Print Article
  BookMark Article

Author Login    Author Login

Existing members will have to use the lost password facility to get new username and new password

Welcome Guest! Please login or create an account.



If you do not have an account yet, you can register ( Here ), or you may retrieve a lost user/pass ( Here ).

Navigation    Navigation

   10 newest articles RSS

Author Highlights    Featured Author

Bob Burnett

View My Bio & Articles

Shawn B White

View My Bio & Articles

Wenslow David
Will Clayton

View My Bio & Articles

Other Websites    Websites of Interest

Rampant Computer Viruses Attacks Causes Massive Failures And Disruptions

Author : Apple Tan

Computer viruses attacks have become more extensive these days, resulting in massive failures and disruptions because motive of attacks is often to disrupt operation. Viruses may multiply in the computer's machine's storage area, memory or network.
The city hall computer network of Pekin, Illinois, has been down the majority of the week as result of two separate virus incidents, city officials say. Most city employees can't access email or the document file system, or update the website. Two viruses attacked the computers and IT staff shut down the servers, Interim City Manager Frank Mackaman said.
Mackaman said the virus attacks and resulting precautionary measures "virtually paralyzed" the city for the much of the week. "In terms of the cause of this, IT says they're in the treatment phase, not the diagnosis phase," Mackaman said. "The only thing that they can definitely rule out is that the virus was not introduced by email."
Recently, Nainamo city,'s (Canada) Director of Information Technology, Per Kristensen stated that, a new type of the Qakbot virus appeared globally on March 15, 2011 and was observed in PCs in Nanaimo on March 16, 2011. To safeguard important information about the city, the system was immediately put on a halt after the staff realized that the virus was swiftly circulating from PC to PC.
Commenting on the matter, Per stated that, people can be sure that all their personal information and details are safe. He also stated that, safeguarding their private information is their main concern. The city's system would not be turned on until they are sure that they sorted out the problem, he added. The virus, which is classified as harmful, seems extremely complex, altering its signature to transfer through a computer many times. According to Per, the anti-virus firms were not able to recognize it but and as soon as they got to know that, something got through their security software, they shut down their system.
Similarly, Gholamreza Jalali, head of Iran's civilian defence, said the computer virus Stuxnet, attacked Iran's atomic program. He claimed it was the work of its two biggest foes and that the German company must take some of the blame. The Iranian military commander has accused German engineering company Siemens of helping the United States and Israel launch a cyber attack on its nuclear facilities. Iran has given few details of the impact of the virus. It said in September that staff computers at the Russian-built Bushehr nuclear power station had been hit, but that the plant itself was unharmed.
Mr. Jalali said Iran should hold Siemens responsible for the fact that its control systems used to operate complicated factory machinery -known as Supervisory Control and Data Acquisition (SCADA) -had been hit by the worm. "Our executive officials should legally follow up the case of Siemens SCADA software, which prepared the ground for the Stuxnet virus," he said. Some foreign experts have described Stuxnet as a "guided cyber missile" aimed at Iran's atomic program.
These report findings clearly points out that computer virus attacks are very common these days. One proven way to mitigate information security risks is through technical security training that will enhance the skills proficiency of the cyber security workforce. EC-Council's brand new TakeDownCon is a technical information security conference series that serves as a platform for IT security professionals to discuss and exchange views on the latest information security threats as well as remediation strategies. In addition to learning from some of the best security experts, TakeDownCon also offers highly sought after technical training courses, including the Certified Ethical Hacker (CEH) course, often touted as the world's most comprehensive ethical hacking training program.
The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.

Author's Resource Box

EC-Council is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous ethical hacking training, the Certified Ethical Hacker (CEH) course, Computer Hacking Forensics Investigator (CHFI) program, License Penetration Tester (LPT) program and various other technical security training programs offered in over 84 countries around the globe. TakeDownCon Dallas 2011, is one of the conferences of EC-Council’s Take Down information security conference series.

Article Source:

Tags:   information security conference, technical security training, ethical hacking training

Author RSS Feed   Author RSS Feed     Category RSS Feed   Category RSS Feed


  Rate This Article
Badly Written Offensive Content Spam
Bad Author Links Mis-spellings Bad Formatting
Bad Author Photo Good Article!




Submitted : 2011-04-26    Word Count : 776    Times Viewed: 399