You are on page 1of 27

INFORMATIVE SPEECH

PREPARED BY :
MUHAMMAD SYARIFUDDIN BIN KASSIM

PREPARED FOR :
MADAM AINUL RUSMIN BINTI GHAZALI

DATE :
16TH NOVEMBER 2020
INFORMATIVE SPEECH DRAFT TEMPLATE
(Describing chart[s] and/or graph[s])

Name: Muhammad Syarifuddin bin Kassim Topic: Computer virus

Student ID: 2020614252 Group: EH2201A

This exercise requires you to provide an outline for your informative speech by filling in the
following template.

The outline of your speech should include:


● introduction,
● description and analysis of chart(s) and/or graph(s),
● conclusion and recommendation.

In this exercise, you need to choose at least one chart and/or graph related to your topic.
Describe the important data (facts and figures) and the salient features of the data from the
chosen chart(s) and/or graph(s). You are also required to choose at least one article related
to your topic. Select relevant information from the chosen article(s) to provide some
supporting information for the data.

Introduction
Introduce topic Most of the people nowadays must have their own personal
computer as we are living in the cyber era. I assume that everyone
have known the term computer virus. I am sure that all of you had
experienced this problem at least once in your lifetime and it can be
a really big deal.

Credibility First and foremost, what is computer virus? A computer virus is a


type of software or code that has been written to alter computer
behavior and is created to spread all over the computer. By adding
itself to a program or document to execute its code, a virus will be
operated. Once virus code executed, the computer will be infected
causing the programs and data to be destroyed.

Background of topic I did a research about the first academic work published entitled
‘Theory of self reproducing Automata’ by Von Neumann states that
computer programme can copy and alter themselves automatically.
The theory proved that computer virus can multiply themselves by
executing the code to another device.

In 1980’s the world’s first computer virus case appeared in Apple 2


device. The virus was originated from the floppy disk and spread
throughout the computer device.

Central Idea We will look through two types of computer virus which are the ‘I
Love You’ virus and the Stuxnet virus.
Body
(Describing chart[s] and/or graph[s])
Description of data 1. This graph shows different types of computer virus and their
impacts on money ($).
(Chart 1)
Analysis of data 2. There are three types of computer virus that cause the
highest loss of money ($).
(Chart 1)
3. One of them is the ‘I Love You’ virus.

4. According to Frank Prince, “Love Bug’ Redux: Keeping Alert


to Danger,” Community Banker Journal, (June 2000): 45,
“Within twenty-four hours three million computers had been
infected and within a week there were already more than 45
million computers unusable”.

Description of data 1. This is a graph of number of new malware specimen versus


year.
(Chart 2)
2. Based on the graph, number of new malware specimen
increases gradually by year.

3. We are adviced to be more careful and take suitable


countermeasure to prevent from the malware.

Conclusion
Conclusion Today, I have shared about two types of computer virus
which are the ‘I Love You’ virus and the Stuxnet virus.

Recommendation In conclusion, the computer virus is much more hassle than we


thought as it can bring a lot of harm and damages. I would suggest
to install the antivirus software and always scan your USB device
before transferring data into your own computer.
Chart used in the speech

Chart 1

Graph shows different types of computer virus and their impacts on


money ($).

Chart 2
Graph shows number of new malware specimen versus year

Articles used
Article 1

Alison Grace Johansen (2020, July 23) What is computer virus - US.Norton
Retrieved from https://us.norton.com/internetsecurity-malware-what-is-a-computer-
virus.html

Keratomileusis, brainchild of Jose I.


Barraquer Moner, was
conceived and developed as the fi rst
stromal sculpting
method to correct refractive error in
1948. The word
“keratomileusis” literally means “sculpting”
of the “cornea.”
Barraquer’s fi rst procedures involved
freezing a disc of
anterior corneal tissue before removing
stromal tissue
with a lathe. Over the years, the
procedure continued to
develop, fi rst through the Barraquer-
Krumeich-Swinger
non-freeze technique where tissue was
removed from
the underside of the disc by a second
pass of the mi-
crokeratome. In-situ keratomileusis was
later developed
by passing the microkeratome a second
time directly
on the stromal bed. The procedure
became known as
automated lamellar keratoplasty with the
invention of an
automated microkeratome and was
further refi ned by
replacing the disc without sutures and
later by stopping
the microkeratome before the end of the
pass to create
a hinged fl ap, as fi rst demonstrated in
1989. The history
of the excimer laser dates back to 1900
and the quantum
theory, eventually leading to the
discovery that 193-nm
ultraviolet excimer laser pulses could
photoablate tis-
sue without thermal damage.
Ultrastructural and wound
healing studies confi rmed that large area
ablation could
be performed in the central cornea. This
was described
as photorefractive keratectomy in 1986
and the fi rst
sighted eyes were treated in 1988. An
excimer laser was
fi rst used to sculpt from the stromal bed
under a hinged
fl ap created manually using a trephine
and scalpel in
1988. The incorporation of a
microkeratome in 1990
fi nally led to laser in situ keratomileusis
—LASIK—as we
know it today. [J Refract Surg.
2012;28(4):291-298.]
doi:10.3928/1081597X-20120229-0
Keratomileusis, brainchild of Jose I.
Barraquer Moner, was
conceived and developed as the fi rst
stromal sculpting
method to correct refractive error in
1948. The word
“keratomileusis” literally means “sculpting”
of the “cornea.”
Barraquer’s fi rst procedures involved
freezing a disc of
anterior corneal tissue before removing
stromal tissue
with a lathe. Over the years, the
procedure continued to
develop, fi rst through the Barraquer-
Krumeich-Swinger
non-freeze technique where tissue was
removed from
the underside of the disc by a second
pass of the mi-
crokeratome. In-situ keratomileusis was
later developed
by passing the microkeratome a second
time directly
on the stromal bed. The procedure
became known as
automated lamellar keratoplasty with the
invention of an
automated microkeratome and was
further refi ned by
replacing the disc without sutures and
later by stopping
the microkeratome before the end of the
pass to create
a hinged fl ap, as fi rst demonstrated in
1989. The history
of the excimer laser dates back to 1900
and the quantum
theory, eventually leading to the
discovery that 193-nm
ultraviolet excimer laser pulses could
photoablate tis-
sue without thermal damage.
Ultrastructural and wound
healing studies confi rmed that large area
ablation could
be performed in the central cornea. This
was described
as photorefractive keratectomy in 1986
and the fi rst
sighted eyes were treated in 1988. An
excimer laser was
fi rst used to sculpt from the stromal bed
under a hinged
fl ap created manually using a trephine
and scalpel in
1988. The incorporation of a
microkeratome in 1990
fi nally led to laser in situ keratomileusis
—LASIK—as we
know it today. [J Refract Surg.
2012;28(4):291-298.]
doi:10.3928/1081597X-20120229-0
Keratomileusis, brainchild of Jose I.
Barraquer Moner, was
conceived and developed as the fi rst
stromal sculpting
method to correct refractive error in
1948. The word
“keratomileusis” literally means “sculpting”
of the “cornea.”
Barraquer’s fi rst procedures involved
freezing a disc of
anterior corneal tissue before removing
stromal tissue
with a lathe. Over the years, the
procedure continued to
develop, fi rst through the Barraquer-
Krumeich-Swinger
non-freeze technique where tissue was
removed from
the underside of the disc by a second
pass of the mi-
crokeratome. In-situ keratomileusis was
later developed
by passing the microkeratome a second
time directly
on the stromal bed. The procedure
became known as
automated lamellar keratoplasty with the
invention of an
automated microkeratome and was
further refi ned by
replacing the disc without sutures and
later by stopping
the microkeratome before the end of the
pass to create
a hinged fl ap, as fi rst demonstrated in
1989. The history
of the excimer laser dates back to 1900
and the quantum
theory, eventually leading to the
discovery that 193-nm
ultraviolet excimer laser pulses could
photoablate tis-
sue without thermal damage.
Ultrastructural and wound
healing studies confi rmed that large area
ablation could
be performed in the central cornea. This
was described
as photorefractive keratectomy in 1986
and the fi rst
sighted eyes were treated in 1988. An
excimer laser was
fi rst used to sculpt from the stromal bed
under a hinged
fl ap created manually using a trephine
and scalpel in
1988. The incorporation of a
microkeratome in 1990
fi nally led to laser in situ keratomileusis
—LASIK—as we
know it today. [J Refract Surg.
2012;28(4):291-298.]
doi:10.3928/1081597X-20120229-0
A computer virus, much like a flu virus, is designed to spread from host to host and
has the ability to replicate itself. Similarly, in the same way that flu viruses cannot reproduce
without a host cell, computer viruses cannot reproduce and spread without programming
such as a file or document.
In more technical terms, a computer virus is a type of malicious code or program
written to alter the way a computer operates and is designed to spread from one computer to
another. A virus operates by inserting or attaching itself to a legitimate program or document
that supports macros in order to execute its code. In the process, a virus has the potential to
cause unexpected or damaging effects, such as harming the system software by corrupting
or destroying data.

