AllBestEssays.com - All Best Essays, Term Papers and Book Report
Search

The Virtual Threat to Information Security

Essay by   •  June 24, 2012  •  Essay  •  797 Words (4 Pages)  •  1,759 Views

Essay Preview: The Virtual Threat to Information Security

Report this essay
Page 1 of 4

Title: The Virtual Threat to Information Security

Topic: Computer Viruses

General Purpose: To Inform

Specific Purpose: To inform my audience on computer viruses.

Thesis Statement: Knowledge about computer viruses is important because this information can help in times of uncertainty and protect in times of vulnerability.

Introduction

Attention Material: Picture this its finals week you have completed all your projects, research papers, study guides, or whatever you may have had to do. It's time to relax you just have to print everything off and turn it in to your professor. When you go to turn on your computer a blank screen pops up and in white writing you see computer hard drive damage shutting down in 10 seconds. You frantically try to turn on the computer over and over but nothing changes. Then your heart drops to your feet when you realize all of that hard work you did was for nothing. This is the type of situation a computer virus can put you in. The 2012 Norton cybercrime report revealed that there were $388 billion in real money losses and computer time in the past year.

Thesis Statement: Knowledge about computer viruses are important because this information can help in times of uncertainty and protect in times of vulnerability.

Preview: I will explain three things today which include what is a computer virus, computer virus symptoms, and how to protect your computer from catching a virus.

Transition: First, I would like to talk about what is a computer virus.

Body

I. Main point: What is a computer virus?

A. According to the security page on Microsoft.com a computer virus is a small program that is designed to spread from one computer to another and to interfere with computer operation.

1. A virus can delete computer files, spread private information to others, or cause computer malfunctions.

2. A virus can be downloaded from the internet, posted with an email attachment, or hidden with-in audio and video files.

B. Common computer viruses are keyloggers, Trojan horses, and computer worms.

1. A keylogger monitors all input on a computer and saves the information to a file such as passwords and credit card information.

2. A Trojan horse appears harmless because it claims to do one thing but instead does damage when it is started up for example; erasing you hard drive.

3. A computer worm self-replicates and sends copies of itself to other computers.

4. In 2004 the worst worm ever created named the MyDoom's Mass Infection slowed global internet access by 10 percent and led to $38 billion in damages. (McAfee's Decade of Cybercrime)

Transition: Next, I want to talk about computer virus symptoms.

II. Second main point: Computer virus symptoms.

A. Look for obvious changes on you computer.

1. Pay attention to your desktop, favorites, or the way your computer acts in general.

2. On the virus symptoms page of Kaspersky.com I read that you should look out for unexpected sounds, played

...

...

Download as:   txt (5.5 Kb)   pdf (87.4 Kb)   docx (11.2 Kb)  
Continue for 3 more pages »
Only available on AllBestEssays.com
Citation Generator

(2012, 06). The Virtual Threat to Information Security. AllBestEssays.com. Retrieved 06, 2012, from https://www.allbestessays.com/essay/The-Virtual-Threat-to-Information-Security/29382.html

"The Virtual Threat to Information Security" AllBestEssays.com. 06 2012. 2012. 06 2012 <https://www.allbestessays.com/essay/The-Virtual-Threat-to-Information-Security/29382.html>.

"The Virtual Threat to Information Security." AllBestEssays.com. AllBestEssays.com, 06 2012. Web. 06 2012. <https://www.allbestessays.com/essay/The-Virtual-Threat-to-Information-Security/29382.html>.

"The Virtual Threat to Information Security." AllBestEssays.com. 06, 2012. Accessed 06, 2012. https://www.allbestessays.com/essay/The-Virtual-Threat-to-Information-Security/29382.html.