0% found this document useful (0 votes)
58 views

Explain What Is Virus? Give Some Types of Virus?

This document defines viruses and malware, describes common types of each, and provides tips for protecting computers. It explains that viruses are malicious code that can corrupt or destroy data, while malware is intrusive software intended to damage computers. Common virus types include Trojans, spyware, adware, rootkits, and ransomware. Malware examples provided are viruses, worms, Trojan horses, spyware, adware, and ransomware. The document concludes by advising the use of antivirus software, pop-up blockers, avoiding suspicious email attachments, and keeping systems updated to help prevent malware and virus infections.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views

Explain What Is Virus? Give Some Types of Virus?

This document defines viruses and malware, describes common types of each, and provides tips for protecting computers. It explains that viruses are malicious code that can corrupt or destroy data, while malware is intrusive software intended to damage computers. Common virus types include Trojans, spyware, adware, rootkits, and ransomware. Malware examples provided are viruses, worms, Trojan horses, spyware, adware, and ransomware. The document concludes by advising the use of antivirus software, pop-up blockers, avoiding suspicious email attachments, and keeping systems updated to help prevent malware and virus infections.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

John Andre C.

Gicale ITEC 85
BSIT-2D Ms. Turla

 Explain what is Virus?


 a piece of code which is capable of copying itself and typically has a
detrimental effect, such as corrupting the system or destroying data.
 Give some types of Virus?
 1. Trojans - A Trojan (or Trojan Horse) disguises itself as legitimate
software with the purpose of tricking you into executing malicious software
on your computer.

 2. Spyware - Spyware invades your computer and attempts to steal your


personal information such as credit card or banking information, web
browsing data, and passwords to various accounts.

 3. Adware - Adware is unwanted software that displays advertisements on


your screen. Adware collects personal information from you to serve you
with more personalized ads.

 4. Rootkits - Rootkits enable unauthorized users to gain access to your


computer without being detected.

 5. Ransomware - Ransomware is designed to encrypt your files and block


access to them until a ransom is paid.

 6. Worms - A worm replicates itself by infecting other computers that are


on the same network. They’re designed to consume bandwidth and
interrupt networks.

 7. Keyloggers - Keyloggers keep track of your keystrokes on your


keyboard and record them on a log. This information is used to gain
unauthorized access to your accounts.

 Explain what is Malware?


 Malware is intrusive software that is designed to damage and destroy
computers and computer systems. Malware is a contraction for “malicious
software.” Examples of common malware includes viruses, worms, Trojan
viruses, spyware, adware, and ransomware.
John Andre C. Gicale ITEC 85
BSIT-2D Ms. Turla

 Give some types of Malware?

 1. Virus - Viruses are designed to damage the target computer or device


by corrupting data, reformatting your hard disk, or completely shutting
down your system. They can also be used to steal information, harm
computers and networks, create botnets, steal money, render
advertisements, and more.

 Computer viruses require human action to infect computers and mobile


devices and are often spread through email attachments and internet
downloads.

 2.   Worm - One of the most common types of malware, worms spread
over computer networks by exploiting operating system vulnerabilities. A
worm is a standalone program that replicates itself to infect other
computers, without requiring action from anyone.

 Since they can spread fast, worms are often used to execute a payload—
a piece of code created to damage a system. Payloads can delete files on
a host system, encrypt data for a ransomware attack, steal information,
delete files, and create botnets

 3.   Trojan Horse - A Trojan horse, or “Trojan”, enters your system


disguised as a normal, harmless file or program designed to trick you into
downloading and installing malware. As soon as you install a Trojan, you
are giving cyber criminals access to your system. Through the Trojan
horse, the cyber- criminal can steal data, install more malware, modify
files, monitor user activity, destroy data, steal financial information,
conduct denial of service (DoS) attacks on targeted web addresses, and
more. Trojan malware cannot replicate by itself; however, if combined with
a worm, the damage Trojans can have on users and systems is endless.

 4.   Spyware - Installed on your computer without your knowledge,


spyware is designed to track your browsing habits and internet activity.
Spying capabilities can include activity monitoring, collecting keystrokes,
and harvesting of account information, logins, financial data, and more.
John Andre C. Gicale ITEC 85
BSIT-2D Ms. Turla

Spyware can spread by exploiting software vulnerabilities, bundling with


legitimate software, or in Trojans.