Once a virus has successfully attached to a program, file, or document, the virus will
lie dormant until circumstances cause the computer or device to execute its code. In order
for a virus to infect your computer, you have to run the infected program, which in turn
causes the virus code to be executed.

This means that a virus can remain dormant on your computer, without showing
major signs or symptoms. However, once the virus infects your computer, the virus can
infect other computers on the same network. Stealing passwords or data, logging
keystrokes, corrupting files, spamming your email contacts, and even taking over your
machine are just some of the devastating and irritating things a virus can do.
While some viruses can be playful in intent and effect, others can have profound and
damaging effects. This includes erasing data or causing permanent damage to your hard
disk. Worse yet, some viruses are designed with financial gains in mind.
Article 2
CJ Robles (2020, May 3) ILOVEYOU Virus: 20 Years After the Malware Caused $10B
Losses Worldwide – Techtime
Retrieved from https://www.techtimes.com/articles/249312/20200503/remembering-
iloveyou-virus-20-years-after-the-destructive-virus-caused-10b-losses.htm

At the start of the millennium, a different virus has once baffled the world. With just
an email, the I Love You virus has spread immediately, crashing computers, deleting files,
and causing about $10 billion of damage in a glance.

On May 4, 2000, people worldwide received emails with "ILOVEYOU" on the subject.
The message read: "kindly check the attached LOVELETTER coming from me."
Unsuspecting victims then opened the text file. Unfortunately, it was "an executable
program" that allowed the virus to take control. It is a worm that replicated itself and sent
copies of itself to all in the victim's email address book.
The cycle kept on, recipients continued to open the attachment and dispersed it further.
Soon after, office email servers were clogged as thousands of love letters went back and
forth.

"This wasn't something that people were used to as a concept, they didn't realize that
email could be so dangerous," Michael Gazeley told CNN as he recounted his experiences
when the virus broke out. Gazely is a part-owner of the information security firm, Network
Box, located in HongKong.

It was worse than just a chain letter. The ILOVEYOU virus soon destroyed the
victim's hard drive and scrubbed numerous files
Article 3

Siddharth Prakash Rao (2014, May) Stuxnet, A new cyberweapon - Researchgate


Retrieved from
https://www.researchgate.net/publication/267156195_Stuxnet_A_new_Cyberwar_wea
pon_Analysis_from_a_technical_point_of_view

