Crime has been an ever-present factor in our lives. It certainly has been the bane of our existence. With the advent of computer systems and working remotely, it was inevitable that criminal intent would evolve to meet our technological advancements. From the street to the cyber age, crime has definitely caught up. Our physical selves are no longer the target; it is our information that is at risk.
Cyber security or computer security is the fortification of information systems from malicious intent or damage to the hardware, software, and the information the system holds. Disruption and misdirection of the normal process of the service provided by our computer system is also a form of attack that strong cyber security processes prevent. One of the many forms of cyber threats is a virus. A good way to protect yourself and your system from any real damage is to have a basic knowledge of the different viruses that threaten your cyber security.
The more common type of virus that attacks your cyber security is called a Macro Virus. It is a virus that is made in a programming language that is usually placed inside a software application. Most common targets are word processors and spreadsheet applications. We all do documents and accounting spreads in Microsoft Office which is why this is a common target of those will ill intent. A macro virus is usually embedded within a document and runs the moment a document is opened. This is why you should never just open attachments in e-mails. One of the key foundations of cyber security is having antivirus programs in place. They can detect a macro virus yet newer and stronger types of this virus are constantly being made so detecting them can still be difficult.
Another type of virus is called an Overwriting Virus. It is program that actively infects and destroys the original program coding of a system’s memory. They are designed to attack the operating system (OS) and to overwrite the set information. This sort of virus is determined to be more harmful as they target parts of a user’s system. This virus is acquired usually through file transfers and e-mails.
The Directory Virus does its damage by changing the paths that specify the location of a file. Often, when your system has been hit by this virus, it becomes difficult or impossible to locate the original files.
The Boot Virus attacks the boot sector of a hard disk or a bootable drive. The boot sector is a crucial part wherein the data on the disk or USB is stored along with the program that allows it start up. The best way of avoiding boot viruses that compromise your cyber security is to ensure that your portable memory drives are protected and constantly scanned. Also, never start your computer with an unknown drive attached to it.
A Direct Action Virus selects one or several files to infect every time its code is executed. Its intent is to replicate itself and to spread to other files whenever its program is activated. It often chooses files that are at the root directory of the system’s hard drive. That is the part that is responsible for doing particular actions when the system is started. In most cases, a direct action virus will not delete your system files or attempt to lower the overall performance output of your computer. It will, however, block access to certain applications and files. The most effective defense that cyber security has is a constantly running virus scanner that will not only locate and detect the virus but will destroy it as well.
Your cyber security must always have these key ingredients: an anti-virus program, an anti-spyware program, a running firewall, constantly updated system software, an anti-spam program, and up-to-date back up of your data. Having these is sure to help protect your important data from those who wish to profit from your systematic loss.