Computer Viruses
In information security , computer virus is a manmade program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. From behavior computer virus in a way is a similar biological virus which pervasions by inserting itself into living cells. Cell by cell and all organisms (computer) is ridden virus cells.
Without computer viruses there are separated two other types of malicious computer programs - viruses.
Trojan Horses
As already from this virus type name we can imagine, Trojan horses are programs that pretend to be legitimate software, but actually carry out hidden, harmful functions. Trojans can't replicate themselves that mean, they can't expand so fast as other virus types. But often they work together with viruses.
Worms
Worms are similar to viruses but do not need a carrier program or document. Worms simply create exact copies of themselves and use communications between computers, for example e-mail, to spread.There are different types of computer viruses with different influence. Some viruses are fairly harmless or only annoying, but there are viruses that can create inconceivable damages.
Some things what virus can do with computer:
* Slow down e-mail - generating huge e-mail traffic and slowing down servers;
* Steal confidential data - for example, recording user's keystrokes;
* Use your computer to attack websites;
* Let other user hijack your computer - allowing to connect to your computer and use it for their own purpose;
* Corrupt data - making changes in some documents;
* Delete data - all or only some part data on your HDD;
* Play pranks;
* Damage credibility - forwarding itself from your computer to your friends or even business partners;
* Cause embarrassment - for example, replacing one word in all documents with other.
Every year computer viruses activity brings to company several million dollars damages. Year for year this number of damage increase!
Because it is so important that every people get information security awareness training!
Article source: InfoSecurityLab
Related Tags: training, security, awareness, computer viruses, information security awareness, informations security awareness treining, information security awareness trainings, infosecuritylab, palsit
Information security awareness training
Your Article Search Directory : Find in ArticlesRecent articles in this category:
- What Is Spyware?
If you use a computer then there are certain things that you have to be educated about. Spyware is o - There's No Such Thing As The Perfect Password
Even though you can get advice on how to create the perfect password, it's important to realize that - Shopping Online For Contacts: Security And Privacy
The Fairness to Contact Lens Consumer Act, signed into law in 2004, empowered lens wearers with the - Step-by-step Procedure Of Ssl Certificate Installation
SSL certificates are used to transfer the private data entered on the user computer to the website o - Software Protection Versus Code Obfuscation - Stable Software Protection
Security of intellectual property is crucial for every business in today's modern reality. Competiti - Portable Mini Digital Video Recorder
Portable Mini Digital Video Recorder is one of the world's smallest high-resolution mini Digital Vid - Protecting Domain Name From Cyber Squatting And Hijacking
Before I go into details about protecting domain name you should first know that there is no busines - Finding Email Senders Using Reverse Email Lookup
Most of our email inboxes are flooded with so many solicited and unsolicited messages that it's ofte - Confidentiality With Secure Email
Confidentiality, in any business, is among the most significant key in order to keep a client. There - Covering Your Computer's Footprints
When you delete a file, email, or piece of internet history on your computer, where do you think it
Most viewed articles in this category:
- How Does Ssl Fit Into the Over Scheme of Internet Security?
Internet has become an integral part of our life. Most of us prefer to do maximum amount of transact - Tips of Security
Protecting private information Information is the lifeblood of most, if not all, modern organis - Internet Attack Methods
The U.S. Government's National Information Assurance Glossary defines Information Security as: Prote - Your Security Awareness Iq
Article about security awareness: Are you aware of the need for security? Your awareness o - Information Security Endangered
Sour time is coming. Spy programs are stealing information more easily. The reason is weak algorithm - In Reality, Spyware is Always a Threat
I received a spam email the other day and the subject said "Tired of reality shows? Make your ow - The Top 7 Threats to your Computer in 2007
Now that the holidays are behind us, the cost-conscious among us will be looking for those "post-hol - Security Using Public Internet Array Access
Internet comes to peoples lives and then suddenly comes truth, that WE CAN'T LIVE WITHOUT INTERNET. - Enslaving the Airwaves: the Repercussions of Insecure Wireless Networks
There is no doubt that wireless technology has evolved the way we communicate. With the popular 2.4 - Anti-virus Software Comparison Test
Virus.gr tested quite a few different software companies to see how they would stack up against each