Type Here to Get Search Results !

Computer Virus

0
A computer virus is a coded program intended to cause destruction to data or system operations knowingly or unknowingly to the user. They carry out their functions by replicating or copying themselves to other vulnerable areas. The functions of the virus depend on the program code. Examples of their function are stealing of personal data, computer memory loss, replicating through spamming, etc.,

Boot virus:

Boot virus (Trojans) affect the disk operating system, thereby corrupting the booting files in spite of the operating system used. The main distinction is that they don’t replicate but spread on opening an email attachment specifically.

Macro virus:

Macro virus (Worms) are intended to affect data files specifically by finding vulnerabilities in word or excel documents. They infect by replicating to other systems in the network. They don’t require a host file to replicate themselves.

Hacking and computer fraud

Hacking is an act performed to gain personal data or sensitive information through vulnerabilities in your computer network or program. It is unethical to perform hacking as it neglects privacy issues.

Computer fraud is a piracy performed with the help of computer techniques to procure any data which leads to another’s monetary gain. Computer fraud faces tough challenges for preventing at this era.

Data security

Data security is the prevention of one’s private or corporate data files falling into personnel who exploit the privacy issues of the data. The data protection act of the United Kingdom was unveiled for data security. This ensured that data security breaching is considered unlawful.

Prevention measures:

The prevention measures for viruses, hacking, computer fraud and data security breaching are as follows

  • Ensure your computer is updated with latest software updates and OS system updates to seal off the vulnerabilities.
  • Ensure you have an antivirus program, anti-malware program and firewall system with latest updates.
  • Ensure you don’t open any un-authorised mails containing documents.
  • Ensure you don’t download software programs developed by individuals.
  • Ensure you don’t provide your bank details on unauthorised sites.
  • Ensure you don’t navigate into a hacked site as you are more prone to data breach.
  • Ensure you change your every online password periodically to ensure safety.
Tags

Post a Comment

0 Comments