123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> General >> View Article

Rampant Computer Viruses Attacks Causes Massive Failures And Disruptions

Profile Picture
By Author: EC-COUNCIL
Total Articles: 68
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Computer viruses attacks have become more extensive these days, resulting in massive failures and disruptions because motive of attacks is often to disrupt operation. Viruses may multiply in the computer’s machine’s storage area, memory or network.
The city hall computer network of Pekin, Illinois, has been down the majority of the week as result of two separate virus incidents, city officials say. Most city employees can’t access email or the document file system, or update the website. Two viruses attacked the computers and IT staff shut down the servers, Interim City Manager Frank Mackaman said.
Mackaman said the virus attacks and resulting precautionary measures “virtually paralyzed” the city for the much of the week. “In terms of the cause of this, IT says they’re in the treatment phase, not the diagnosis phase,” Mackaman said. “The only thing that they can definitely rule out is that the virus was not introduced by email.”
Recently, Nainamo city,’s (Canada) Director of Information Technology, Per Kristensen stated that, a new type of the Qakbot virus appeared globally on March 15, ...
... 2011 and was observed in PCs in Nanaimo on March 16, 2011. To safeguard important information about the city, the system was immediately put on a halt after the staff realized that the virus was swiftly circulating from PC to PC.
Commenting on the matter, Per stated that, people can be sure that all their personal information and details are safe. He also stated that, safeguarding their private information is their main concern. The city's system would not be turned on until they are sure that they sorted out the problem, he added. The virus, which is classified as harmful, seems extremely complex, altering its signature to transfer through a computer many times. According to Per, the anti-virus firms were not able to recognize it but and as soon as they got to know that, something got through their security software, they shut down their system.
Similarly, Gholamreza Jalali, head of Iran's civilian defence, said the computer virus Stuxnet, attacked Iran's atomic program. He claimed it was the work of its two biggest foes and that the German company must take some of the blame. The Iranian military commander has accused German engineering company Siemens of helping the United States and Israel launch a cyber attack on its nuclear facilities. Iran has given few details of the impact of the virus. It said in September that staff computers at the Russian-built Bushehr nuclear power station had been hit, but that the plant itself was unharmed.
Mr. Jalali said Iran should hold Siemens responsible for the fact that its control systems used to operate complicated factory machinery -known as Supervisory Control and Data Acquisition (SCADA) -had been hit by the worm. "Our executive officials should legally follow up the case of Siemens SCADA software, which prepared the ground for the Stuxnet virus," he said. Some foreign experts have described Stuxnet as a "guided cyber missile" aimed at Iran's atomic program.
These report findings clearly points out that computer virus attacks are very common these days. One proven way to mitigate information security risks is through technical security training that will enhance the skills proficiency of the cyber security workforce. EC-Council’s brand new TakeDownCon is a technical information security conference series that serves as a platform for IT security professionals to discuss and exchange views on the latest information security threats as well as remediation strategies. In addition to learning from some of the best security experts, TakeDownCon also offers highly sought after technical training courses, including the Certified Ethical Hacker (CEH) course, often touted as the world’s most comprehensive ethical hacking training program.
The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.
ABOUT EC-COUNCIL
EC-Council is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous ethical hacking training, the Certified Ethical Hacker (CEH) course, Computer Hacking Forensics Investigator (CHFI) program, License Penetration Tester (LPT) program and various other technical security training programs offered in over 84 countries around the globe. TakeDownCon Dallas 2011, is one of the conferences of EC-Council’s Take Down information security conference series.

Total Views: 287Word Count: 768See All articles From Author

Add Comment

General Articles

1. Top Podiatrist Bradenton Services | Expert Foot Doctor Care In Bradenton, Fl
Author: Top Podiatrist Bradenton Services | Expert Foot Do

2. Who Can Opt For Surrogacy In India?
Author: Surrogacy Centre India

3. Expert Tailoring & Alteration Services – B X Tailor & Alteration
Author: B X Tailor

4. Seo Company Dubai: How Bloom Agency Is Driving Digital Growth In The Uae
Author: Neetu Jaiswal

5. Shopify Development Company: Why Bloom Agency Is A Leading Choice For Your Ecommerce Growth
Author: Neetu Jaiswal

6. The Ultimate Guide To Ecommerce Agencies: What They Do, Why They Matter, And How To Choose The Right One
Author: Neetu Jaiswal

7. Bloom Digital Agency: Crafting Tailored Digital Marketing Solutions For Sustainable Growth
Author: neetu jaiswal

8. Krisala 41 Commune Wakad Pune: Where Smart Living Meets Future-ready Investment
Author: Armaan

9. Top-rated Pest Control & Deep Cleaning Services In Kolkata: Making Homes Healthier & Safer
Author: Techsquadteam

10. Silicone Molding Factory For High-quality Leak Proof Duckbill Valves
Author: yejiasilicone

11. Google Colab Python: A Beginner’s Guide To Coding In The Cloud
Author: Prakash Yadav

12. The Future Of Retail? Personalized Culture At Scale
Author: adlerconway

13. Double9books: A Leading Force In The World Of Book Publishing
Author: suraj patel

14. The Complete Guide To Discovering 2 Bhk Apartments In Lucknow
Author: Star Estate

15. Time Management Hacks For Entrepreneurs
Author: TrackHr App

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: