Essay on Viruses and Their Effects on PC Performance

Published: 2021/12/06
Number of words: 1813

The world has transformed into an information age; hence, data has become a critical resource used by companies in decision making. As a result, data protection from malicious threats and system hackers has become a primary consideration by all entities handling and using data in their routine operations. Company networks are distributed to different geographical locations, making firms tighten data security amidst the increasing threats on computer systems (Joshi & Patil, 2012). A computer virus refers to a self-replicating program with a code that copies itself; thus, infecting other programs. In most cases, a virus can replicate itself without or with minimum user intervention. This is because computer viruses are usually designed to spread from one device to another with the underlying objective of damaging the system or stealing certain critical information without the owner’s authorization. This research paper focuses on the effects of viruses on the company’s computer systems, control measures that the company can use to secure computer systems against viruses, software tools the firm can implement to boost computer performance, and policy measures that the company should implement regarding preventing virus attacks on their computer systems.

Effects of viruses on the company’s computer system

Computer viruses are programmed to adversely affect PC performance by interfering with programs, deleting specific files, and reformatting a computer’s hard drive. Some computer viruses also replicate themselves by flooding a computer system network with traffic making it tedious to undertake internet activities. As a result, viruses slow down a company’s computer system operations by interfering with software (Joshi & Patil, 2012). Some computer viruses sap computer system memory resulting in frequent crashes. A computer virus is a malicious program that interferes with computer programs by spreading from one system to another.

Need an essay assistance?
Our professional writers are here to help you.
Place an order

In most cases, they are purposefully intended to perpetuate adverse objectives. Therefore, they slow down a firm’s computer system operations since they are intentionally designed to damage a computer system by promoting data theft to unauthorized parties. In some cases, computer programs infect programs and files to undermine the operations of a computer system.

Secondly, computer viruses can cause adverse effects on a company computer system when used to steal data or damage the devices. We live in the data age where corporate organizations rely on data for decision making to enable them to compete in the dynamic and competitive business and technological environment. As a result, cybercrimes have been increasing as particular groups use computer viruses to perpetrate cybercrimes. In most cases, they use computer viruses to steal valuable information from a company (Joshi & Patil, 2012). Some companies handle crucial data such as user names, credit card information, and sensitive health records stored on their computer systems. Most virus creators are strategic since they develop different viruses to achieve specific goals. Therefore, computer viruses put firms at significant risks, especially when their crucial data is stolen from their computer systems.

Computer viruses also have the potential of damaging and corrupting files stored in a company’s computer system. Most computer viruses are designed to destroy the files stored on the host computer. Viruses have the potential of corrupting any file stored on a computer system’s hard drive (Joshi & Patil, 2012). Files damaged by a computer virus cannot be recovered as they cause permanent damage to such files. Computer viruses can cause significant losses to a firm since they can damage any file ranging from documents, audio, videos, and applications.

Finally, viruses can slow down a company’s computer system since most operate in the background. The operations often interfere with the performance of a computer’s operating system. Background activities undertaken by a computer virus can significantly slow down a computer’s performance by lowering its speed (Joshi & Patil, 2012). As a result, it deteriorates the performance of a computer system by making the programs take a longer duration before they respond.

Control measures the company can use to secure computer systems against viruses

Computer viruses pose real threats to companies since system hackers use viruses to steal data, slow down computer performance, corrupt files, and steal valuable and confidential information. Therefore, companies must secure their computer systems against viruses by tightening their security features. The first measure that firms can use is antivirus software programs to detect, block, and get rid of any malicious program running in a computer system (Khan et al., 2017). These antivirus programs, such as Microsoft security and Avast, are free antivirus programs that companies can install to secure their computer systems against viruses. Companies should also install firewalls on their computer systems to secure them against viruses. Some PCs have pre-installed firewalls, while others do not. Therefore, companies must enable the firewall to safeguard their computer system from viruses and malware.

The second control measure that a company can use to secure a computer system against viruses is using strong passwords. Passwords are security features that can be controlled by a company (Touchette et al., 2012). Company data has become a valuable resource; hence, most computer viruses are designed to enable access to such crucial data without the owner’s authorization. As a result, it is appropriate for firms to safeguard their data through solid passwords that cannot easily be guessed by unauthorized parties who may be targeting a company’s computer system. The company should strive to create different passwords comprising letters, symbols, and numbers. It is also recommended that the company avoid using the same username and passwords across various sites. If a hacker manages to access one of the sites, they can access the rest of the company’s data since the login details are similar.

