Human vs computer viruses

In light of raised public awareness since the outbreak of the virus causing CODID-19, I thought it might be useful to compare & contrast aspects of human & computer viruses.

Security experts be aware that I will be generalising for the majority audience so I acknowledge that there are exceptions to some of the following statements.

The normal course of events:

A virus is not targeted at you. It just attacks wherever it lands. Some attacks will be unsuccessful, such as when the victim already has the antidote.

Some exposed to the virus may be more vulnerable to it’s attack than others.

Upon a successful infection, there will usually be a time delay before any symptoms show.

Even during this period without any symptoms, the victim may be spreading the virus.

Some may never show any symptoms but still act as a carrier spreading the virus.

If the virus does successfully cause the victim harm, the level may vary between victims.

Some may simply suffer poor performance but otherwise still function OK. Some may die.

Considerations for prevention:

The more places you visit, the more likely you are to visit a place where there are viruses.

You are more likely to get infected by those you deal with most often or most closely.

The bigger the family the bigger the risk & impact.

You cannot achieve 100% safe isolation while still functioning in the real world.

Everyone following basic hygiene is more effective than you on your own in a hazmat suit.

It is far better to assume you are attacked constantly. Plan & behave accordingly.

Where it’s different for computers:

When we say a computer is ‘dead’, they are rarely permanently irrecoverable: Backups!

Computers in a company are like a really big family which increases the risk & the impact.

The Internet enables billions of devices to reach other devices anywhere in seconds.

When a cure is found for a computer virus, it’s creator can learn & develop a better one.

The bottom line:

Would you go naked dumpster diving with open wounds in a medical waste bin?

But some people go looking for something too good to be true in dangerous places like pirate sites, without AV software or even the latest updates. 

Great article by Phill Rogers

Like
Reply

To view or add a comment, sign in

More articles by Phill Rogers

  • Outsourced IT: Value vs Responsiveness

    Any business function unit which must always be available to its users, needs at least 3 staff to cover planned &…

    2 Comments
  • Think of computers like vehicles

    Very handy for getting more done faster but can easily become a liability if neglected or used without due caution…

    2 Comments
  • Know where your data is.

    Some thoughts / advice for computer users to avoid grief from the loss of something important to you. Know where your…

    1 Comment

Explore content categories