infection Vectors, And Feasibility Of Complete Protection, you can hire a professional writer here to write you a high quality authentic essay. While free essays can be traced by Turnitin (plagiarism detection program), our custom written essays will pass any plagiarism test. Our writing service will save you time and grade.



Computer Viruses: Infection Vectors, and Feasibility of Complete Protection


A computer virus is a program which, after being loaded into a
computer's memory, copies itself with the purpose of spreading to other
computers.
Most people, from the corporate level power programmer down to the
computer hobbyist, have had either personal experience with a virus or know
someone who has. And the rate of infection is rising monthly. This has caused a
wide spread interest in viruses and what can be done to protect the data now
entrusted to the computer systems throughout the world.
A virus can gain access to a computer system via any one of four
vectors:
1. Disk usage: in this case, infected files contained on a diskette
(including, on occasion, diskettes supplied by software
manufacturers) are loaded, and used in a previously uninfected
system thus allowing the virus to spread.
2. Local Area Network: a LAN allows multiple computers to share the
same data, and programs. However, this data sharing can allow
a virus to spread rapidly to computers that have otherwise been
protected from external contamination.
3. Telecommunications: also known as a Wide Area Network, this
entails the connection of computer systems to each other via
modems, and telephone lines. This is the vector most feared
by computer users, with infected files being rapidly passed
along the emerging information super-highway, then downloaded
from public services and then used, thus infecting the new system.
4. Spontaneous Generation: this last vector is at the same time
the least thought of and the least likely. However, because
virus programs tend to be small, the possibility exists that
the code necessary for a self-replicating program could be
randomly generated and executed in the normal operation of
any computer system.

Even disregarding the fourth infection vector, it can be seen that the
only way to completely protect a computer system is to isolate it from all
contact with the outside world. This would include the user programming all of
the necessary code to operate the system, as even commercial products have been
known to be shipped already infected with viruses.
In conclusion, because a virus can enter a computer in so many different
ways, perhaps the best thing to do is more a form of damage control rather than
prevention. Such as, maintain current backups of your data, keep your original
software disks write-protected and away from the computer, and use a good Virus
detection program.

Outline Thesis: Complete protection of a computer system from viruses is not
possible, so efforts should be concentrated on recovery rather than prevention.
I. Introduction, with definition.
A. Define Computer Virus.
B. Define interest group.
C. Define problem. II. Discus the ways that a virus can infect a
computer.
A. Disk exchange and use.
B. Local Area Network.
C. Telecommunications also known as Wide Area Network.
D. Spontaneous Generation. III. Summarize threat, and alternatives.
A. Must isolate from outside world.
B. Must write own programs.
C. Propose alternative of damage control.

Sources Cited

Burger, Ralf. Computer Viruses and Data Protection. Grand Rapids:
Abacus, 1991.

Fites, Philip, Peter Johnston, and Martin Kratz. The Computer Virus
Crisis. New York: Van Nostrand Reinhold, 1989: 6-81.

McAfee, John, and Colin Haynes. Computer Viruses, Worms, Data
Diddlers, Killer Programs, and Other Threats to Your System.
New York: St. Martin's Press, 1989: i-195.

Roberts, Ralph. Computer's Computer Viruses. Greensboro: Computer
Publications, Inc., 1988: 29-82



 

Other sample model essays:

Information Technology / Fiber Optics
Fiber Optics Fiber Optic Cable Facts "A relatively new technology with vast potential importance, fiber optics is the channeled transmission of light through hair-thin glass fibers." [...
Information Technology / The First Generation Of Computers
The First Generation of Computers The first generation of computers, beginning around the end of World War 2, and continuing until around the year 1957, included computers that used va...
Get Informed! - Buying The Right Computer Buying the right computer can be complicating. Because of this many people are detoured from using or purchasing a very beneficial machine. Some ...
Information Technology / The Internet
The Internet Imagine a place where people interact in business situations, shop, play video games, do research, or study and get tutoring. Now imagine that there are no office buildings, ...
Government Intervention on the Internet CIS 302 - Information Systems I John J. Doe XXX-XX-XXXX March 12, 1997 During the last decade, our society has become ba...
Information Technology / Creative Writing: Hackers Manifesto
Creative Writing: Hackers Manifesto Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"... Damn kids...
Information Technology / Hackers: Information Warefare
Hackers: Information Warefare Geoff Stafford Dr. Clark PHL 233 The Popularity Of The Internet Has Hrown Immeasurably In The Past Few Years. Along with it the so-called "h...
Information Technology / Hacking To Peaces
Hacking to Peaces The "Information Superhighway" possesses common traits with a regular highway. People travel on it daily and attempt to get to a predetermined destination. There ar...
Information Technology / Hebrew Text And Fonts
Hebrew Text and Fonts Today's written language is quickly becoming history. Just as the carved tablet has become a conversation piece in the archeologist's living room, the written l...
Information Technology / History Of The Internet
History of The Internet Phillip Johnson The Internet is a worldwide connection of thousands of computer networks. All of them speak the same language, TCP/IP, the standard protocol. ...
Experience with Dream Essay - Reliable and great customer service. Quality of work - High quality of work.
, ,
Dream Essay - Very reliable and great customer service. Encourage other to try their service. Writer 91463 - Provided a well written Annotated Bibliography with great deal of detail per th
, ,
it is always perfect
, ,
The experience with Dream Essay is stress free. Service is excellent and forms various forms of communication all help with customer service. Dream Essay is customer oriented. Writer 17663
, ,
Only competent & proven writers
Original writing — no plagiarism
Our papers are never resold or reused, period
Satisfaction guarantee — free unlimited revisions
Client-friendly money back guarantee
Total confidentiality & privacy
Guaranteed deadlines
Live Chat & 24/7 customer support
All academic and professional subjects
All difficulty levels
12pt Times New Roman font, double spaced, 1 inch margins
The fastest turnaround in the industry
Fully documented research — free bibliography guaranteed
Fax (additional info): 866-332-0244
Fax (additional info): 866-308-7123
Live Chat Support
Need order related assistance?—Click here to submit a inquiry
© Dreamessays.com. All Rights Reserved.
Dreamessays.com is the property of MEDIATECH LTD