 5.   Adware - Adware is often known for being an aggressive advertising


software that puts unwanted advertising on your computer screen.
Malicious adware can collect data on you, redirect you to advertising sites,
and change your internet browser settings, your default browser and
search settings, and your homepage. You typically pick up adware
through a browser vulnerability. Legitimate adware does exist, but it will
ask your permission first before collecting data about you.

 6.   Ransomware - According to Cybersecurity Ventures, cybercrime is


predicted to cost the world 6 trillion dollars annually by 2021. Because
ransomware generates so much money for cybercriminals, it is the type of
malware we hear the most about.

 Ransomware is a type of malware that holds your data captive and


demands payment to release the data back to you. It restricts user access
to the computer by either encrypting files on the hard drive or locking
down the system and displaying messages that are intended to force the
user to pay the attacker to release the restrictions and regain access to
the computer. Once the attacker is paid, your system and data will usually
go back to its original state.

 Difference between Virus and Malware


 The difference between Virus and Malware is that a virus is a malicious
executable code attached to another executable file which can be
harmless or modify or delete data while malware is a program designed to
gain access to computer systems, normally for the benefit of some third
party, without the user’s permission.
 Explain how can we protect Pc from malware and virus
 Use an anti-malware app - Installing an anti-malware app and keeping it
up to date can help defend your PC against viruses and other malware
(malicious software). 
 Microsoft Defender is free anti-malware software included with Windows,
and it's kept updated automatically through Windows Update. There are
John Andre C. Gicale ITEC 85
BSIT-2D Ms. Turla

also anti-malware products made by other companies that you can choose
from.
 Don't open email messages from unfamiliar senders, or email
attachments that you don't recognize - Many viruses are attached to
email messages and will spread as soon as you open the attachment. It's
best not to open any attachment unless it's something you're expecting.
For more information see: Protect yourself from phishing.

 Use a pop-up blocker with your internet browser - Pop-up windows are
small browser windows that appear on top of the website you're viewing.
Although most are created by advertisers, they can also contain malicious
or unsafe code. A pop-up blocker can prevent some or all of these
windows from appearing. The pop-up blocker in Microsoft Edge is turned
on by default.

 If you're using Microsoft Edge, make sure SmartScreen is turned on -


SmartScreen in Microsoft Edge helps protect you from phishing and
malware attacks by warning you if a website or download location has
been reported as unsafe. For more info, see What is SmartScreen and
how can it help protect me?

 Pay attention to Windows SmartScreen notifications - Be cautious


about running unrecognized apps downloaded from the Internet.
Unrecognized apps are more likely to be unsafe. When you download and
run an app from the internet, SmartScreen uses info about the app's
reputation to warn you if the app isn't well-known and might be malicious.

 Keep Windows updated - Periodically, Microsoft releases special


security updates that can help protect your PC. These updates can help
prevent viruses and other malware attacks by closing possible security
holes.
Windows Update helps to make sure that your PC receives these updates
automatically, but you may still have to restart your machine occasionally
for the updates to install completely.
John Andre C. Gicale ITEC 85
BSIT-2D Ms. Turla

 Use your internet browser's privacy settings - Some websites might try
to use your personal info for targeted advertising, fraud, and identity theft.
All modern browsers have privacy settings that you can enable to control
what sites can see or do.

 Make sure User Account Control (UAC) is turned on - When changes
are going to be made to your PC that require administrator-level
permission, UAC notifies you and gives you the chance to approve the
change. UAC can help keep viruses from making unwanted changes. To
open UAC, swipe in from the right edge of the screen, and then
tap Search. (If you're using a mouse, point to the upper-right corner of the
screen, move the mouse pointer down, and then click Search.)
Enter uac in the search box, and then tap or click Change User Account
Control settings.

 Make sure that Tamper Protection is turned on - In Windows 10 and 11


we have a feature called Tamper Protection that prevents unauthorized
apps from changing your security settings. Many viruses and malware try
to disable anti-malware software or other security settings when they're
installed in order to evade detection. See Prevent changes to security
settings with Tamper Protection for information on how to confirm that it's
turned on.

You might also like