Finally, companies should regularly update their computer systems to equip them with the latest models of software. Software update usually incorporates features designed to enhance security through the latest versions of the security features to mitigate the current security threats. A company such as Microsoft regularly update its software to get rids of flaws in the software program that hackers could exploit. Firms should regularly install new software updates immediately they become available.

Software tools that the company can implement to improve computer performance: Computer viruses usually disrupt the routine operations of a computer system by damaging its software and data theft. Viruses also infect programs and files; thus, altering computer system operations (Joshi & Patil, 2012). Computer operations also become slower with time due to the installation of unwanted applications and add-ins. Malware and computer viruses also interfere with computer performance. As a result, there is a need for the company to utilize some software tools that the company can implement to improve computer performance. The first software tool that the company can use is the CCleaner to boost computer performance. The tool automatically identifies and removes unused files and settings that occupy hard drive space; thus, negatively inhibiting a computer’s ability to operate as required. CCleaner is an optimization application aimed at improving computer performance (CCleaner, 2021). It analyzes a computer system and automatically determines quick measures to tune and update it to operate faster and secure.

The company’s second tool to improve computer performance is the iolo system mechanic, which clears junk files and unwanted applications. It free up pertinent computer system resources by eradicating browsing activity traces to safeguard the company’s privacy. The iolo mechanic system significantly improves speed, making it the most preferred PC optimizer (Baxter, 2021). These software tools are critical tools that the company can implement to boost its computer performance.

Policy measures: Computer viruses have posed severe threats to organizations due to their imminent danger to data security. Thus, the company should have stringent policy measures to curb virus attacks on their computer systems. The first policy that the firm should implement is regular data and system auditing to ascertain malware and viruses in a company’s computer system. In most cases, computer viruses can replicate without the users’ intervention; however, the programs will continue to self-replicate (Joshi & Patil, 2012). They can also exist in a company’s computer system without them noticing. As a result, the company should adopt a policy that encourages regular audits of their computer systems by experts to ascertain the presence of viruses to initiate prompt measures to prevent their systems from virus attacks.

Worry about your grades?
See how we can help you with our essay writing service.
LEARN MORE

The second policy measure that the company should implement to prevent virus attacks on their computer systems should restrict access to their system. The policy should outline the need for the company to have a complex password comprising of letters, symbols, and numbers that cannot easily be guessed by other people (Joshi & Patil, 2012). Password policy by the company should also show the responsible personnel with every unit entrusted with the firm’s passwords to restrict access and make it easy for the management to summon such individuals in case of a challenge. Finally, the policy should outline the need to regularly change the password to curb virus attacks on their computer system after a particular period.

Finally, the company should have a policy on training to sensitize their staff on virus attacks and the possible ways of curbing it. Cybersecurity has become an issue of concern in contemporary society. In most cases, it occurs through the actions of innocent individuals who are uninformed about such activities. The policy should highlight the need for the company to train its staff on smart internet practices. The training may include warning them not to open emails and links from unknown sources.

References

Baxter, D. (2021). The best free PC cleaner 2021. https://www.techradar.com/best/pc-optimizer

CCleaner (2021). Version history. https://www.ccleaner.com/ccleaner/version-history

Joshi, M. & Patil, B. (2012). Computer virus: Their problems and major attacks in real life. Journal of advanced computer science and technology. 1(4): 206-208. https://www.researchgate.net/publication/274468580_Computer_Virus_Their_Problems_Major_at-tacks_in_Real_Life

Khan, H., Syed, A., Mohammad, A. & Halgamuge, M. (2017). Computer virus and protection methods using lab analysis. https://www.researchgate.net/publication/318109981_Computer_Virus_and_Protection_Methods

_Using_Lab_Analysis

Touchette, T., Hewitt, B. & Huson, M. (2012). Password security: what factors influence good password practices? https://www.researchgate.net/publication/305943216_PASSWORD_SECURITY_WHAT_FACTORS

_INFLUENCE_GOOD_PASSWORD_PRACTICES

Cite this page

Choose cite format:
APA
MLA
Harvard
Vancouver
Chicago
ASA
IEEE
AMA
Copy
Copy
Copy
Copy
Copy
Copy
Copy
Copy
Online Chat WhatsApp Messenger Email
+44 800 520 0055