Sunday, March 31, 2019
Ethics And Implications Of Computer Virus Information Technology Essay
Ethics And Implications Of Computer Virus  development Technology attemptIntroductionA  computing machine   calculating machine  computer virus is a program that executes when an  septic program is  penalize. It is capable of reproducing itself and usually capable of ca utilise great  trauma to files or other programs on the same figurer. Like biological viruses,  electronic computer viruses  peck  pass on quickly and argon often difficult to eradicate. They can attach themselves to just about  each type of file, and argon spread by replicating and being sent from  1 individual to a nonher. These  ar  ace of the few harmless viruses, simply replicating and spreading to  juvenile  administrations. There are a couple of different types of computer virusesBoot- orbit virusesParasitic virusesMulti-partite virusesMacro virusesThese classifications  include into account the different ways in which the virus can  spoil different parts of a system. The manner in which each of these types ope   rates has one thing in common any virus has to be executed in order to operate (Lammer V., 1993)How in different ways those computer viruses can affect the IT  manufacturing and the society. What  salmagundi of implications they might cause? What kind of motivation motivates them to develop these computer viruses? Are they aware of the honorable  liaison surrounding their  maturement? These are the issues that will be discussing in this report. archivesMany claims  fork over been made for the existence of viruses prior to the 1980s, but so far these claims have not been accompanied by proof. The Core Wars  schedule contests did involve self-replicating  computer code, but usually within a structured and  faux environment. It was not until the end of the decade (and 1987 in particular) that knowledge of real viruses became widespread,  fifty-fifty among  protective covering experts. For many years boot sector infectors and file infectors were the  only when types of common viruses. T   he boot sector virus, dubbed the cBrain, was  first-class honours degree incarnated written back in January 1986, considered to be the first computer virus for MS-DOS. It was programmed to infect the boot sector of storage media formatted with the DOS File Allocation Table (FAT) file system (Mary Landesman, 2000).In the early 1990s, virus writers started experimenting with various functions intended to defeat detection, among these were polymorphism. polymorphic viruses are more difficult to detect by scanning as each copy of the virus looks different than other copies. Basically, polymorphic code mutates  slice keeping the original algorithm intact. Another introduction in the 1990s was the macro and  account book viruses, they were initially confined to word  touch files, particularly files associated with the Microsoft Office Suite. However, the inclusion of programming capabilities eventually led to script viruses in many objects that would normally be considered to contain data    only, such(prenominal) as Excel spreadsheets, Power Point presentation files, and email  kernels. This  point led to greatly increased demands for computer resources among antiviral systems. Email viruses became the   subject field new form in the late 1990s and early 2000s, and while it is very visible and so tend to be indentified within a short space of time, but many are macros or scripts and so generate many variants (John Wiley, 2004).Computer  morality and computer virusesWhat impact did computer viruses have on ethical motive in the computer community? With the  enlargement of the number of computer viruses, this  waits an unanswered question. In the years since viruses first appeared in the MS/PC-DOS computing environment, they have grown in  twain numbers and complexity at an alarming rate. They have be uprise not only commonplace, but  in like manner extremely difficult to defend against. The virus creators have designed, compiled and released encrypting viruses, multipa   rtite viruses, stealth viruses and viruses employing encryption techniques so bizarre that it warrants  speedy concern. The scope of the problem has grown to the point where computer users are  horrific for answers to their questions sand solutions to the computer virus dilemma (Ferguson, 1992).Thecomputerethics  spot at present is as distorted and convoluted as it could have ever been imagined. Some of the more disturbing activities in the virus  breeding channels  newly, have been irresponsible postings ofsource code, DEBUG scripts of live viruses and  general  reduce ofcomputerethics and morals. To complicate matters, virus exchange bulletin Board Systems (BBS) have cropped up where viruses and virussource codeare freely exchanged. The people who engage in these activities have successfully shown their disregard for the remainder of the computing  frequent. Perhaps these individuals have not given  full thought to the consequences of their actions. By allowing livecomputerviruses    to freely filter into the public domain, they are ultimately responsible for any damage inflicted, either  like a shot or indirectly, due to their negligence