Type a new keyword(s) and press Enter to search

Analysis of Computer Viruses

 


             dramatically. Researchers at Sophos Incorporated, another virus research center, detected .
             7,189 new viruses in the year 2002 alone, they discovered 25 viruses each day. By the .
             end of 2002 Sophos brought the estimated total of known viruses to more than 78,000 .
             (Fig. 1) (PestPatrol 2; Verton 22). .
             Viruses also have a tendency to affect only certain types of programs or .
             applications. According to Computerworld Magazine, "nine of the top 10 viruses .
             detected by all major virus-protection companies in 2002 were mass-mailing viruses that .
             exploited known vulnerabilities in the Win32 application-programming interface." .
             Shown in fig. 2, when calculated, a total of 40.3% of all viruses reported in March of .
             2003 affected the Win32 application-programming interface. This is a staggering number .
             when considering that there are over 78,000 known viruses. Windows viruses mounted .
             up to 87% of all viruses found in 2002 (Fig. 2) (PestPatrol 2; Verton 22). .
             Definitions of Computer Infections.
             Many different kinds of viruses exist in the world today. Some of the most prominent .
             types would be true computer viruses, worms, Trojan horses, boot sector viruses, and .
             blended threats.
             VIRUS:.
             A true computer virus spreads through a computer by jumping from one program to .
             3.
             another. A computer user has to share information with other users in order for a true .
             virus to spread (Pietromonaco 14).
             WORM:.
             A worm spreads itself the same way as a virus, by infecting separate programs, although, .
             can spread itself through the Internet, World Wide Web, or any other information .
             transferring system (Pietromonaco 14). According to Computerworld Magazine, "the .
             most successful worms act like a Swiss Army Knife, because they can spread by using .
             many different proven methods, such as mass e-mail, Web server vulnerabilities, or peer-.


Essays Related to Analysis of Computer Viruses