Research paper topics, free example research papers

Free research papers and essays on topics related to: computer virus

  • 24 results found, view research papers on page:
  • 1
  • 2
  • Computer Virus Technology - 1,778 words
    Computer Virus Technology 2.0 Introduction The wind of change came on 26th March in the form of an email cyclone called Melissa. Moreover, during 1999 numerous changes in the level of computer virus technology were seen, Armstrong (May 2000, p1). From an organisational point of view, societies around the world are just learning about the level of importance that computer security against virus attacks and the critical significance of cybercrime. Companies around the world lost vast amounts of time, money and resources due to the lack of defense systems and lack of knowledge. Companies must ensure that the all data processing equipment like computers, routers and networks are robust and secur ...
    Related: computer security, computer virus, technology, virus, operating system
  • Invasion Of Privacy Computer Virus Internet - 1,505 words
    Invasion Of Privacy Computer Virus Internet The information age is the age we live in today, and with the information age comes an age of ethics. When we deal with the new technologies introduced every day, we need to decide what we must consider ethical and unethical. We must consider all factors so that the use of the information readily available to many persons is not abused. Information technology will be the most fundamental area of ethical concern for business in the next decade. (Ermann) The most widely used tool of the information age is the computer, whether it is a PC or a network of computer systems. As we enter the information age, the newness and power of information technology ...
    Related: computer crime, computer ethics, computer software, computer systems, computer virus, invasion, invasion of privacy
  • Computer Crime - 1,379 words
    Computer Crime Computer Crime Billions of dollars in losses have already been discovered. Billions more have gone undetected. Trillions will be stolen, most without detection, by the emerging master criminal of the twenty-first century--the computer crime offender. Worst of all, anyone who is computer literate can become a computer criminal. He or she is everyman, everywoman, or even everychild. The crime itself will often be virtual in nature--sometimes recorded, more often not--occurring only on the Internet, with the only record being electronic impulses. Before discussing Internet crimes, we can expect to see in the years ahead, let's look at the good news: The most-dreaded types of offe ...
    Related: computer crime, computer software, computer systems, computer virus, crime
  • Computer Crimes - 1,159 words
    Computer Crimes Computer crime started in the early 1970s and has become more and more prevalent. Some computer crime are committed by outside individuals that hack into a computer system. These are the people that usually steal data and cause data loss by vandalism. The most common kind of computer crime is espionage committed by people who work for a company, but this is also the one that you rarely hear about. They usually enter false data that will end up making money for them. Hackers are the worlds new bread of criminals and will soon pose a major threat to the U.S. Because America has become largely a computer society everyone is at risk, experts say, and should protect information ab ...
    Related: computer crime, computer system, computer virus, crime data, exchange commission
  • Computer Security Issues - 883 words
    Computer Security Issues Computer Security Issues Facing Alsager Ltd. In upgrading the Alsager Ltd IT facilities, despite numerous advantages that the new systems brings one has to be made aware of the possible threats posing. Virus can effect the system. They are pieces of codes created by hacker to create a nuisances and to another extreme corrupt valuable data. Examples of these can be animated icons flying pass the computer screen and to another extreme can be programmes designed to delete the hard drive. The Computer Virus can be caught through a number of ways. The most highly publicised way, is through the Internet, other ways are through removable storage media, such as floppy disks ...
    Related: computer networks, computer security, computer virus, security issues, floppy disk
  • Computer Viruses - 550 words
    Computer Viruses Computer Viruses A computer virus is a relatively small program that attaches itself to data and program files before it delivers its malicious act. There are many distinct types of viruses and each one has a unique characteristic. Viruses are broken up into to main classes, file infectors and system or boot-record infectors. A file infector attaches to ordinary programs usually affecting .COM and .EXE files. These two files are subject to infection though some can infect any program from which execution is requested. On the other spectrum, system or boot-record infectors infect executable codes found in certain system areas on a disk, which are not ordinary files. Not only ...
    Related: computer system, computer systems, computer virus, computer viruses, viruses
  • Computer Viruses - 1,281 words
    Computer Viruses Almost every End-user in the world has heard of computer viruses and/or has had one at one point in time. Dont worry if you havent heard about them, you wont find it in your bloodstream. Unfortunately you may find one in your computer memory or disk storage. Some may be as benign as the common cold and others as deadly to your hard drive as the Ebola virus . - 1 -What is a Computer Virus? ~ Usually defined as a malicious code of computer programming it is actually just another software, only written with not so noble intentions. ~ A computer virus is designed to install, reproduce itself and cause damage to computer files and data without the users knowledge or permission. ...
