Perverse software, Basic Computer Science

Assignment Help:

Perverse software:

Perverse software is a program which causes hindrances in other programs execution in such a way resulting in modification or complete destruction of data without the user's intention or even sabotaging the operational system.  Perverse Software is also known as Malicious software or malware.

It is a type of software that is designed to secretly access a computer system, without the owner's consent, and damage the system. The impact can be as damaging as shutting down a business, pulling down computer network or significantly impacting regular use of individual computer systems etc.

The damage done can vary from something as little as changing the author's name in a document to full control of one's machine without the ability to easily find out.   

Most malware requires the user to initiate its operation. For example, sending infectious attachments (it acts when users downloads them and runs the attachment) in e-mails, browsing a malicious website that installs software after the user clicks ok on a pop-up, and from vulnerabilities in the operating system.  

Early infectious programs, such as Internet Worm and MS DOS viruses, were written as experiments and were largely harmless or at most annoying. With the spread of broadband  Internet access, malicious software has been designed for a profit, for forced advertising. Here the malware keeps track of user's web browsing, and pushes related advertisements.   


Related Discussions:- Perverse software

C++ programming, write a program of 2 sum and 2 product number in C++ progr...

write a program of 2 sum and 2 product number in C++ programming language

Description of external hardware interruptions, External interruptions are...

External interruptions are produced by peripheral devices, for example keyboards, printers, communication cards, etc. They are also produced by coprocessors. It is not achievable t

Assignment 4, Briefly explain all the networking components and devices tha...

Briefly explain all the networking components and devices that are needed to set up a computer network. This is just a brief explanation of devices needed and their reason for usin

In-door patient department, In-door Patient Department Ideally all ...

In-door Patient Department Ideally all features of OPD.  Both OPD and IPD modules should be inter-linked.  In addition all details pertaining to the patient's medica

State the importance of visual storytelling, Question 1 What are the vario...

Question 1 What are the various steps involved in pre-production design? Question 2 What are the different kinds of perspectives used in a layout? Question 3 Descr

Execution of a machine instruction, Execution of a machine instruction: ...

Execution of a machine instruction: Execution of a machine instruction on modern processors involves a complex sequence of operations with multiple cycles. One instruction cyc

Network control, Network Control, Engineering and Management Network co...

Network Control, Engineering and Management Network control in this sense involves traffic management, and the engineering of the networks to support varying traffic loads. In

Input - output services, Input/Output Services:   Every operating syst...

Input/Output Services:   Every operating system, large or small, provides input/output services for each device in the system. The operating system includes I/O device driver

Explain digital multiplexers, Problem 1 Perform the following conversio...

Problem 1 Perform the following conversion a. (ABE) 16 =() 2 b. (101011) 2 =() 10 2 Explain how full adder adds three bits 3 Explain digital multiplexers

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd