Sunteți pe pagina 1din 8

A computer virus is a computer program that can copy itself and infect a

computer without permission or knowledge of the user. The term "virus" is


also commonly used, albeit erroneously, to refer to many different types of
malware and adware programs. The original virus may modify the copies, or
the copies may modify themselves, as occurs in a metamorphic virus. A virus
can only spread from one computer to another when its host is taken to the
uninfected computer, for instance by a user sending it over a network or the
Internet, or by carrying it on a removable medium such as a floppy disk, CD, or
USB drive.
 Meanwhile viruses can spread to other computers by infecting files on a
network file system or a file system that is accessed by another computer.
Viruses are sometimes confused with computer worms and Trojan horses. A
worm can spread itself to other computers without needing to be transferred as
part of a host, and a Trojan horse is a file that appears harmless. Worms and
Trojans may cause harm to either a computer system's hosted data, functional
performance, or networking throughput, when executed. In general, a worm
does not actually harm either the system's hardware or software, while at least
in theory, a Trojan's payload may be capable of almost any type of harm if
executed. Some can't be seen when the program is not running, but as soon as
the infected code is run, the Trojan horse kicks in. That is why it is so hard for
people to find viruses and other malware themselves and why they have to use
spyware programs and registry processors.
Advantage and factors involving risk on the following topics

 Computer viruses are small software programs that are designed to spread
from one computer to another and to interfere with computer operation.
 A virus might corrupt or delete data on your computer, use your e-mail program
to spread itself to other computers, or even erase everything on your hard disk.
 Viruses are most easily spread by attachments in e-mail messages or instant
messaging messages. That is why it is essential that you never open e-mail
attachments unless you know who it's from and you are expecting it.
 Viruses can be disguised as attachments of funny images, greeting cards, or
audio and video files.
 Viruses also spread through downloads on the Internet. They can be hidden in
illicit software or other files or programs you might download.
State any laws and the punishment of the crime enforce by
the law makers

 Republic Act 8792, signed into law last June 14, 2000, is a landmark law in the
history of the Philippines. Not only has this bill made the country a legitimate
player in the global marketplace. The Philippine Internet community has played
a major role in pushing for its passage. The law took effect last June 19, 2000.
 With the Philippines relaxed stock market listing rules plus a proposed vibrant
investment priorities program in place, Filipinos here and abroad and its foreign
partners have something to look forward for.
 Here's the salient features of RA8792:
 It gives legal recognition of electronic data messages, electronic documents,
and electronic signatures.
 Allows the formation of contracts in electronic form.
 Makes banking transactions done through ATM switching networks absolute
once consummated.
 Parties are given the right to choose the type and level of security methods that
suit their needs.
 Provides the mandate for the electronic implementation of transport documents
to facilitate carriage of goods. This includes documents such as, but not limited
to, multi-modal, airport, road, rail, inland waterway, courier, post receipts,
transport documents issued by freight forwarders, marine/ocean bill of lading,
non-negotiable seaway bill, charter party bill of lading.
 Mandates the government to have the capability to do e-commerce within 2
years or before June 19, 2002.
 Mandates RPWeb to be implemented. RPWeb is a strategy that intends to
connect all government offices to the Internet and provide universal access to
the general public. The Department of Transportation and Communications,
National Telecommunications Commission, and National Computer Center will
come up with policies and rules that shall lead to substantial reduction of costs
of telecommunication and Internet facilities to ensure the implementation of
RPWeb.
 Made cable, broadcast, and wireless physical infrastructure within the activity
of telecommunications.
 Empowers the Department of Trade and Industry to supervise the development
of e-commerce in the country. It can also come up with policies and
regulations, when needed, to facilitate the growth of e-commerce.
 Provided guidelines as to when a service provider can be liable.
 Authorities and parties with the legal right can only gain access to electronic
documents, electronic data messages, and electronic signatures. For
confidentiality purposes, it shall not share or convey to any other person.
 Hacking or cracking, refers to unauthorized access including the introduction
of computer viruses, is punishable by a fine from 100 thousand to maximum
commensurating to the damage. With imprisonment from 6 months to 3 years.
 Piracy through the use of telecommunication networks, such as the Internet,
that infringes intellectual property rights is punishable. The penalties are the
same as hacking.
 All existing laws such as the Consumer Act of the Philippines also applies to e-
commerce transactions.
Actions taken on such risk on the company concern the
government and you.

 Many users install anti-virus software that can detect and eliminate known
viruses after the computer downloads or runs the executable. There are two
common methods that an anti-virus software application uses to detect viruses.
The first, and by far the most common method of virus detection is using a list
of virus signature definitions. This works by examining the content of the
computer's memory (its RAM, and boot sectors) and the files stored on fixed or
removable drives (hard drives, floppy drives), and comparing those files against
a database of known virus "signatures". The disadvantage of this detection
method is that users are only protected from viruses that pre-date their last
virus definition update. The second method is to use a heuristic algorithm to
find viruses based on common behaviors. This method has the ability to detect
viruses that anti-virus security firms have yet to create a signature for.
 Some anti-virus programs are able to scan opened files in addition to sent and
received e-mails 'on the fly' in a similar manner. This practice is known as "on-
access scanning." Anti-virus software does not change the underlying
capability of host software to transmit viruses. Users must update their
software regularly to patch security holes. Anti-virus software also needs to be
regularly updated in order to prevent the latest threats.
 One may also minimise the damage done by viruses by making
regular backups of data (and the Operating Systems) on different
media, that are either kept unconnected to the system (most of the
time), read-only or not accessible for other reasons, such as using
different file systems. This way, if data is lost through a virus, one
can start again using the backup (which should preferably be
recent). If a backup session on optical media like CD and DVD is
closed, it becomes read-only and can no longer be affected by a
virus. Likewise, an Operating System on a bootable can be used to
start the computer if the installed Operating Systems become
unusable. Another method is to use different Operating Systems on
different file systems. A virus is not likely to affect both. Data
backups can also be put on different file systems. For example,
Linux requires specific software to write to NTFS partitions, so if one
does not install such software and uses a separate installation of
MS Windows to make the backups on an NTFS partition, the backup
should remain safe from any Linux viruses. Likewise, MS Windows
can not read file systems like ext3, so if one normally uses MS
Windows, the backups can be made on an ext3 partition using a
Linux installation.
Implementation on law enforcers

 There is no implementation for law enforcers on viruses since the program is a threat
to sensitive files and information.

S-ar putea să vă placă și