0% found this document useful (0 votes)
71 views4 pages

System Software (Csd-224) : Assignment: 01

Computer virus countermeasures include antivirus software, firewalls, and practicing safe computing habits. A virtual private network (VPN) can protect devices on its network from viruses that try to spread over the internet, but a VPN alone does not fully prevent or remove viruses from an infected device. Regularly updating antivirus software and scanning for viruses is still needed when using a VPN.

Uploaded by

Prateek Sharma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
71 views4 pages

System Software (Csd-224) : Assignment: 01

Computer virus countermeasures include antivirus software, firewalls, and practicing safe computing habits. A virtual private network (VPN) can protect devices on its network from viruses that try to spread over the internet, but a VPN alone does not fully prevent or remove viruses from an infected device. Regularly updating antivirus software and scanning for viruses is still needed when using a VPN.

Uploaded by

Prateek Sharma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

SYSTEM SOFTWARE (CSD-224)

ASSIGNMENT: 01
COMPUTER VIRUS

Q1: What is malicious software or malware? Give some examples.


Ans: Malware is intrusive software that is designed to damage and destroy computers and
computer systems. Malware is a contraction for “malicious software”.
Examples of MALWARE are:
1. Virus:
Viruses are a subgroup of malware. A virus is malicious software attached to a
document or file that supports macros to execute its code and spread from host to host.

2. Worms:
Worms are a malicious software that rapidly replicates and spreads to any device
within the network. Unlike viruses, worms do not need host programs to disseminate.

3. Trojan Virus:
Trojan viruses are disguised as helpful software programs. But once the user
downloads it, the Trojan virus can gain access to sensitive data and then modify, block, or
delete the data.

4. Spyware:

Spyware is malicious software that runs secretly on a computer and reports back to
a remote user. Rather than simply disrupting a device’s operations, spyware targets
sensitive information and can grant remote access to predators.

5. Adware:

Adware is malicious software used to collect data on your computer usage and
provide appropriate advertisements to you.

Q2: Define computer virus? How it is similar to a biological virus?


Ans: A computer virus is a malicious program that self-replicates by copying itself to another
program. In other words, the computer virus spreads by itself into other executable code or
documents. The purpose of creating a computer virus is to infect vulnerable systems, gain
admin control and steal user sensitive data. Hackers design computer viruses with malicious
intent and prey on online users by tricking them.

SIMILARITY BETWEEN COMPUTER AND BIOLOGICAL VIRUS:


Both biological viruses and computer viruses are relatively far simpler than the host it
infects. The rhino virus which is the typical culprit for the common cold, has a few thousand base
pairs making up it's genome where as a human has more than 3 billion. That is like comparing the
length of a dime to that of Earth's equator. Similarly, computer viruses may contain as few as 6
lines of code as compared to the code base of an operating system which may have tens of millions
of lines of code.

Both types of viruses are nothing without their host. Their hosts are their means to both
increase their numbers and spreading to other hosts. Biological viruses replicate in a host then
induce the host to cough, sneeze, or release bodily fluids which spread the virus to other victims.
Computer viruses use a machine's resources to replicate itself and then send copies to other
computer using emails, messengers, or other connections.

Q3: List a few symptoms that your computer might have a virus.
Ans: Few Symptoms that a computer might have virus are :
1. Slow start up and slow performance:
If your PC is taking longer than normal to start or programs are taking ages to open, then
your PC may have a virus.
2. Suspicious hard drive activity:
An excessively active hard disk where it makes continual noise or constantly spins – even
though you’re not using your computer nor have any programs running – can be a sign your PC
is infected with a virus.
3. Lack of storage space:
If you suddenly find yourself devoid of storage space on your hard drive, a virus may be
doing its utmost to make your computer unusable.
4. Crashes and error messages:
If programs start opening and closing automatically, your system freezes or shuts down for
no reason, or you see odd error messages, then you may have a virus infection.
5. High network activity:
If your internet connection is very active even when you’re not using it, a virus may be
busy sending information back and forth across the internet.

6. Security attacks:
Some viruses are designed to disable your computer’s protection. So, if you can’t open
or install an anti-virus program or your firewall, your computer may be infected.
7. Missing files :
Some malware cause problems by deleting files and programs or moving them around.
Some may encrypt your files so you aren’t able to open them.

Q4: How do computer virus spread?


Ans: The Computer virus spread by following ways:
1. Email attachments and Malicious Embedded Website Links:
Most computer users became familiar with the high occurrences of email attachments
carrying viruses many years ago. Back in the early days of Microsoft Outlook Express, the
email client would automatically open email attachments, with little user input. Now the email
clients don't automatically open accompanying attachments and the mail preview option can be
disabled. And since those changes were put into place, computer viruses spreading through
email messages have decreased.
2. Computer Networks:
If your computer is connected to a home network or it's part of a workgroup or domain,
your computer could acquire a virus without you being at fault. Another person in your home
or office employee at your job could unknowing download an infected file and then quickly
spread it throughout your entire home or office network in a very short time, causing
slowdowns, data corruption and possibly data loss. You should always have a reputable
anti-virus installed and updated on any computer that you use.
3. Infected Computer Software:
There are countless games, productivity software packages, web browser add-ons, high
definition video and high quality audio files available online for download. And a great deal
of those are free. Unfortunately even though they may claim to be free, they may have
strings attached. Many of those free programs include malicious files that were
intentionally added to help pay for the work that was put into creating those applications
and games. While other online software files are infected with Trojans without the software
creator's consent or approval.
4. Fake Programs/Trojans:
Rogue programs such as fake anti-virus and security utilities are one of the most frequent
ways that online users acquire computer viruses today. It's very irritating to download a
program that you think will help keep your computer data safe, when in fact the fake anti-virus
software that you download and install is actually exactly what you're trying to protect yourself
against.
5. Infected Websites:
Unsuspecting online users may become infected with computer viruses, Trojans and also
ransomware from intentionally malicious websites and also websites that have been
compromised. Depending on the currently installed operating system and also the installed
software on a website visitor’s system, drive-by installations of malicious software can easily
occur. While visiting a malicious website, without warning malicious programs can be installed
on visitor’s computers without their consent or input.

Q5: Describe different types of computer viruses ( classification of computer


viruses)?
Ans: Various types of virus :
1. File Virus:
This type of virus infects the system by appending itself to the end of a file. It changes
the start of a program so that the control jumps to its code. After the execution of its code,
the control returns back to the main program. Its execution is not even noticed. It is also
called Parasitic virus because it leaves no file intact but also leaves the host functional.
2. Boot sector Virus :
It infects the boot sector of the system, executing every time system is booted and
before operating system is loaded. It infects other Bootable media like floppy disks. These
are also known as memory virus as they do not infect file system.

3. Macro Virus :
Unlike most virus which are written in low-level language(like C or assembly
language), these are written in high-level language like Visual Basic. These viruses are
triggered when a program capable of executing a macro is run. For example, macro virus
can be contained in spreadsheet files.
4. Polymorphic Virus:

A virus signature is a pattern that can identify a virus(a series of bytes that make up
virus code). So in order to avoid detection by antivirus a polymorphic virus changes each
time it is installed. The functionality of virus remains same but its signature is changed.

5. Stealth Virus:
It is a very tricky virus as it changes the code that can be used to detect it. Hence, the
detection of virus becomes very difficult. For example, it can change the read system call
such that whenever user asks to read a code modified by virus, the original form of code is
shown rather than infected code.

Q6: What are the several computer virus countermeasures? Does a virtual
private network (VPN) protect against viruses?
Ans:

You might also like