Computer Viruses and Cybersecurity
Computer Viruses and Cybersecurity
Created by
Supporting Lecturer
CLASS D
INFORMATION SYSTEM MAJOR
FACULTY OF COMPUTER SCIENCE
UNIVERSITAS PEMBANGUNAN NASIONAL “VETERAN” JAKARTA
Jalan RS. Fatmawati Raya, Pd. Labu, Kec. Cilandak
CHAPTER I
INTRODUCTION
1.1 Background
As information technology and communication have rapidly advanced, computers have
become an integral part of human life. However, alongside its tremendous benefits, the progress
in computer technology has also brought about new risks. One of the primary risks that emerged
in the modern computing era is the threat from malicious software known as "Computer
Viruses."
Computer viruses are software programs designed to infect computers and disrupt or take
control of their functions without the user's permission. They can cause financial losses, leak
sensitive data, or even damage computer hardware. In extreme cases, computer viruses can be
used for criminal purposes such as identity theft or cyberattacks against large organizations.
The existence and evolution of computer viruses reflect the complex evolution of the
ever-changing cyber world. Although computer viruses first appeared in the 1970s, their spread
and the damage they cause have significantly increased since then. The growing sophistication of
virus creation techniques and their dissemination, as well as the adoption of the latest technology
by computer users, have made protection against these threats increasingly urgent.
Today, the study of computer viruses and methods for safeguarding against them has
become a crucial research topic in the field of cybersecurity. Companies and individuals strive to
protect their systems from these threats, while hackers and computer virus creators continue to
develop new tactics. Understanding the origins, characteristics, and impacts of computer viruses
is an essential first step in efforts to safeguard data security and computer systems.
This research aims to provide an in-depth insight into computer viruses, covering their
historical development, mechanisms, methods of propagation, impacts, and protective measures
that have been and are being developed. By comprehensively understanding this topic, we can
become better prepared to confront the evolving cybersecurity threats in the digital era.
1.3 Objectives
a. Understanding the history and roots of computer viruses, exploring the initial instances,
and tracing their evolution over time.
b. Exploring the different techniques viruses use to infiltrate systems and the diverse forms
of damage they can cause to various systems and networks.
c. Delving into the repercussions of virus attacks, including financial, data security, and
reputational consequences for individuals and organizations.
d. Identifying the challenges in keeping ahead of evolving threats and discussing proactive
security measures that individuals and organizations can take to mitigate these risks.
e. Understanding how the landscape of cyber threats is shifting with emerging technologies
and identifying new risks that are emerging in the digital sphere.
f. Exploring the ethical and legal considerations associated with the creation, distribution,
and use of computer viruses, including the boundaries and implications of these actions.
g. Predicting potential future trends in malware development and cybersecurity and
analyzing how these trends might shape the future of digital security.
CHAPTER II
LITERATURE REVIEW
In this chapter, we will delve into a detailed discussion of the various aspects related to
computer viruses and cybersecurity, focusing on the questions posed in the introduction. We will
examine the historical development of computer viruses, their mechanisms, the types of damage
they can cause, the consequences of virus attacks, proactive security measures, emerging risks,
legal and ethical considerations, and potential future trends in malware development and
cybersecurity.
1. Computer viruses pose a significant threat: Computer viruses are malicious programs that
can cause a wide range of issues, from data loss to system instability. They can spread
rapidly through various means, including the internet, email, and infected files.
2. Continuous evolution: The battle between virus developers and antivirus experts is
ongoing, with virus developers constantly developing new strategies to avoid detection.
This ongoing evolution makes it challenging to protect computer systems effectively.
3. Impact on users: Virus infections can have a detrimental impact on computer users,
leading to system slowdowns, data corruption, and other disruptive behaviors. Users may
also face difficulties in recovering their data after an infection.
4. Preventive measures are essential: To protect personal computers from virus attacks, it is
crucial for users to take preventive measures. These include keeping software up to date,
using antivirus software, practicing safe internet browsing, and exercising caution when
opening files or emails from untrusted sources.
5. User awareness and education: The abstract underscores the importance of user
awareness and education about the risks of virus infections and the preventive steps that
can be taken to safeguard computer systems.
REFRENCE
Babak Bashari Rad, Maslin Masrom and Suhaimi Ibrahim (2011), Evolution of Computer Virus
Concealment and Anti-Virus Techniques: A Short Survey, IJCSI International Journal of
Computer Science Issues, Vol. 8, Issue 1
A.Coulthard and T.A. Vuori (2002), Computer Viruses : a quantitative analysis Logistics
Information Management, Volume 15. Number 5/6. 2002. PP.400- 409, ISSN 0957 - 6053