Computer Viruses Information Technology Essay Case Study

GET HELP INSTANTLY

Place Your Question Here

Case Study on Computer Viruses Information Technology Essay

Computer Viruses

 

Type of Industry

Information Technology

Headquarters

Worldwide

Sales/Revenue

NA

Area Served

Worldwide

Number of Stores

NA

Competition

NA

USP

Lethality  

Target Group

Computer users of all ages

Products

Malicious computer programs

Website

NA

Computer Viruses Information Technology Essay Case Study Introduction

The case study on computer viruses information technology essay deals with computer virus that has been considered as a program designed to cause damage or to disrupt the normal functions of a computer and the files stored in it. The case study on computer viruses information technology essay has the potential to define computer virus that is a component of the information technology by identifying the same as a malicious programming that attach itself to a host (which is usually a program file, data file, or a file in a computer’s operations system). A SWOT and PESTLE analysis is essential to be conducted in order to strengthen the case study on computer viruses information technology essay.

Computer Viruses Information Technology Essay SWOT Analysis

Strengths

The case study on computer viruses information technology essay reveals that the primary strength of computer viruses is the lack of effective security features in many computer systems and personal computers. Computer software and hardware systems that are not protected with security measures like firewalls, anti-malware, antivirus, etc, as revealed by the case study on computer viruses information technology essay, pertain more strength to computer viruses as such lacking eventually pave the way for online predators to damage targeted machines through spreading computer viruses. Moreover, it has been observed that lack of responsibility on the part of computer users in terms of protecting the machines through inputting effective passwords also adds to the strength of computer viruses as malicious components of the information technology.

Weaknesses

The case study on computer viruses information technology essay reveals that the trend of funding for security purposes from governments and non-government agencies render the process of affecting computers by computer viruses ineffective. The case study on computer viruses information technology essay also reveals that stringent patent and online protection laws also add to the weakness of the computer viruses. Moreover, strong organizational policies that compels employees and other users of the computer system to show accountability and responsibility in terms of ensuring effective password protection also contributes to the weaknesses of computer viruses. Upgrading patches and installing new security systems can also add to the weakness of computer viruses in both the short- and long-run.

Opportunities

The advent of more communication technologies with lack of protective features provides opportunities to computer viruses to spread even more, causing more damages to computer systems worldwide. The case study on computer viruses information technology essay reveals that lack of understanding of users of different online platforms about the security vulnerabilities ingrained in such platforms also provide scopes to computer viruses and their creators to cause more problems for global computer users in the future. Moreover, the case study on computer viruses information technology essay reveals that the sustaining trend among users of computer systems to refrain from changing computer passwords to random strings of numbers and letters also allow the spread of computer viruses.

Threats

The rise of more effective antivirus software and the development of more effective and efficient computer security systems pose serious threat to the process of spreading computer viruses. The case study on computer viruses technology essay reveals that thorough investment by organizations to develop robust computer security systems both offline and online also should be considered a serious threat to the process of spreading computer viruses. Besides, it has been observed that prevention of unauthorized computer access through implementation of effective monitoring strategies also poses serious threat to the business and process of spreading computer viruses for damaging computer systems.

Computer Viruses Information Technology Essay PESTLE Analysis

Political Environment

Political environment plays a crucial role in determining the efficacy or inefficiency of a technology in terms of implementation both in the short run and long run. In this respect, the technology of computer viruses is no exception. The case study on computer viruses technology essay reveals that strong political support (especially support from the governments across the globe) in development and promotion of computer safety and security technologies poses a serious threat to the spread of computer viruses. The case study on computer viruses technology essay also reveals that stringent government punitive measures against cyber criminals and cyber crimes also pose serious threats to the process of spreading computer viruses in the long run.

Need Full Solution?

Request a FREE quote now!

Ask Now

Economic Environment

Economic environment plays a decisive role in determining the success or failure of a technology. This holds true for computer viruses technology too. The case study on computer viruses technology essay reveals that steady economic growth has equipped the information technology realm with means of robustly protecting the computer systems across the globe both in the government and non-governmental sectors. This has added to the problems of computer viruses in terms of spreading and disrupting computer functions. Besides, special funding options from international technology agencies and intelligence agencies to safeguard infrastructural basis of emergency sectors in myriads of countries also poses serious threats to the process of spreading computer viruses.

Social/Socio-Cultural Environment

The case study on computer viruses technology essay reveals that the growing social trend of indulging in more unsecured online communication processes provides ample scope to online predators to instigate the spread of computer viruses on a global basis, incurring social and economic damages. It has been observed that the practice of using social networking platforms without considering the security vulnerabilities also provides scopes to computer viruses to spread on a global basis in a faster pace.

Technological Environment

If technology, on the one hand, has equipped online predators with tools for infecting computer systems, then, on the other hand, has made legal users of computer systems more capable of protecting the computer systems from malicious attacks. In this respect, the continuous development in computer protection technologies, including antivirus and antimalware technologies, deserves special mention because; such developments and advancements have made it difficult for online predators to spread computer viruses in the frequency they used to incur damage in the past.

Legal Environment

Development of stringent anti-cyber crime laws and regulations on a global basis has made it difficult for online predators to indulge frequently in the process of spreading computer viruses. Moreover, stricter and more effective cyber monitoring processes implemented by governments across the globe has also prevented the rise of the spread of computer viruses to a large extent.

Environmental Factors

Growth and development of environment-friendly and energy efficient computer protection technologies has made it easier for such technologies to appeal to the rationality of millions of computer users who are environment-conscious. This has increased the purchased of antivirus software products, contributing to the development of an online environment free of computer virus hazards.

GET 20% OFF On your first Computer Viruses Information Technology Essay Order Now

whatsApp
whatsApp