    Related: boot sector viruses, computer programming, computer running, computer security, computer virus, computer viruses, viruses
  • Computer Viruses - 789 words
    Computer Viruses The quote "The only truly secure system is one that is powered off, cast in a lead-lined room with armed guards and even then I have my doubts."(E.H. Spafford) of this report will explain how computer viruses have affected on society and the security of personal computers. There literally hundreds of viruses circulating for personal computers and many anti-viral packages that claim to remove the code from your computer. Some viruses are polymorphic; that is, they change with each infection in an attempt to avoid detection by anti-virus programs. As quickly as someone writes an anti-virus program, someone else writes a new virus that hides more successfully than in the past. ...
    Related: computer virus, computer viruses, computer world, personal computer, viruses
  • Computer Viruses - 1,755 words
    Computer Viruses In the past decade, computer and networking technology has seen enormous growth. This growth however, has not come without a price. With the advent of the "Information Highway", as its coined, a new methodology in crime has been created. Electronic crime has been responsible for some of the most financially devastating victimizations in society. In the recent past, society has seen malicious editing of the Justice Department web page (1), unauthorized access into classified government computer files, phone card and credit card fraud, and electronic embezzlement. All these crimes are committed in the name of "free speech." These new breed of criminals claim that information s ...
    Related: computer crime, computer networks, computer program, computer systems, computer virus, computer viruses, personal computer
  • Computer Viruses - 463 words
    Computer Viruses A computer virus is an illegal and potentially damaging computer program designed to infect other software by attaching itself to any software it contacts. In many cases, virus programs are designed to damage computer systems maliciously by destroying or corrupting data. If the infected software is transferred to or accessed by another computer system, the virus spreads to the other system. Viruses have become a serious problem in recent years, and currently, thousands of known virus programs exist (Reed 85-102). Three types of viruses are boot sector virus, file virus, and Trojan horse virus. A boot sector virus infects the boot program used to start the system. When the in ...
    Related: computer program, computer security, computer system, computer systems, computer virus, computer viruses, viruses
  • Delving Into Computer Crime - 1,113 words
    Delving Into Computer Crime White-collar crime, specifically computer crime, is becoming more popular as computers become more readily available. Crimes using computers and crimes against computers are usually committed without fear of being caught, due to the detachment of the offender from the victim. Computer crime is defined as, "Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of another, manipulation or theft of stored or on-line data, or sabotage of equipment and data."(1). This includes both crimes using computers and crimes against computers. The people who commit these crimes are of a wide variety. Cyber- ...
    Related: collar crime, computer crime, computer networks, computer program, computer system, computer systems, computer technology
  • Homo Superior - 1,967 words
    Homo Superior? War of the Worlds by H.G. Wells Homo-Superior? War of the Worlds by H.G. Wells is a fiction story written about war and mankind's coming of age. It is also a philosophical novel with many deep meanings underlying the shallow looking one-hundred-eighty-eight page book. The subject of this novel is Science Fiction and there are not many that can even compete with Wells in terms of how superior his word descriptions are. He simply does wonders with the imagination of the reader. Obviously the whole book is about the struggle mankind faces, but it is not always with aliens, they are actually more of a good way to represent what Wells really believed. He believed man is dominant, y ...
    Related: homo, science fiction, war of the worlds, first person, ugly
  • In The Article That I Read Was About Hackers It Talked About The Aspects Of How The Youths Of Today Commit This Crime Hacking - 415 words
    In the article that I read was about Hackers. It talked about the aspects of how the youths of today commit this crime. Hacking overall requires the utmost intelligent. These people that become Hackers have special knowledge and skills in computer programming, Internet use, overwhelmingly bright in mathematics and other important factors. A particular person name "Onel de Guzman " is the person responsible for the "Love Bug Virus". This Virus that wreaked havoc on e-mail systems around the world, from the Pentagon to the British Parliament, and caused as much as $15 billion in damage. Guzman configured the virus for a computer project at his college. When the project was handed in and review ...
    Related: crime, hacking, computer programming, computer virus, intelligent
  • On August 2nd, 1990 Iraq Military Forces Invaded And Occupied Kuwait The Order Was Given By Iraqs Dictatorpresident Saddam Hu - 1,367 words
    On August 2nd, 1990 Iraq military forces invaded and occupied Kuwait. The order was given by Iraqs dictator-president Saddam Hussein. His aim was apparently to take control Kuwaits oil reserves (despite its small size Kuwait is a huge oil producer; it has about 10 per cent of the worlds oil reserves). Iraq accused Kuwait of breaking agreements that limit oil production in the Middle East. According to Saddam Hussein, this brought down world oil prices severely and caused financial loss of billions of dollars in Iraqs annual revenue. Saddam Hussein had the nearly hopeless task of justifying the invasion. Iraqi borders were not created until World War 1. There was also a further and more obvio ...
