Sunteți pe pagina 1din 3

Report for ABC Estate Agency:

This report contains effects caused by the viruses, malware and malicious software
etc. On Information systems while uploading data from customer side or over
internet on servers. With detail descriptions of types of viruses and ways to stop or to
block these computer viruses in entering into company’s information systems.

Today’s business competitive scenario, all companies are trying to develop strong
customer relation by developing information systems, so that they can reach
customer very frequently in less time without using much resources. Creating web
services for customer is best for companies to reach customer or vice-versa;
however, web-services are based on internet which provides open communication
globally and internet is uncontrolled medium which is accessible from all over the
world, and because of its uncontrolled and unmanaged nature its creates threats for
the information systems like viruses, spyware, malicious software etc.

What is a computer virus?

Computer viruses are same as biological viruses and contain same characteristics
like small, duplicate their copies and exist with only host. Computer viruses are
computer programs which is created programmers either for fun or to harm computer
systems by manipulating or deleting data from servers hard drive, installing malicious
programs, allowing hackers to take control over computer etc.

How computer viruses spread?

Computer viruses spread in two phases:

(i) Infection Phase: In this phase, computer viruses start infecting computer by
duplicating its copies. Some viruses tries to install themselves in mostly
used resident software’s so that they can spread at very fast rate
whenever resident programs run.

(ii) Attack Phase: In this phase, computer viruses start attacking computer by
corrupting or deleting hard drive data, slowing down computer system,
automatically installing malicious software, enabling hackers to hi-jack
computers etc.

Kinds of computer viruses and their effects:

Code Red Worm – It was a computer worm which was first noticed in July, 2001
which also called as ‘Server Jamming Worm’. This worm was released on 13 July,
2001 but larger group of computer was seen affected on 19 July, 2001 and infected
hosts figure reached around 359,000 (Moore ; Shannon, 2001).

Trojan horse – Trojan horse is a malware program that contains several programs
and codes which affects computer and acts as virus. I allows hackers to gain full
access over computer and manipulate files. “Trojan-type malware is on the rise,
accounting for 83-percent of the global malware detected in the world” (Bit Defender,
2009)

In order to safeguard web services from virus threats and making it more robust,we
need to imply following measures:

(i) Antivirus software : Anti-virus software is a program which is designed to


search virus in harddrive or computer and protect computer against
incomining viruses. These program timely monitored flow of data and
programs and if they found any suspicious activity, it informs user or
computer administrator. Anti-virus programs requires update on regular
basis to protect systems from newly generated viruses.

(ii) Firewall: Firewall works as a wall between LAN and Internet. It monitored all
incoming and outgoing communication and keep track of files which is
entering in or going out. Installing firewall in network is mandatory in
today’s computing and business enterprises and its best way to keep
network safe and monitored.

(iii)Educate: We need to provide information to the users regarding safe


practises while operating web services, So that they can’t do anything
wrong intentionally or unintentionally.

(iv) Authentication: It’s emphasis on uses of advanced identification


protocols like encrypted passwords, security questions, biometrics to
confirm users identities. These protocol is very helpful in blocking
unwanted access in the network.

Conclusion : In order to run successful web services in nowadays’ business


environment, we need to take care of the above mentioned threats by using
advanced antivirus softwares, firewall and sophisticated identification protocols.
Robust web-services shows company’s dedication towards customer service and
customer feel trust while using company’s resources if they ensure with the safety
measures used by the company.

References:

- Abdul Aziz Al-Hariri, Youssef Shaaban, Zeina Moukadem, Ghassan Bouari (2005).
E-commerce: Virus Threats and Precautions. Beirut.
- Moore, David; Colleen Shannon (2001?). "The Spread of the Code-Red Worm (CRv2)". . Accessed
03/10/2006 from CAIDA Analysis. http://www.caida.org/research/security/code-
red/coderedv2_analysis.xml

- Securing your E-Commerce System. (n.d.). Accessed 2/11/2010, from Business Link:
http://www.businesslink.gov.uk/bdotg/action/detail?
r.s=m&r.l1=1073861197&r.lc=en&r.l3=1075385383&r.l2=1073866263&type=RESOURCES&ite
mId=1075385962

- Bit Defender. Accessed 2/11/2010, from Bit Defender: http://news.bitdefender.com/NW1094-


en--BitDefender-Malware-and-Spam-Survey-finds-E-Threats-Adapting-to-Online-Behavioral-
Trends.html
- Tina L. Douglas, Threats and Solutions For the E-Commerce of Today, Accessed 28/10/2010
http://ezinearticles.com/?Threats-and-Solutions-For-the-E-Commerce-of-Today&id=4413151