A virus or computer virus aims to alter the normal operation of computing devices without permission to achieve malicious purposes. Viruses replace files with infected code and can destroy data, though some only cause annoyances. Computer viruses spread through software and contain payloads with objectives from jokes to significant damage. Viruses take control of operating systems to infect executable files called for execution, completing replication.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
10 views2 pages
Virus
A virus or computer virus aims to alter the normal operation of computing devices without permission to achieve malicious purposes. Viruses replace files with infected code and can destroy data, though some only cause annoyances. Computer viruses spread through software and contain payloads with objectives from jokes to significant damage. Viruses take control of operating systems to infect executable files called for execution, completing replication.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2
VIRUS
A virus or computer virus. is software that aims to alter the normal
operation of any type of computing device, without the user's permission or knowledge, mainly to achieve malicious purposes on the device. Viruses usually replace executable files with other files infected with their code. Viruses can intentionally destroy data stored on a computer, although there are also other more harmless ones, which only cause annoyances or unforeseen events.
Computer viruses basically have the function of spreading through
software, they are very harmful and some also contain a harmful load (payload) with different objectives, from a simple joke to carrying out significant damage to systems, or blocking computer networks by generating useless traffic. The operation of a computer virus is conceptually simple. A program is executed that is infected, in most cases, due to the user's ignorance. The virus code remains stored in the computer's RAM memory, even when the program that contained it has finished executing. The virus then takes control of the basic services of the operating system, subsequently infecting executable files that are called for execution. Finally, the virus code is added to the infected program and recorded on the disk, with which the replication process is completed. The first virus attacked an IBM 360 Series machine. It was called Creeper, (ENMS) created in 1972. This program periodically emitted on the screen the message: (I'm the creeper catch me if you can!). To eliminate this problem, the first antivirus program called Reaper was created. TYPES OF COMPUTER VIRUSES Worm This virus is created with the ability to replicate between computers. It often causes network errors, as a consequence of abnormal bandwidth consumption caused by this malware. Cybercriminals often use flashy names in links for this virus to be downloaded, such as the words: sex, gambling, gift, or prize. Adware Adware are also referred to as ad-supported software. The creators of adware include advertisements or help distribute other software to earn money. They exist on all computers and mobile devices. Spyware It is a more specialized class of malware, since it is basically a spyware. Its objective is to steal all the information on your computer and pass it on to its owner. It is one of the main avenues for the success of cybercrime. Ransomware This type of malware that is much more specialized than the previous ones. It threatens to publish the victim's data or forever block access to their computer unless a fee is paid. Hence, the translation of the name is data hijacking. Botnet They are networks of infected devices that cybercriminals use to launch attacks, such as mass sending of spam emails, denial of service or DDoS attacks, credential theft, etc. Once a device is infected, it will become part of the botnet network whose objective is to continue expanding.