CHAPTER ONE
INTRODUCTION
1.1 Background of the Study
The advent of the computer has catalyzed a transformative shift in our daily lives, resulting in an escalating reliance on this technology, which now assumes a pivotal role in households and businesses alike. This technological evolution has witnessed the digitalization and electronification of transactions across various domains, with education, healthcare, and numerous other sectors harnessing computers and technological advancements to enhance their efficacy and outcomes. The computer has assumed the status of a primary knowledge repository, being seamlessly interconnected with the vast expanse of the Internet, thus facilitating access to a plethora of scientific and informational resources, spanning written, auditory, and visual forms, which can be conveniently stored and retrieved at will. In the current epoch, we find ourselves immersed in an era marked by an information revolution, with the computer establishing itself as an indispensable constituent of human existence (Haidar, 2021).
Nevertheless, the burgeoning dependence on computers and the internet has ushered in a concomitant rise in the menace of computer virus incidents. A computer virus represents a self-replicating program replete with code that explicitly duplicates itself, enabling it to infect other programs by altering their code or their operational context. The term "harmful program code" pertains to any portion of program code that introduces functionalities deviating from the specified norms. A virus is distinguished by its capacity to autonomously replicate, often requiring minimal or no user intervention, and the progeny of such replicated programs further propagate the infection (Joshi and Patil, 2012). Over the past two decades, the proliferation of viruses has been pronounced. In 1999, the infamous Melissa virus contaminated thousands of computers, resulting in damages amounting to nearly $80 million, while the Code Red worm outbreak in 2001 inflicted losses exceeding $2 billion on systems operating Windows NT and Windows 2000 server. To streamline the process of virus creation, malicious software authors have made virus construction kits readily accessible on the internet (Dixit et al., 2012).
Viruses pose significant risks to computer systems, encompassing data destruction, system resource degradation, and the potential for keystroke logging. Recognizing the importance of maintaining virus-free computer systems is crucial for several reasons, including the complexities surrounding system management. These complexities encompass factors such as the costs associated with implementing computer-based information systems, data processing, and the production of meaningful information. Additionally, the risk of losing vital information cannot be understated. Consequently, viruses represent a substantial portion of the myriad threats faced by computer-based information systems.
In contemporary times, especially in the early 21st century, the term "virus" was once primarily associated with human health and biological viruses. In the present day, the term has expanded its domain to encompass both the realms of biological and health sciences and computer sciences. However, in the realm of computer science, it is more commonly recognized as the "computer virus" (Bhargava et al., 2022).
As today's society increasingly relies on computers, it has become imperative for personal computer users to institute comprehensive virus protection mechanisms to confront the mounting threats posed by computer viruses. Virus attacks on computers can result in significant harm, often causing substantial damage. It is essential to conduct an in-depth analysis of the actions performed by viruses within a system and the potential activities that may unfold over time. This analytical approach aids in fortifying our PCs with necessary security measures to protect sensitive information.
The objective of this research paper is to examine the impact of computer virus incidents and formulate effective strategies to mitigate these incidents among computer users. By accomplishing this objective, the study seeks to bolster the security and dependability of computer systems and contribute to the cultivation of a more secure digital environment.
1.2 Statement of the Problem
The proliferation of computer virus incidents poses a substantial threat to individuals, organizations, and society as a whole. These incidents can lead to data breaches, financial losses, and disruptions in various sectors. The problem is exacerbated by the evolving nature of computer viruses, which continue to become more sophisticated and challenging to detect and remove. This study seeks to address the impact of computer virus incidents and explore strategies to prevent them among computer users.
1.3 Aim of the Study
The aim of this study is to investigate the effect of computer virus incidents and develop effective strategies to prevent these incidents among computer users.
1.4 Objectives of the Study
This research has the following specific objectives:
- To assess the financial losses incurred as a result of computer virus incidents.
- To assess the extent of data and information loss caused by computer virus incidents
- To evaluate the level of operational disruption experienced by users as a result of computer virus incidents
- To analyze the extent of reputational damage incurred by users due to computer virus incidents
- To assess the current strategies employed by computer users to prevent computer virus incidents.
1.5 Research Questions
To address these objectives, the following research questions will guide the investigation:
- What are the financial losses incurred by users and organizations as a result of computer virus incidents?
- To what extent is data and information lost due to computer virus incidents?
- How do computer virus incidents disrupt the operations of users?
- What is the impact of computer virus incidents on the reputation of users?
- What are the strategies currently employed by computer users to prevent computer virus incidents?
1.6 Research Hypothesis
H1: There is no significant financial impact on users and organizations due to computer virus incidents.
H2: Computer virus incidents do not result in significant data and information loss.
H3: Computer virus incidents do not significantly disrupt the operations of users.
H4: Computer virus incidents do not significantly impact the reputation of users.
1.7 Justification of the Study
This study is significant for several reasons. Firstly, it addresses a pressing issue in today's digital world, where computer viruses continue to threaten the security and privacy of individuals and organizations. Understanding the impact and prevention of computer virus incidents is crucial for safeguarding digital assets and information. Secondly, the findings of this research will provide valuable insights for individuals, businesses, and policymakers to enhance their computer security measures. By identifying effective prevention strategies, this study can contribute to a safer and more secure digital environment.
1.8 Scope of the Study
This study will focus on computer virus incidents and prevention strategies among computer users in University of Nigeria, Nsuka. The research will be executed by gathering perspectives and insights from a randomized sample of individuals with computer literacy within specific universities in Nigeria.