Sign In
Not register? Register Now!
Essay Available:
You are here: HomeEssayTechnology
Pages:
2 pages/≈550 words
Sources:
Level:
APA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 10.8
Topic:

Viruses, Vulnerabilities and Security Holes (Essay Sample)

Instructions:

Computers are essential in data manipulation and storage; however, there are malicious programs designed to interfere with data integrity and security. Virus is a software program that is developed will ill motives of compromising information within a computer; Vulnerability is the likelihood of computer virus to interfere with files within a computer through modification of corrupting the data content. However, Security Holes are the avenues through which the virus affects a computer and various ways that would be deployed to enhance computer security so that virus attack would not compromise information stored in a computer. Windows and LINUX/ UNIX are types of operating systems that manage both software and hardware applications in a computer. The program developers of such malicious software target complete destruction of computers, and information contents so that users would purchase anti-virus software to clean up their computers. The virus programs are developed by computer programmers with the ability to derive the corresponding anti- virus that would solve the problems caused by the respective malicious programs. The essay will focus on virus, vulnerability and security holes within a computer system.

source..
Content:

Viruses, Vulnerabilities and Security Holes
Name:
Essay Paper
Instructor’s Name:
Institution:
Fall 2012
Abstract
Computers are essential in data manipulation and storage; however, there are malicious programs designed to interfere with data integrity and security. Virus is a software program that is developed will ill motives of compromising information within a computer; Vulnerability is the likelihood of computer virus to interfere with files within a computer through modification of corrupting the data content. However, Security Holes are the avenues through which the virus affects a computer and various ways that would be deployed to enhance computer security so that virus attack would not compromise information stored in a computer. Windows and LINUX/ UNIX are types of operating systems that manage both software and hardware applications in a computer. The program developers of such malicious software target complete destruction of computers, and information contents so that users would purchase anti-virus software to clean up their computers. The virus programs are developed by computer programmers with the ability to derive the corresponding anti- virus that would solve the problems caused by the respective malicious programs. The essay will focus on virus, vulnerability and security holes within a computer system.
Key words: Viruses, Vulnerabilities and Security Holes


Viruses
Viruses are executable programs that are maliciously created to compromise computer security. The respective developers also develop the antivirus that would clean up and/ or recover the lost data (Kizza, 2008). The common viruses include worms, Trojan horse and macros; most of the computers are at high risk of virus attack despite having the computer protection on active mode (Cobb, 2011). The various anti- virus programs have to be updated in order to enhance full protection form the executable malware. Programs which are transferred through both computers based and network programs (Bidgoli, 2006).
Vulnerabilities
The vulnerability to computer system attack is determined by the kind of operating system installed. The most vulnerable operating systems are window based operating systems like Windows XP, Windows 2000 and Windows 7. Linux operating systems are more secure since the source codes with better security making them less vulnerable to malicious programs like Trojan horse and other malicious executable programs (Bidgoli, 2006).
Security Holes
Computers operating on Linux operating systems are secured from the common malware this implies that LINUX/ UNIX based operating systems are the most preferred operating systems (Kizza, 2008). The difference in operation between the Windows based operating system and the Linux based operating system is the system codes. The structure of Linux coding system is security enhances to complicate the operating system structure, so nobody/ malicious program would get access to the system programs t...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Network Design
    Description: Network Design Technology Essay Undergraduate level...
    7 pages/≈1925 words| APA | Technology | Essay |
  • Information Security Management Frameworks
    Description: Information Security Management Frameworks Technology Essay Undergraduate level...
    1 page/≈275 words| APA | Technology | Essay |
  • Strategic Information System Planning
    Description: Strategic Information System Planning Technology Essay Master's level...
    15 pages/≈4125 words| APA | Technology | Essay |
Need a Custom Essay Written?
First time 15% Discount!