9
Tisha Wilson July 14 2011 Eng 1213 Cause and Effect Essay Malware and Viruses Along with viruses, one of the biggest threats to computer users on the Internet today is malware. It can hijack your browser, redirect your search attempts, serve up nasty pop- up ads, track what web sites you visit, and generally screw things up. Malware programs are usually poorly-programmed and can cause your computer to become unbearably slow and unstable in addition to all the other havoc they wreak. “Malware is a term used to describe software that is intentionally installed on a computer to gather information or cause problems for the user” (Teacher Librarian). Many of them will reinstall themselves even after you

Cause and Effect Essay

Embed Size (px)

Citation preview

Page 1: Cause and Effect Essay

Tisha Wilson

July 14 2011

Eng 1213

Cause and Effect Essay

Malware and Viruses

Along with viruses, one of the biggest threats to computer users on the Internet

today is malware. It can hijack your browser, redirect your search attempts, serve up nasty pop-

up ads, track what web sites you visit, and generally screw things up. Malware programs are

usually poorly-programmed and can cause your computer to become unbearably slow and

unstable in addition to all the other havoc they wreak. “Malware is a term used to describe

software that is intentionally installed on a computer to gather information or cause problems for

the user” (Teacher Librarian).

Many of them will reinstall themselves even after you think you have removed

them or hide themselves deep within windows making them very difficult to clean. You can get

infected by malware in several ways. Malware often comes bundled with other programs Kazaa,

iMesh, and other file sharing programs seem to be the biggest bundlers (eWeek). Malware

programs, usually pop-up ads sending revenue from the ads to the program's authors. Others are

installed from websites, pretending to be software needed to view the website. Still others, most

notably some of the Cool Web Search variants, install themselves through holes in Internet

Page 2: Cause and Effect Essay

Explorer like a virus would requiring you to do nothing but visit the wrong web page to get

infected. The vast majority however must be installed by the user. Unfortunately, getting infected

with malware is usually much easier than getting rid of it, and once you get malware on your

computer it tends to multiply.

A computer virus is a potentially damaging computer program designed to affect

or infect your computer negatively by altering the way it works without your knowledge or

permission. More specifically, a computer virus is a segment of program code that implants itself

in a computer file and spreads systematically from one file to another. Viruses can spread to your

computer if an infected floppy disk is in the disk drive. When you boot the computer if you run

an infected program or if you open an infected data file in a program, depending on the virus

certain actions can trigger the virus. Many viruses activate as soon as a computer accesses or

runs an infected file or program.

Other viruses, called logic bombs or time bombs, activate based on specific

criteria. A logic bomb is a computer virus that activates when it detects a certain condition. An

example would be a disgruntled worker planted a logic bomb that began destroying files when

his name appeared on a list of terminated employees. A time bomb is a type of logic bomb that

activates on a particular date. A well-known time bomb is the Michelangelo virus, which

destroys data on a hard disk on March 6, Michelangelo’s birthday. Some might call it a

“Terrorist” virus (Maclean's).

Another type of malicious program is a worm. Although, often it is called a virus.

A worm unlike a virus does not attach itself to another program. Instead, a worm program copies

itself repeatedly in memory or on a disk drive until no memory or disk space remains. When no

Page 3: Cause and Effect Essay

memory or disk space remains, the computer stops working. Some worm programs even copy

themselves to other computers on a network. Once it escapes into the general culture there will

be no way back (Communications of the ACM).

Anti-virus companies are only beginning to pay attention to malware. Aside from

some of the latest versions many include the malware scanner in the Internet security most anti-

virus programs have little to no protection. Those anti-virus programs that do protect are

generally not as thorough as a dedicated malware remover. However, some especially virulent

malware that malware scanners may miss will be removed by anti-virus programs. So it is

generally a good idea to run a virus scan as well. Some of the anti-virus vendors' delay may be

caused by worries they will get sued if they start labeling programs spyware, adware, etc., which

has already happened. The signature files and data updates are what make an anti- virus

programs effective (Information Systems Security).

Although, there is no official breakdown we can divide malware into several

broad categories of malware: adware, spyware, hijackers, and toolbars. Many if not most

malware programs will fit into more than one category. It is very common for people to use the

words adware, spyware, and malware interchangeably. Most products that call themselves

spyware or adware removers will actually remove all types of malware. Adware is the class of

programs that place advertisements on your screen. These may be in the form of pop-ups, pop-

unders, advertisements embedded in programs, advertisements placed on top of ads in web sites,

or any other way the authors can think of showing an ad. The pop-ups generally will not be

stopped by pop-up stoppers and often are not dependent on your having Internet Explorer open.

They may show up when you are playing a game, writing a document, listening to music, or

Page 4: Cause and Effect Essay

anything else. Should you be surfing the advertisements will often be related to the web page you

are viewing.

Programs classified as spyware send information about you and your computer to

somebody else. Some spyware simply relays the addresses of sites you visit or terms you search

for to a server somewhere. Many instances of spyware can carry out self-update automatically

which allows new functions to be introduced and can evade spyware signatures contained in anti-

spyware tools (Communications of the ACM). Others may send back information you type into

forms in Internet Explorer or the names of files you download. Still others search your hard drive

and report back what programs you have installed, contents of your e-mail client's address book

(usually to be sold to spammers), or any other information about or on your computer things

such as your name, browser history, login names and passwords, credit card numbers, and your

phone number and address. Spyware often works in conjunction with toolbars. It may also use a

program that is always running in the background to collect data, or it may integrate itself into

Internet Explorer, allowing it to run undetected whenever Internet Explorer is open. Spyware

succeeds today because information creates value to advertisers such as virus writers.

Toolbars plug into Internet Explorer and provide additional functionality

such as search forms or pop-up blockers. The Google and Yahoo toolbars are probably the most

common legitimate examples and malware toolbars often attempt to emulate their functionality

and look. Malware toolbars almost always include characteristics of the other malware categories

which is usually what gets it classified as malware.

Hijackers take control of various parts of your web browser. Including your home

page, search pages, and search bar. They may also redirect you to certain sites should you

Page 5: Cause and Effect Essay

mistype an address or prevent you from going to a website they would rather you not, such as

sites that combat malware. Some will even redirect you to their own search engine when you

attempt a search. Hijackers almost exclusively target Internet Explorer. Badly infected systems

may require a clean reinstallation of all their software in order to return to full functionality.

There are many PC surveillance tools that allow a user to monitor all kinds of

activity on a computer ranging from keystroke logger, screen capture, snapshots, email phishing,

and chat logging. These tools are often designed for parents, businesses and similar

environments and can be easily abused if they are installed on your computer without your

knowledge.

Companies are becoming more aware and threatened by the fact that their

computers are prone to attack. Virus scanners are becoming necessities on all machines.

Installing and monitoring these virus scanners takes many man hours and a lot of money for site

licenses. Many server programs are coming equipped. Computer fraud and computer crime are

very prevalent issues facing every computer user. This ranges from system administrators to

personal computer users who do work in the office or at home. Computers without any means of

security are vulnerable to attacks from viruses, worms, and illegal computer hackers. If the

proper steps are not taken, safe computing may become a thing of the past. Many security

measures are being implemented to protect against illegalities.

Malware and viruses prevention has become a major issue in the computer world.

They come in many types and come into your computer in many ways. There are ways to protect

your computer from these nasty things. However, you must keep on protecting it and not let your

guard down.

Page 6: Cause and Effect Essay