Computer Case Study 1 PDF
Computer Case Study 1 PDF
CASE STUDY
The adviser needed to use the platform software that day ensures his clients
participated in a Corporate Action that was closing the following day.
With help from their Business Development Manager, the office worked through the
issue so they we able to log into the platform software to complete this critical work from a
home laptop that hadn’t been infected with the virus.
Find the one (1) causes of the virus and find four (4) how to prevent this type of fraud.
Viruses, Trojan horse and worm are malicious programs that can cause
damage to information and computer. Malicious programs also called as malware is usually
classified into three characteristics which are propagation, mechanism it employs and
mechanism it requires to run.
A worm is like a virus that is designed to copy itself from one computer to
another, but it can travel alone and independently without user action. A great danger of
worms is their ability to replicate in great volume. A worm could send out copies of itself to
everyone listed in your email address book causing heavy network traffic that would slow
down the internet. An example of worm is Melissa.
The difference between worm and virus are worm operates through the
network while virus spreads through any medium. A worm spreads copies of itself as a stand
alone program. Virus spreads copies of itself as a program that attached to other programs.
Worms often infect computers by exploiting bugs in legitimate software. Typically, a high-
profile, trusted web page may be tampered with so it transmits (often invisibly) a carefully
corrupted document file to the user when the page is viewed. The corrupted file causes the
viewer program to crash, opening a door for a malicious program. To avoid/prevent, the
malicious program is usually a downloader which is very small program that later connects to
a remote computer over the internet to download a more substantial piece of malicious
software.
A good anti-virus program can protect to some extent, but it's not enough on
its own as it's hard to keep it up to date. Worms change hourly and it can take a day or more
to create and distribute an anti-virus update. A firewall is needed to help block the worm's
and should always browse the web with restricted rights such as a 'user', never as an
'administrator'. Being careful not to click on attachments or links in email or other messaging
applications that may expose systems to malicious software. Encrypt files to protect sensitive
data stored on computers, servers and mobile devicesBut the most effective way to prevent
worm is to turn off JavaScript for normal web browsing. JavaScript is a powerful tool that
makes websites interactive, and it's increasingly relied on by web designers. But it's also the
most common entry point that worms easily effect the computer.