Question

In: Computer Science

With respect to the C.I.A. and A.A.A. concepts, what risks are posed by computer viruses?

CIA

Confidentiality - The avoidance of the unauthorized disclosure of information

Integrity - The property that information has not be altered in an unauthorized way

Availability - The property that information is accessible and modifiable in a timely fashion by those authorized to do so

AAA

Assurance - How trust is provided and managed in computer systems

Authenticity - The ability to determine that statements, policies, and permissions issued by persons or systems are genuine.

Anonymity - The property that certain records or transactions not to be attributable to any individual

With respect to the C.I.A. and A.A.A. concepts, what risks are posed by computer viruses?

Solutions

Expert Solution

A computer virus is a software program that has been created to cause a user grief, spread to other computers, or destroy data on an individual's computer. To help prevent a computer from becoming infected by a virus, software developers have developed antivirus programs that stay active on the computer helping to protect it.

“Malware” that can infect a computer by modifying or deleting data files, boot sector of a hard disk drive or causes a software program to work in an unexpected manner

Computer virus cannot damage computer hardware. IT may cause many damages to a computer system. A virus can:

  1. A computer virus can damage data or software on the computer.
  2. It can delete some or all files on the computer system.
  3. It can destroy all the data by formatting hard drive.
  4. It may display a political or false message very few times.

A simple virus that can make a copy of itself over and over again is relatively easy to produce.Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems

Viruses can be spread through email and text message attachments, Internet file downloads, social media scam links, and even your mobile devices and smartphones can become infected with mobile viruses through shady App downloads. Viruses can hide disguised as attachments of socially shareable content such as funny images, greeting cards, or audio and video files.

When attack of virus is seen then all the Intigrity,Confidentiality are broken. The personal detail of a person can be attacked and can damage various files can be damaged.A virus can modify he details of any document which is been saved in the system


Related Solutions

With respect to the C.I.A. and A.A.A. concepts, what risks are posed by spam?
CIAConfidentiality - The avoidance of the unauthorized disclosure of informationIntegrity - The property that information has not be altered in an unauthorized wayAvailability - The property that information is accessible and modifiable in a timely fashion by those authorized to do soAAAAssurance - How trust is provided and managed in computer systemsAuthenticity - The ability to determine that statements, policies, and permissions issued by persons or systems are genuine.Anonymity - The property that certain records or transactions not to be...
With respect to the C.I.A. and A.A.A. concepts, what risks are posed by trojan horses?
CIAConfidentiality - The avoidance of the unauthorized disclosure of informationIntegrity - The property that information has not be altered in an unauthorized wayAvailability - The property that information is accessible and modifiable in a timely fashion by those authorized to do soAAAAssurance - How trust is provided and managed in computer systemsAuthenticity - The ability to determine that statements, policies, and permissions issued by persons or systems are genuine.Anonymity - The property that certain records or transactions not to be...
With respect to the C.I.A. and A.A.A. concepts, what risks are posed by packet sniffers, which monitor all the packets that are transmitted in a wireless Internet access point?
CIAConfidentiality - The avoidance of the unauthorized disclosure of informationIntegrity - The property that information has not be altered in an unauthorized wayAvailability - The property that information is accessible and modifiable in a timely fashion by those authorized to do soAAAAssurance - How trust is provided and managed in computer systemsAuthenticity - The ability to determine that statements, policies, and permissions issued by persons or systems are genuine.Anonymity - The property that certain records or transactions not to be...
With respect to the C.I.A. and A.A.A. concepts, what risks are posed by someone making so many download requests from an online music store that it prevents other users from being able to download any songs?
CIAConfidentiality - The avoidance of the unauthorized disclosure of informationIntegrity - The property that information has not be altered in an unauthorized wayAvailability - The property that information is accessible and modifiable in a timely fashion by those authorized to do soAAAAssurance - How trust is provided and managed in computer systemsAuthenticity - The ability to determine that statements, policies, and permissions issued by persons or systems are genuine.Anonymity - The property that certain records or transactions not to be...
Describe how acidification acts to increase the risks to the environment and human health posed by...
Describe how acidification acts to increase the risks to the environment and human health posed by cadmium, lead and mercury. (10)
the risks being posed to the banking sector because of the Covid 19 1000 words. Give...
the risks being posed to the banking sector because of the Covid 19 1000 words. Give the main points. Write as much as you can
What are the security risks involved in allowing cookies to be stored on your computer?
What are the security risks involved in allowing cookies to be stored on your computer?
1)exlplain in short what does network security means 2) what is computer viruses? 3) how does...
1)exlplain in short what does network security means 2) what is computer viruses? 3) how does computer virus spread? 4) What is a worm? 5) How does worms spread? 6)Detailed difference between viruses and worms? 7) What is the use of viruses and worms in network security and who uses them? 8)How to prevent virus and worm infection?
1. What is meant by malware/viruses? What is their history? Are malware and/or viruses recent developments...
1. What is meant by malware/viruses? What is their history? Are malware and/or viruses recent developments in computer technology or have they been around for a while? What piece of malware/virus are choosing to write about and why?  
Reactive Oxygen Species (ROS) appear to have anti-replication properties with respect to viruses.  Bats with a high...
Reactive Oxygen Species (ROS) appear to have anti-replication properties with respect to viruses.  Bats with a high metabolism appear to suppress viral load because of this. Can you recall from earlier elements how metabolism generates ROS?  Explain.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT