Computer Viruses and Related Threats
Computer Viruses and Related Threats
ENY 5810 Computer Viruses and Related Threats 02-J T.J. Walker 1999
ENY 5810 Computer Viruses and Related Threats 02-J / Page 2
• Don’t try to start your computer with a disk in the floppy drive. It won’t
start anyway until you remove the floppy, and, in its attempt to start, it may
become infected with a boot sector virus that the disk picked up elsewhere.
The normal boot sequence (i.e., the order in which drives are checked for the start-up files)
is A:, C:. This allows you to start your computer with a “boot disk” even if something is
wrong with the start-up files on the hard drive or with the hard drive itself.
• Be wary of free programs, especially if you do not know their origins (for
instance, if they arrive as attachments to e-mail from unknown senders.)
You can never be sure that an undetected virus won’t destroy your files or make
them inaccessible. For that matter, you can lose your work in a variety of other
ways (hard disk crash; sabotage by a spurned lover, loss of computer by fire or
theft, etc.). Therefore you should make regular backups of the files you value
and, for especially important ones, you should keep one set of backups in a
building other than the one that houses your computer.
Some details
The text below is copied (with deletions) from National Institute of Standards and
Technology Special Publication 500-166: “Computer viruses and related threats: a
management guide,” by J. P. Wack and L. J. Carnahan, 1989. (http://csrc.nist.gov/
nistpubs/sp500166.txt) [Being a U.S. government document, it is in the public domain.]
Computer viruses are the most widely recognized example of a class of programs
written to cause some form of intentional damage to computer systems or
networks. A computer virus performs two basic functions: it copies itself to other
programs, thereby infecting them, and it executes the instructions the author has
included in it. Depending on the author's motives, a program infected with a virus
may cause damage immediately upon its execution, or it may wait until a certain
event has occurred, such as a particular date and time. The damage can vary
widely, and can be so extensive as to require the complete rebuilding of all system
software and data. Because viruses can spread rapidly to other programs and
systems, the damage can multiply geometrically.
Related threats include other forms of destructive programs such as Trojan horses
and network worms. Collectively, they are sometimes referred to as malicious
software. These programs are often written to masquerade as useful programs, so
that users are induced into copying them and sharing them with friends and work
colleagues. The malicious software phenomena is fundamentally a people
problem, as it is authored and initially spread by individuals who use systems in
an unauthorized manner. Thus, the threat of unauthorized use, by unauthorized
and authorized users, must be addressed as a part of virus prevention.
The term computer virus is often used in a general sense to indicate any software
that can cause harm to systems or networks. However, computer viruses are just
one example of many different but related forms of software that can act with
great speed and power to cause extensive damage -other important examples are
Trojan horses and network worms. In this document, the term malicious
software refers to such software.
Trojan Horses
A Trojan horse program is a useful or apparently useful program or command
procedure containing hidden code that, when invoked, performs some unwanted
ENY 5810 Computer Viruses and Related Threats 02-J / Page 3
function. An author of a Trojan horse program might first create or gain access to
the source code of a useful program that is attractive to other users, and then add
code so that the program performs some harmful function in addition to its useful
function. A simple example of a Trojan horse program might be a calculator
program that performs functions similar to that of a pocket calculator. When a
user invokes the program, it appears to be performing calculations and nothing
more, however it may also be quietly deleting the user's files, or performing any
number of harmful actions. An example of an even simpler Trojan horse program
is one that performs only a harmful function, such as a program that does nothing
but delete files. However, it may appear to be a useful program by having a name
such as CALCULATOR or something similar to promote acceptability.
Trojan horse programs are introduced into systems in two ways: they are initially
planted, and unsuspecting users copy and run them. They are planted in software
repositories that many people can access, such as on personal computer network
servers, publicly-accessible directories in a multi-user environment, and software
bulletin boards. Users are then essentially duped into copying Trojan horse
programs to their own systems or directories. If a Trojan horse program performs
a useful function and causes no immediate or obvious damage, a user may
continue to spread it by sharing the program with other friends and co-workers.
Trojan horse programs are named after the use of a hollow wooden horse filled with enemy
soldiers used to gain entry into the city of Troy in ancient Greece.
Computer Viruses
Computer viruses, like Trojan horses, are programs that contain hidden code
which performs some usually unwanted function. Whereas the hidden code in a
Trojan horse program has been deliberately placed by the program's author, the
hidden code in a computer virus program has been added by another program, that
program itself being a computer virus or Trojan horse. Thus, computer viruses are
programs that copy their hidden code to other programs, thereby infecting them.
Once infected, a program may continue to infect even more programs. In due
time, a computer could be completely overrun as the viruses spread in a geometric
manner.
An example illustrating how a computer virus works might be an operating
system program for a personal computer, in which an infected version of the
operating system exists on a diskette that contains an attractive game. For the
game to operate, the diskette must be used to boot the computer, regardless of
whether the computer contains a hard disk with its own copy of the (uninfected)
operating system program. When the computer is booted using the diskette, the
infected program is loaded into memory and begins to run. It immediately
searches for other copies of the operating system program, and finds one on the
hard disk. It then copies its hidden code to the program on the hard disk. This
happens so quickly that the user may not notice the slight delay before his game is
run. Later, when the computer is booted using the hard disk, the newly infected
version of the operating system will be loaded into memory. It will in turn look
for copies to infect. However, it may also perform any number of very destructive
actions, such as deleting or scrambling all the files on the disk.
ENY 5810 Computer Viruses and Related Threats 02-J / Page 4