You are on page 1of 1

Foundations of Computer SecuritY its destructive function, then starts its host program.

A
Trojan horse does not replicate itself and does not infect
Seven Classes of Computer Security and Crime
other programs or files; its damage is localized
Insiders overt Overt actions by insiders are often
A tapeworm is a parasite that lives inside the body of a
performed by disgruntled employees and result in
bigger creature and sustains itself from its host’s
destruction of data and equipment.
resources. A software worm is a program that executes
Insiders covert. Generally, insiders have more independently of other programs, replicates itself and
information about a place of work than outsiders, which is spreads through a network from computer to computer.
why they can wreak more havoc.
Insiders unintended. Employees make errors and can Virus Writers
also neglect their duties. Consequently, this class
1. Malicious intent. Such a person simply wants to
encompasses actions such as wrong inputs, wrong data,
do damage and cause harm.
damage as a result of extreme temperatures or other
2. Aggression. An aggressive person needs a way
harsh conditions, and interruption of vital services.
to vent their aggression, and virus writing is as
Outsiders overt. Physical attacks on computer and
good as any other outlet.
network facilities belong in this class as are also DoS
3. Contempt for all authority. In science there is no
attacks.
authority, but in other aspects of life we often
Outsiders covert. This wide class consists of the various
have to bow to authority for the public good.
types of rogue software sent from the outside to a
4. Develop skills. A programmer hears about
personal computer or to a large computer facility.
software vulnerabilities and how they are
Outsiders unintended. It is fairly rare that an outsider
exploited by viruses.
will harm a computer or data unintentionally.
5. Hobby and experiment. A programmer hears
Finally, there are accidents. They always happen, not
about viruses and decides to learn more about
just in the computing field. Accidents are caused either by
this unconventional field of programming.
nature, such as earthquake or flood, or indirectly by
6. Looking for acceptance in the underground
humans.
fraternity of virus writers. Someone who wants
Computer security threats and problem to become a professional programmer but is
Physical security. A personal computer can be stolen. A rejected by potential employers, may resort to
large computer center can be broken into and equipment becoming a respected member of the
taken. underground.
Rogue software. We have all heard of computer viruses. 7. The thrill and rush of adrenalin. A youngster
Small, sneaky programs that invade our computers and who manages to shut down an important
spread quickly and silently. commercial server, release a “successful” virus,
or break into a secret government computer
Most computers are connected to networks, and most enjoys a rare feeling of power.
local networks are connected to the Internet. Thus, there 8. Enjoying the notoriety. It’s not hard to imagine
is a large class of computer security threats that are the pride felt by an unknown (and possibly
related to networks and fall under the category of network frustrated) person on seeing their virus listed in
security. This wide area antivirus software programs.
of security includes threats such as port scanning, 9. Out of frustration. Personal frustration (see
spoofing, password cracking, spyware, and identity profiles below about the lack of girlfriends) often
theft. provides a good reason for someone to release
Computer Viruses malicious software.
A biological virus (from the Latin for poison) is a shell 10. Political convictions. Someone living in an
filled with occupied or politically repressed country may take
genetic material that it injectsintoalivingcell, out his frustration on others and feel powerful by
therebyinfectingit. releasing a virus.
Thecellthenstartsmanufacturingcopiesof the virus. A 11. Social injustice. Someone who lives in a poor
computer virus behaves similarly. country or neighborhood may likewise feel better
The term malware (slang for malicious software) is when he knows that others suffer too.
also commonly used for rogue software. Malware is any 12. Let someone else do the dirty job. There are
type of software designed specifically to disrupt a Web sites with virus source codes written by
computer or its operations. This includes viruses, worms, programmers who wait for someone else to copy
and Trojan horses, but also spyware and adware. their code, perhaps modify it, and release it.
13. Teach security personnel a lesson. Yes, let
A virus is a malicious program that resides inside them learn once and for all how to protect their
another program (its host). When the host is executed, precious computers and other equipment.
the virus also executes. It tries to replicate itself by
storing copies of itself in other programs.
A Trojan horse is a piece of software (normally malicious)
hidden inside an innocuous program. The horse performs

You might also like