0% found this document useful (0 votes)
10 views2 pages

Virus

A virus or computer virus aims to alter the normal operation of computing devices without permission to achieve malicious purposes. Viruses replace files with infected code and can destroy data, though some only cause annoyances. Computer viruses spread through software and contain payloads with objectives from jokes to significant damage. Viruses take control of operating systems to infect executable files called for execution, completing replication.

Uploaded by

Monse Flores
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views2 pages

Virus

A virus or computer virus aims to alter the normal operation of computing devices without permission to achieve malicious purposes. Viruses replace files with infected code and can destroy data, though some only cause annoyances. Computer viruses spread through software and contain payloads with objectives from jokes to significant damage. Viruses take control of operating systems to infect executable files called for execution, completing replication.

Uploaded by

Monse Flores
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

VIRUS

A virus or computer virus. is software that aims to alter the normal


operation of any type of computing device, without the user's permission or
knowledge, mainly to achieve malicious purposes on the device. Viruses
usually replace executable files with other files infected with their code.
Viruses can intentionally destroy data stored on a computer, although there
are also other more harmless ones, which only cause annoyances or
unforeseen events.

Computer viruses basically have the function of spreading through


software, they are very harmful and some also contain a harmful load
(payload) with different objectives, from a simple joke to carrying out
significant damage to systems, or blocking computer networks by
generating useless traffic. The operation of a computer virus is
conceptually simple. A program is executed that is infected, in most cases,
due to the user's ignorance. The virus code remains stored in the computer's
RAM memory, even when the program that contained it has finished
executing. The virus then takes control of the basic services of the
operating system, subsequently infecting executable files that are called for
execution. Finally, the virus code is added to the infected program and
recorded on the disk, with which the replication process is completed.
The first virus attacked an IBM 360 Series machine. It was called Creeper,
(ENMS) created in 1972. This program periodically emitted on the screen
the message: (I'm the creeper catch me if you can!). To eliminate this
problem, the first antivirus program called Reaper was created.
TYPES OF COMPUTER VIRUSES
Worm
This virus is created with the ability to replicate between computers. It
often causes network errors, as a consequence of abnormal bandwidth
consumption caused by this malware. Cybercriminals often use flashy
names in links for this virus to be downloaded, such as the words: sex,
gambling, gift, or prize.
Adware
Adware are also referred to as ad-supported software. The creators of
adware include advertisements or help distribute other software to earn
money. They exist on all computers and mobile devices.
Spyware
It is a more specialized class of malware, since it is basically a spyware. Its
objective is to steal all the information on your computer and pass it on to
its owner. It is one of the main avenues for the success of cybercrime.
Ransomware
This type of malware that is much more specialized than the previous ones.
It threatens to publish the victim's data or forever block access to their
computer unless a fee is paid. Hence, the translation of the name is data
hijacking.
Botnet
They are networks of infected devices that cybercriminals use to launch
attacks, such as mass sending of spam emails, denial of service or DDoS
attacks, credential theft, etc. Once a device is infected, it will become part
of the botnet network whose objective is to continue expanding.

You might also like