‘VIRUS’ is an acronym for Vital Information Resources under Seize. A computer virus is a piece of code which is capable of copying sensitive information from a computer or completely destroying the data. A virus has the potential to cause unexpected changes or damages to systems, such as corrupting the system software or permanently damaging hard disk, without the user’s knowledge.
A virus can be spread through an email attachment, by clicking on an executable file or an infected website or advertisement. It can also spread all the way through storage devices like flash drives or USB drives. The moment a virus takes a host, it infects the entire system software or resource and modifies the core functions of applications or may copy, delete and encrypt the data. Some viruses begin to spread as rapidly as they infect the host, but other viruses remain stable, without showing major signs or symptoms of existence in a system. It gets triggered only when an instruction code is executed by the gadget or system.
In 1971, Robert Thomas, an engineer at BBN Technologies developed the first computer virus known as the "Creeper" virus, which was an experimental program, reports TechTarget.
Some viruses are designed intentionally with financial gains in mind, while others can have deep and damaging effects, such as erasing data or causing permanent damage to the hard disk.
To avoid contact with a virus it is important to be cautious while surfing the web, downloading files, and opening links or attachments. The best method is to avoid downloading text or email attachments or files from websites that look suspicious.
Mastering the challenge of Digital Transformation
White Paper By: Software AG
Digital business transformation is based on an IT architecture transformation with a roadmap for digital capability implementation. Based on the software platforms, digital companies create enhanced or totally new business models which offer completely new digital customer experiences. Established companies are building up software know-how and are acquiring software companies to accelerate...
The Top 5 Ways Publishers Can Be Successful in the Digital World
White Paper By: Iptor Supply Chain Systems
In the publishing industry, the rise of technology has extended beyond publishers simply digitizing content for those readers who prefer ebooks or online learning systems to print—forcing businesses to adapt their processes and products to accommodate new customer demand. In this new age, technology has allowed for many of these processes to be streamlined or automated, allowing for...
Compliance and Beyond: Future-proofing your password policy
White Paper By: SPECOPS
With password security policies and best practices in constant flux, our effectiveness in safeguarding our organization requires scrutiny. Unfortunately, the regulatory bodies we must abide by do not always pave a clear direction. This is where our own judgment must fill in the gaps. When it comes to password security policy, it is always a good rule of thumb to take a segmented approach...
Product Authentication In The Digital Age
White Paper By: i-Sprint Innovations
Product Authentication technologies are essential in the digital age to all genuine products and packaging. The proliferation of e-Commerce has forced manufacturers to look beyond traditional brick-and-mortar stores for cost-effective means to product's authenticity or select further product information. Digital solutions for product authentication do not require any additional...
Plantronics Manager Pro Security Overview
White Paper By: Plantronics
Plantronics takes security seriously and understands how important the responsibility of safeguarding data is to the customers, and takes comprehensive measures to protect them. Plantronics contracts with respected security firms who perform regular audits of the Plantronics Manager Pro services to verify that its security practices are sound, and to monitor its services for new...
Managing the safety, health and security of mobile workers: An occupational safety and health practitioner’s guide
White Paper By: The International SOS Foundation and IOSH
Ensuring health and security of workers are complex and ever-evolving subjects, encompassing medical, legal, security, business continuity, financial and reputational considerations. There is a need to have clear organizational policies and strategies in place as well as competent individuals to manage the travel security, health and safety for all travelers with a view to reducing risks and...