or disregard (Ferguson, 1992).According to the study of (Gordon, 1994) in which she has examined the ethics of virus writers using Kohlbergs ethical  ride, the observation shows that the virus writers are not a homogenous group, since they vary in age,  fostering level, economical level, background, manner of communication, perspective of their society, and have different preferences. All of the  foregoing will lead to different modes of thinking and different motivations behind their behavior. The  childish and college virus writers are within the norms of their age group of the ethical development model, the reason for their behavior in writing and releasing viruses were unclear  gibe to the collected information (Gordon, 1994, p15). While adult virus writers seem to be under the norm for their age group of the ethical devel   opment model and The Enemy seem to be Society (Gordon, 1994, p.15). It seems that virus writers desire to  fulfill their goal conceals their vision from viewing the ethical issues, another reason could be their dissatisfaction with the society, since the ethics belong to it, and they want revenge against everything in their society including the ethics (Ahmad, 2005, p. 41).Implications  may be for IT industryComputer virus implications on the IT industry may cause some company to upgrade their security to higher(prenominal) security level. The growing  take aim for computer security specialists is predictable. Consultants may  catch enviable income by telling corporate computer users how to protect their machines from blasting failure and how to use antidote and vaccine products. The computer specialists will be in a never ending game with each other. As they develop preventive vaccines and administer the viral antidotes, the viral breeders will also be developing new viruses to ove   rcome the new security measures. (Lin  Chang, 1989)The implications of the computer virus growth are especially important for Management Information Systems (MIS) as well. Management is becoming aware of the security considerations and internal policies of the firm. In order to prevent system contamination, employees should be warned not to use any unchecked programs. The MIS management should set more straightforward policies and the repercussions of not  long-suffering by them. Similarly, any  package used in the office should remain  on that point and no place else. This is to safeguard against possible infections that could occur  outdoor(a) of the office environment. The focus of most policies will be on preventing  orthogonal intrusions rather than internal threats simply for the sake of reducing external dangers (Lin  Chang, 1989).Implications may be for societyIn early May of year 2000, the message I Love You appeared among emails of computer users worldwide. The attached vi   rus since dubbed the Love  twit,  give up to 45 million computers, paralyzed bodies ranging from the World Health  memorial tablet to the Pentagon and is said to have cost business tens of billions of pounds in the UK alone. The Love Bug affected only software created by Microsoft, taking advantage of recent changes designed to improve performance, unfortunately over 90% of desktop computers were using Microsoft software. This software monoculture creates a system with an intrinsically high risk of  ruinous failure.ConclusionThere are millions of computer virus developers out there in this world, creating the right virus all the time trying to  relegate the security of many kinds of system. As you can see, the number of computer viruses  free-base in the world is increasing each year. Every time software and antivirus software developers invent new technology to prevent virus infection, computer virus writers thrilled the world with their ability to go around the new technology and    develop the right virus for each age.There are hundreds of thousands of viruses out there (if not millions) and they often designed for different objectives, the writers of computer virus are not a homogenous group, their motivations could be the need to express their dissatisfaction with their social level, to achieve their revenge or to prove their  technical ability, drawing attention, becoming famous and well known. It seems that computer virus writers  closing to accomplish their goal may conceal their vision from viewing the ethical and legal issues (or they might not even care). Another reason could be their dissatisfaction with their society, since the ethics and legal codes belongs to it, and they want revenge for everything in their society including the ethics and legal codes (Ahmad, 2005, p. 43).The battle between the securities specialists against virus creators will never come to an end, as virus creators will always trying to overcome the security measures, antidotes    and vaccines. These are just few of the impacts that can be expected on the computer industry. As for the computer society, the computer virus has become a fact of life.(Word Count 1553)BibliographyMary Landesman (2000) Boot Sector Virus  specifyhttp//antivirus.about.com/od/securitytips/a/bootsectorvirus.htm, online(Accessed 3/11/10)  
Subscribe to:
Post Comments (Atom)
 
 
No comments:
Post a Comment