With the advancement in


modern technology, we can
see a lot of changes in day to
day life. The
affect of such technologies
can also be seen in the art
of warfare where various
countries
(ethically or non ethically) is
use softwares as weapon. It is
beyond the imagination of
common
man that how a software can
be powerful enough to destroy
a nation. This essay is about
one
such lethal software virus
called “Stuxnet” which posed
as a challenging issue for the
politics,
defense and technology fields
With the advancement in
modern technology, we can
see a lot of changes in day to
day life. The
affect of such technologies
can also be seen in the art
of warfare where various
countries
(ethically or non ethically) is
use softwares as weapon. It is
beyond the imagination of
common
man that how a software can
be powerful enough to destroy
a nation. This essay is about
one
such lethal software virus
called “Stuxnet” which posed
as a challenging issue for the
politics,
defense and technology fields
With the advancement in
modern technology, we can
see a lot of changes in day to
day life. The
affect of such technologies
can also be seen in the art
of warfare where various
countries
(ethically or non ethically) is
use softwares as weapon. It is
beyond the imagination of
common
man that how a software can
be powerful enough to destroy
a nation. This essay is about
one
such lethal software virus
called “Stuxnet” which posed
as a challenging issue for the
politics,
defense and technology fields
With the advancement in
modern technology, we can
see a lot of changes in day to
day life. The
affect of such technologies
can also be seen in the art
of warfare where various
countries
(ethically or non ethically) is
use softwares as weapon. It is
beyond the imagination of
common
man that how a software can
be powerful enough to destroy
a nation. This essay is about
one
such lethal software virus
called “Stuxnet” which posed
as a challenging issue for the
politics,
defense and technology fields
With the advancement in modern technology, we can see a lot of changes in day to
day life. The effect of such technologies can also be seen in the art of warfare where various
countries (ethically or non-ethically) is use software as weapon. It is beyond the imagination
of common man that how a software can be powerful enough to destroy a nation. This essay
is about one such lethal software virus called “Stuxnet” which posed as a challenging issuef
or the politics, defence and technology fields.

The existence of such deadly virus which is powerful enough to destroy a nuclear
centrifuge was discovered in June 2010. It is basically a 500KB computer worm which
infected many industrial plants in Iran including the Uranium enrichment plant. The virus
was designed in a way such that it can spread rapidly from one computer through other with
or without the Internet unlike the normal computer viruses. Stuxnet was crafted in such a way
that it is quite impossible to predict and stop. StuxNet stealthily spreads between the
computers running on windows even without Internet connection, through USB drives. Since
it is much unsuspected that anyone could spread a worm in this way, it was unpredictable till
the actual damages were reported. The virus becomes functional in three different stages:
1. First : It targets the loopholes in windows (operating system) machines and networks and
quickly replicates itself in a deeper(Penetrating deep into the system) and broader(targeting as
many as such vulnerable systems) manner.

2. Second : Then it penetrated into the Siemens step7 software (which again is a windows
based
software), which is used to program industrial control systems.

3. Third: It compromises the logic controllers which give the creators of the virus the access
to spy on industrial systems and also they get to control the whole system.
More technically speaking the careful evaluation of this weapon in the cyber-terrorism world,
it exploits five different vulnerabilities [2] : LNK (MS10-046), Print Spooler (MS10-061),
Server Service (MS08-067), Privilege escalation via Keyboard layout file, Privilege
escalation via Task
Scheduler.
References

1. Alison Grace Johansen (2020, July 23) What is computer virus - US.Norton
Retrieved from https://us.norton.com/internetsecurity-malware-what-is-a-computer-
virus.html

2. CJ Robles (2020, May 3) ILOVEYOU Virus: 20 Years After the Malware Caused $10B
Losses Worldwide – Techtime
Retrieved from https://www.techtimes.com/articles/249312/20200503/remembering-
iloveyou-virus-20-years-after-the-destructive-virus-caused-10b-losses.htm

3. Siddharth Prakash Rao (2014, May) Stuxnet, A new cyberweapon - Researchgate


Retrieved from
https://www.researchgate.net/publication/267156195_Stuxnet_A_new_Cyberwar_weapo
n_Analysis_from_a_technical_point_of_view

4. David Kushner (2013, February 26) The real story of Stuxnet - Spectrum
Retrieved from https://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet

You might also like