System Software (Csd-224) : Assignment: 01
System Software (Csd-224) : Assignment: 01
ASSIGNMENT: 01
COMPUTER VIRUS
2. Worms:
Worms are a malicious software that rapidly replicates and spreads to any
device within the network. Unlike viruses, worms do not need host programs
to disseminate.
3. Trojan Virus:
Trojan viruses are disguised as helpful software programs. But once the
user downloads it, the Trojan virus can gain access to sensitive data and then
modify, block, or delete the data.
4. Spyware:
Spyware is malicious software that runs secretly on a computer and
reports back to a remote user. Rather than simply disrupting a device’
s operations, spyware targets sensitive information and can grant remote
access to predators.
5. Adware:
Adware is malicious software used to collect data on your computer usage
and provide appropriate advertisements to you.
Both types of viruses are nothing without their host. Their hosts are their means
to both increase their numbers and spreading to other hosts. Biological viruses
replicate in a host then induce the host to cough, sneeze, or release bodily fluids
which spread the virus to other victims. Computer viruses use a machine's resources
to replicate itself and then send copies to other computer using emails, messengers,
or other connections.
Q3: List a few symptoms that your computer might have a virus.
Ans: Few Symptoms that a computer might have virus are :
1. Slow start up and slow performance:
If your PC is taking longer than normal to start or programs are taking ages
to open, then your PC may have a virus.
2. Suspicious hard drive activity:
An excessively active hard disk where it makes continual noise or constantly
spins – even though you’re not using your computer nor have any programs running
– can be a sign your PC is infected with a virus.
3. Lack of storage space:
If you suddenly find yourself devoid of storage space on your hard drive, a
virus may be doing its utmost to make your computer unusable.
4. Crashes and error messages:
If programs start opening and closing automatically, your system freezes or
shuts down for no reason, or you see odd error messages, then you may have a virus
infection.
5. High network activity:
If your internet connection is very active even when you’re not using it,
a virus may be busy sending information back and forth across the internet.
6. Security attacks:
Some viruses are designed to disable your computer’s protection. So, if you
can’t open or install an anti-virus program or your firewall, your computer may
be infected.
7. Missing files :
Some malware cause problems by deleting files and programs or moving them
around. Some may encrypt your files so you aren’t able to open them.
Q4: How do computer virus spread?
Ans: The Computer virus spread by following ways:
1. Email attachments and Malicious Embedded Website Links:
Most computer users became familiar with the high occurrences of email
attachments carrying viruses many years ago. Back in the early days of Microsoft
Outlook Express, the email client would automatically open email attachments,
with little user input. Now the email clients don't automatically open
accompanying attachments and the mail preview option can be disabled. And since
those changes were put into place, computer viruses spreading through email
messages have decreased.
2. Computer Networks:
If your computer is connected to a home network or it's part of a workgroup
or domain, your computer could acquire a virus without you being at fault. Another
person in your home or office employee at your job could unknowing download an
infected file and then quickly spread it throughout your entire home or office
network in a very short time, causing slowdowns, data corruption and possibly
data loss. You should always have a reputable anti-virus installed and updated
on any computer that you use.
3. Infected Computer Software:
There are countless games, productivity software packages, web browser
add-ons, high definition video and high quality audio files available online
for download. And a great deal of those are free. Unfortunately even though
they may claim to be free, they may have strings attached. Many of those free
programs include malicious files that were intentionally added to help pay
for the work that was put into creating those applications and games. While
other online software files are infected with Trojans without the software
creator's consent or approval.
4. Fake Programs/Trojans:
Rogue programs such as fake anti-virus and security utilities are one of the
most frequent ways that online users acquire computer viruses today. It's very
irritating to download a program that you think will help keep your computer data
safe, when in fact the fake anti-virus software that you download and install
is actually exactly what you're trying to protect yourself against.
5. Infected Websites:
Unsuspecting online users may become infected with computer viruses, Trojans
and also ransomware from intentionally malicious websites and also websites that
have been compromised. Depending on the currently installed operating system and
also the installed software on a website visitor’s system, drive-by installations
of malicious software can easily occur. While visiting a malicious website,
without warning malicious programs can be installed on visitor’s computers
without their consent or input.
Q5: Describe different types of computer viruses ( classification of
computer viruses)?
Ans: Various types of virus :
1. File Virus:
This type of virus infects the system by appending itself to the end of
a file. It changes the start of a program so that the control jumps to its
code. After the execution of its code, the control returns back to the main
program. Its execution is not even noticed. It is also called Parasitic virus
because it leaves no file intact but also leaves the host functional.
2. Boot sector Virus :
It infects the boot sector of the system, executing every time system is
booted and before operating system is loaded. It infects other Bootable media
like floppy disks. These are also known as memory virus as they do not infect
file system.
3. Macro Virus :
Unlike most virus which are written in low-level language(like C or
assembly language), these are written in high-level language like Visual Basic.
These viruses are triggered when a program capable of executing a macro is
run. For example, macro virus can be contained in spreadsheet files.
4. Polymorphic Virus:
A virus signature is a pattern that can identify a virus(a series of
bytes that make up virus code). So in order to avoid detection by antivirus
a polymorphic virus changes each time it is installed. The functionality of
virus remains same but its signature is changed.
5. Stealth Virus:
It is a very tricky virus as it changes the code that can be used to detect
it. Hence, the detection of virus becomes very difficult. For example, it can
change the read system call such that whenever user asks to read a code modified
by virus, the original form of code is shown rather than infected code.