Richelieu Johnson G

Richelieu Johnson
G. Saunders
Info 300
Malware/Consumer Antivirus Software
In today’s ever-increasing world of technology, protection from malware is becoming an integral part of computer safety. Any computer that is communicating over a network with another device has the potential to be at risk of malware. Stored files on computers can also be exposed to those who are smart enough to find a way to get them, especially if the victim has taken zero safety precaution to prevent it.
Like all things, somewhere up the timeline exists the origin. We can trace malware back to the 1987 finding of Ralph Burger, who decided to investigate a virus he stumbled upon and write about it. His deep dive into his findings were quite extensive which proved to be a blessing and a curse because Burger’s book started to get used as a tutorial of sorts on how to create new viruses. Since the computer specialist got his work published, there has been thousands upon thousands of malwares based on his findings.

Then came the beginning days of the internet in the 1990’s which set off a humungous chain of events in IT security breaching. New technology called botnets and bots came into the fold. For the first time in history private information was being plastered all over the internet. The monitoring of network activity in real time was an issue and a pain in the neck for individuals who were trying to get a grip on what the internet really was and if it was worth the hassle using. During mid to late 1990’s efforts were made to thwart cyber criminals, but because the internet was still in it’s infancy, there was no major agency that saw success in reducing criminal activity. The first major step came in the late 1990’s with the creation of the National Infrastructure Protection Center.

As you can imagine, there are now countless amounts of viruses and bugs that can be used to seep into computer networks and internet apps. First, it is important understand what the definition of a virus is. A virus is a program that is able to replicate and then spread itself. For this to be possible the virus must attach itself to files that are connected to legitimate programsCyber criminals are keen enough to set up spam that allows them to enter through backdoor loopholes. Knowing that they will be hard to track down, they are able thoroughly breach tons of data at their own pace. Some of this hacking is taking place by an individual who is overseas masking their identity as well, which makes it even harder to track down the perpetrator.
Works CitedAuthorLastName, FirstName. Title of the Book Being Referenced. City Name: Name of Publisher, Year. Type of Medium (e.g., Print).

LastName, First, Middle. “Article Title.” Journal Title (Year): Pages From – To. Print.