Perverse software, Basic Computer Science

Assignment Help:

Perverse software:

Perverse software is a program which causes hindrances in other programs execution in such a way resulting in modification or complete destruction of data without the user's intention or even sabotaging the operational system.  Perverse Software is also known as Malicious software or malware.

It is a type of software that is designed to secretly access a computer system, without the owner's consent, and damage the system. The impact can be as damaging as shutting down a business, pulling down computer network or significantly impacting regular use of individual computer systems etc.

The damage done can vary from something as little as changing the author's name in a document to full control of one's machine without the ability to easily find out.   

Most malware requires the user to initiate its operation. For example, sending infectious attachments (it acts when users downloads them and runs the attachment) in e-mails, browsing a malicious website that installs software after the user clicks ok on a pop-up, and from vulnerabilities in the operating system.  

Early infectious programs, such as Internet Worm and MS DOS viruses, were written as experiments and were largely harmless or at most annoying. With the spread of broadband  Internet access, malicious software has been designed for a profit, for forced advertising. Here the malware keeps track of user's web browsing, and pushes related advertisements.   


Related Discussions:- Perverse software

Interpreter, Interpreter: An interpreter is a program that translates...

Interpreter: An interpreter is a program that translates each statement in the programming language into machine code and runs it.  Such an arrangement means that to run the

Multiprocessor dsp systems, Multiprocessor DSP Systems Over modern time...

Multiprocessor DSP Systems Over modern times several organizations have provided forums made up of several DSPs. More lately, semiconductor organizations have been providing sn

HOMEWORK 9.., AsBased on Chapter Review Problems from the book. 1 #1. Wh...

AsBased on Chapter Review Problems from the book. 1 #1. What is meant by data independence? Explain your answer. #2. Identify two benefits of separating application software fr

Microprocessors, what is the role of microprocessors in IT? how they are us...

what is the role of microprocessors in IT? how they are used in medical field? how they are used in our real lifes? how they are used in latest technology?

Artificial intelligence agents, Artificial Intelligence Agents: We dis...

Artificial Intelligence Agents: We discussed what we will be talking about in Artificial Intelligence and why those things are important. This chapter is all about how we wi

Primary or foreign key, QUESTION Your Library is currently offering acc...

QUESTION Your Library is currently offering access to the Internet for its subscribers on a fee paying basis. Subscribers should make a booking for each slot of one hour in adv

Storage capacity and cost per bit of storage, Storage capacity and Cost per...

Storage capacity and Cost per bit of storage: Storage capacit y:  It is the amount of data that can be stored in the storage unit. A large capacity is preferred.  Cost pe

Security threats on internet, Security threats on internet:  The Inter...

Security threats on internet:  The Internet has many advantages; however, it also opens up security threat. In this section we just want to highlight some of the threats that

Star topology, Ask conceptual question answer about star topology#Minimum 1...

Ask conceptual question answer about star topology#Minimum 100 words accepted#

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd