Minecraft Blogs / Article

The Issues with Computer Viruses

  • 534 views, 2 today
  • 1
  • 0
LaPanthere's Avatar LaPanthere
Level 3 : Apprentice Crafter
1

The Issues with Computer Viruses



The following essay will discuss the issue of computer viruses and explain what a computer virus is, what different types exist, how they work and the ethical and moral reasons behind why people use viruses to initiate attacks. It will also explain what computer viruses are, what different types of them exist and how they are spread. Some of the more infamous viruses and the penalties behind getting caught distributing or using computer viruses will also be mentioned. Finally, there will be an advice section explaining what you can do to prevent being infected with a virus and a conclusion that will summarise my overall opinions on the virus issue.

Computer viruses are programs that intend to do harm towards modern-day technology such as personal computers and portable devices. According to a Microsoft Security Intelligence Report that was released on the 7th of November 2012 [0] over 16 million households in the USA had virus problems within the past two years. Approximately 40% of all USA households have had viruses. Viruses are now a serious threat to most households. Anything you download could be a virus. Having antivirus software is needed to stop your family getting infected. Computer viruses along with several other subtopics such as Trojan horses are subtopics to Computer Malware. Malware is short for malicious software, its prime objective is to disrupt computer operation and attack the end user. Malware can be specifically designed to have one purpose such as steal credit card information or simply idle in the background and send records via HTTP or SMTP. Trojans make up 69% of all computer malware. Programs that record your keystrokes are labelled with the generic name o Keyloggero or o Keystroke Loggero . These programs are available anywhere online and can be easily made. Some viruses are controlled from other computers and give the host full control over the infected PC. These viruses are deadly and are labelled with the acronym o RATo which stands for Remote Administration Tool. It is a form of a Trojan horse, this can be used in schools to monitor what children do but can also lead to devastating games of manipulation. Some famous RATs include Darkcomet, Blackshades RAT and jRAT.

Worms are a type of malware being classified in its own subtopic. They are built to spread and infect as many computers as possible with or without the internet. Worms were popular back when there was no internet. They spread across computers on a LAN using the boot sector of a floppy disk. The first well known worm was the Morris worm of 1988. It infected several large companies. Worms of today spread in the same manner scanning and replicating onto another vulnerable computer. Many programs are viruses and sometimes people just dono t know if a program is one due to it being fully undetectable (FUD) with any antivirus scanner or antivirus. Programs such as crypters can edit a programs code and execute it in different methods. Crypters are not like other obfuscation programs. Crypters have special methods and includes such as anti-process kill and start up the program on computer start up. Antivirus programs can usually detect the infected program but sometimes new methods are used and it cannot be detected leaving a gaping hole in security.

The rise of criminals convicted of computer crime has increased largely due to the ease to get ones hands on the programs and materials. A quick Google search can lead you to any program you want. There are several forums that host this content including o Hack Forumso and o Leak Forumso According to a list of computer criminals [4] there has never been a conviction more than 10 years in prison. One eye catcher on that page is the name o Julian Paul Assangeo Julian Assange is the owner of WikiLeaks a website that tells the secrets about the US and other countries. Current law states that any unauthorised modification of data to cause impairment will have a maximum sentence of 10 years imprisonment [3]. There are several other laws such as o Unauthorised impairment of data held on a computer disk etc.o and o Unauthorised access to, or modification of, restricted datao which carry sentences of 2 and above years of imprisonment. The amount of arrests for cybercrimes has increased over the years since the personal computer was invented and made. Just last year there were over 24 arrests on one operation against carders (Carders are people that steal and use peopleo s credit cards for their own personal profit). This is more than there was 10 years ago and is increasing per year. According to the annual RSA 2011 report [2], o Cybercrime continues to show no signs of slowing down. In fact, 2011 marked a year of new advanced threats and an increased level of sophistication in the attacks witnessed around the globe.o There will be no end for cybercrime but people around the world can prevent themselves from being infected or attacked by following these steps;

o Download a free or paid antivirus software,

o Turn off Java in your browser as there is a major security issue with it,

o Dono t download programs that look too good to be true,

o Keep children under constant supervision while they are on a computer.

This will prevent most attacks. Being safe online is basically using your common sense and not being idiotic.

Individuals who hack, infect and make these viruses are normally insecure and wanting to boost their ego by doing something daring. Just like any male in todayo s society they are out to impress people. Some internet users are antisocial and do not get outside, this could be called an activity that would provide entertainment for them and their peers. Achievement and self-gain may also be reasons as to why individuals infect and manipulate people. Just like a person getting on with their life a hacker wishes to get on with theirs setting goals and breaking laws. The majority of people would most likely think that hackers hack because they are simply bored teenagers wanting to push the boundaries of law and their parentso rules.

Computer viruses and malware will be always be present on the internet. There is little government and other authorities can do due to many ways to hide online such as VPNo s SSH tunnelling and proxies. If you have ever come across a hacker or person wanting to infect you or anyone else it is possible to contact the IC3 sector of the FBI. They will assist you with the report and make sure you stay out of harm. I personally think people that hack are ruthless people with little else to do. Apart from being highly illegal I also believe there should be some kind of enforcement of laws online as it is quite like the Wild West where anything goes. In conclusion, remember to stay safe online. Do not give out your personal information or download something that is not approved with a digital signature unless you know the publisher. I hope my suggestions and information regarding this subject have left motivational thoughts on how you can improve your safety when you are online.

Thank you for reading,

LaPanthere

Hanwpng
CreditThe Internet
Tags

Create an account or sign in to comment.

Planet Minecraft

Website

© 2010 - 2024
www.planetminecraft.com

Welcome