Saturday, April 11, 2020

Computer Security Against Viruses and Hacking Essays - Security

Computer Security Against Viruses and Hacking Viruses, worms, Trojan horses, and hacking are all security issues in our computer network. Each of these malwares or programs attaches and spreads in different ways. Through hacking hackers can infect computers with various types or malware and viruses. This paper will explain what viruses are, how it occurs and the types of cybercrimes that can result from it, and how to better protect your computer. "Security warning! Application cannot be encrypted or Spyware alert! Your computer is infected by spyware. Do you want to activate your antivirus software now?" These are usually the messages that appear on your computer when it is infected by a virus. These are the types of viruses and message traps that hackers attempt to use to scam users into buying false antivirus software. Each type of these infectious malwares and programs by hackers are different and occur in various ways. Viruses and hacking have a major impact on two main topics discussed in Computer Information Technology 110 (CIT 110). The topics are data security and operating systems. Through the infection of computer viruses and hacking, the computer's operating system can malfunction, and data's security becomes vulnerable to loss or theft by hackers. As explained in Catherine LaBerta's Computers Are Your Future textbook, the operating system (OS) is a "set of programs designed to manage and control the resources of a computer" ( Laberta 111). A virus infection can impede operating system from properly function. This usually occurs when the virus is preventing the OS from opening any antivirus software. People often confuse viruses for another type of malware or program such as worms and Trojan horses. As described by CommonCraft in Computer Viruses and Threats, a virus is a program intended to spread from computer to computer through infected files or USB drives while multiplying on the way and generally lead to the loss of files or the spread of spam emails. Computer worms are similar to a virus, but they typically spread within networks and can occur without the user performing a causing action. A Trojan horse is a program designed to be disguised to the user by appearing to be a "game or useful software" tricking the user into downloading the virus ( CommonCraft ). These malicious programs are designed by hackers to steal information from the computer user. The term hacker is often misunderstood for a cracker is a computer user who breaks into someone else's computer or highly secured networks for recreational purposes or to cause harm, such as viruses. A hacker is a highly intelligent individual who creates computer software and hardware. Additionally, Laberta defines a hacker as a computer user who enjoys testing his or her computer skills to the limit by applying ingenious tactics to solving problems ( Laberta 521). Due to computer hackers like Kevin Mintnick and Kevin Poulsen who used hacking for criminal reasons have caused the use of the terms has changed. Our society has construed a hacker to be the same has a cracker and therefore, through society interpretation a hacker is a criminal. In the early 1970's phone hacking was a common thing. Computer hobbyist, John Draper determines that a toy whistle included in a box of cereal identically reproduces the same 2600-hertz audio tone required to open a telephone line and begin making free long-distance calls. Three years later, two members of California's "Homebrew Computer Club" begin making "blue boxes", which was discovered based off of Draper's discovery. The blue boxes would generate different tones that would allow hackers to hack into phone systems. Those two men Steve Jobs and Steve Wozniak went on to become the founders of Apple Computers. In the 1980's was when one of the first FBI hacking busts was seen in Milwaukee. They were a group known as the 414's (the local area code). The members were accused of some 60-computer break-ins. Soon after, the Comprehensive Crime Control Act was formed, and it gave the Secret Service jurisdiction over credit card fraud, as well as computer fraud. In the early 90's law enforcements began a national crackdown on hackers after ATT had crashed on Martin Luther King Day. Most of the