    Related: invaded, iran iraq, iran iraq war, iraq, iraq war, kuwait, military equipment
  • Pokemon Phenomenon - 2,240 words
    ... carnation, these are the ideas presented in Pokmon. We live in a post Christian era in America, and what is coming in is the old paganism, with a vengeance. There are different cards used in the game for ones warfare; They can resemble a supernatural chicken fight. Machop, Machoke, Machamp are all fighters. Machoke is the final stage of evolution for Machop.There are 151 Pokmon (Pocket Monsters) that must be engaged in battle and defeated. Many of these evolve, some to the fourth level, into other creatures more powerful than the original Pokemon. They possess different levels of power and can become more powerful with the use of crystals, thunderstones, and other evolving techniques Evo ...
    Related: phenomenon, left hand, different levels, young child, intelligence
  • Polymorphic - 1,867 words
    Polymorphic & Polymorphic & Cloning Computer Viruses The generation of today is growing up in a fast-growing, high-tech world which allows us to do the impossibilities of yesterday. With the help of modern telecommunications and the rapid growth of the personal computer in the average household we are able to talk to and share information with people from all sides of the globe. However, this vast amount of information transport has opened the doors for the computer virus of the future to flourish. As time passes on, so-called viruses are becoming more and more adaptive and dangerous. No longer are viruses merely a rarity among computer users and no longer are they mere nuisances. Since many ...
    Related: artificial intelligence, computer viruses, high tech, floppy, classroom
  • Society And It - 878 words
    Society And IT Discuss the Threats and Causes of Failure, and Steps Taken to Minimise it. In todays world it is impossible to run a large organisation without the aid of computers. Businesses hold massive amounts of important data, hospitals hold large amounts of confidential patient information and large scientific research projects hold important codes, formulae, and equations. The bottom line is that loss or corruption of this information is sure to result in bankruptcy, a substantial loss of customers, and even world-wide financial meltdown. A dependency on technology is impossible to avoid even with its fatal consequences. Companies face the worry of information lost through hacking, v ...
    Related: world wide, computer viruses, cornell university, viruses, stephen
  • The Bulgarian And Soviet Virus Factories - 4,622 words
    The Bulgarian and Soviet Virus Factories The Bulgarian and Soviet Virus Factories ======================================== Vesselin Bontchev, Director Laboratory of Computer Virology Bulgarian Academy of Sciences, Sofia, Bulgaria 0) Abstract =========== It is now well known that Bulgaria is leader in computer virus production and the USSR is following closely. This paper tries to answer the main questions: Who makes viruses there, What viruses are made, and Why this is done. It also underlines the impact of this process on the West, as well as on the national software industry. 1) How the story began ====================== Just three years ago there were no computer viruses in Bulgaria. Afte ...
    Related: bulgarian, computer virus, soviet, soviet union, virus, virus protection
  • The Bulgarian And Soviet Virus Factories - 4,639 words
    ... them with a debugger (YANKEE DOODLE) both are viruses, made in our country. - Hiding the true file length usually causes problems, because CHKDSK is able to detect the difference between the disk space marked as used in the FAT and the reported file length. Only two Bulgarian viruses in the world are able to handle this problem --- DIAMOND and V2100. - The first really "stealth" file infector --- the 512 virus was Bulgarian. It is true however, that the idea has been discovered independently almost at the same time in other parts of the world (the 4096 virus from Israel). - The only known stealth parasitic virus, which "stealthy" features go down to the BIOS level (i.e., it cannot be det ...
    Related: bulgarian, computer virus, soviet, soviet union, virus, virus protection
  • The Computer Underground - 2,123 words
    The Computer Underground. The beginning of the electronic communication revolution that started with the public use of telephones to the emergence of home computers has been accompanied by corresponding social problems involving the activities of so-called "computer hackers," or better referred to as the computer underground (CU). The CU is composed of computer aficionados who stay on the fringes of legality. The CU is composed of relatively intelligent people, in contrast to the media's description of the ultra intelligent and sophisticated teenage "hacker." The majority have in common the belief that information should be free and that they have "a right to know." They often have some amou ...
    Related: computer crime, computer hacking, computer industry, computer security, computer system, computer systems, computer virus
  • 24 results found, view research papers on page:
  • 1
  • 2