Eden Solomon Computing Science Assignment
Eden Solomon Computing Science Assignment
Mary’s University
INDIVIDUAL ASSGINMENT
DEPRTMENT OF COMPUTER SINCE
Computer viruses are often designed to maliciously corrupt or steal data from
individuals. Sometimes, they can even cause computers to stop working all together.
Computer viruses are different from computer worms. A virus attaches itself to other programs,
while a worm is a self-contained program that is able to spread copies of itself to other
computers without attaching itself to other programs.
Some viruses and worms, coming as attachments in an email, look like a jpg file —for example,
MerryChristmas.jpg! But if your extensions/suffixes were showing, you would see that this is
really a file named MerryChristmas.jpg.exe, and clicking on it would cause it to execute, firmly
embedding itself on your computer. Fix your operating systems preferences so that
extensions/suffixes always show!
The concept of a computer virus was first introduced in 1949 by computer scientist John von
Neumann.
1971
The first computer virus was born the same year Intel released its first commercially available
microprocessor. It was created as an experiment by BBN Technologies in the US to check if it’s
possible to self-replicate a program. When a virus attacked a computer, it displayed a message
saying: “I’m a creeper, catch me if you can”. That’s where its name comes from - Creeper.
1974
The mid-1970s welcomed the Rabbit virus. As you can tell from its name, this virus was very active.
It self-replicated with the speed of lightning and crashed system performance just as quickly.
Polymorphic viruses can be spread through various means, including email attachments, infected
websites, and infected software downloads. Once a system is infected with a polymorphic virus, the
virus can spread to other systems on the same network or through removable media such as USB drives.
Stealth viruses: These viruses are designed to hide themselves from antivirus software by
intercepting requests from the operating system and returning false information.
One of the key characteristics of a stealth virus is its ability to modify or manipulate the operating
system in order to conceal its presence. This may involve altering system files or registry entries, or using
rootkit technology to hide its processes and files from view. In some cases, a stealth virus may even be
able to intercept and modify system calls in order to avoid detection.
Another common feature of stealth viruses is their ability to spread rapidly and infect other systems
without being detected. This may involve exploiting vulnerabilities in network protocols or applications,
or using social engineering tactics such as phishing emails or fake software updates.
Multipartite viruses: are a type of computer virus that infects multiple parts of a computer
system, including the boot sector, executable files, and system files. These viruses are particularly
dangerous because they can spread quickly and are difficult to detect and remove.
Multipartite viruses typically infect a computer system in two stages. In the first stage, the virus infects
the boot sector of the hard drive or floppy disk. This allows the virus to load into memory every time the
computer is started up or the disk is inserted. In the second stage, the virus infects executable files on
the computer, which allows it to spread to other systems through infected files.
Direct action viruses: type of computer virus that are designed to take action immediately upon
infecting a system. These viruses typically do not remain dormant or hidden on a system, but instead
immediately begin to execute their payload. This can include deleting files, corrupting data, or spreading
the virus to other systems.
One of the defining characteristics of direct action viruses is that they do not require any user
interaction in order to execute their payload. Instead, they are typically designed to automatically
execute as soon as the infected file is opened or executed. This can make them particularly dangerous,
as users may not even be aware that their system has been infected until it is too late.
Worms: are a type of computer virus that can replicate themselves and spread to other computers
without any human intervention. Unlike other viruses, worms do not need to attach themselves to a
program or file in order to infect a computer. Instead, they exploit vulnerabilities in operating systems
and network protocols to spread from one computer to another.
Once a worm infects a computer, it can perform a variety of malicious actions, such as stealing sensitive
information, deleting files, or using the infected computer as part of a larger botnet to launch attacks on
other computers. Worms can also consume large amounts of network bandwidth, slowing down or even
crashing entire networks.
3. Malicious websites: Visiting malicious websites can also lead to the transmission of
computer viruses. These websites may contain infected files or links that, when clicked on, can
download and install viruses onto the user's computer.
4. Removable media: Computer viruses can also be transmitted through removable media,
such as USB drives or external hard drives. If an infected device is connected to a computer, the virus
can spread to that computer.
One way a computer virus can damage a computer is by infecting and corrupting files. When a virus
infects a file, it can modify or delete its contents, making it unusable or causing errors when the file
is opened. This can be particularly damaging if the file is important or necessary for the functioning
of the computer or other programs.
Another way a virus can damage a computer is by stealing personal information. Some viruses are
designed to collect sensitive information such as passwords, credit card numbers, and other personal
data. This information can then be used for identity theft or other malicious purposes.
Viruses can also cause damage to the hardware of a computer. For example, some viruses are
designed to overheat the CPU or hard drive, which can cause permanent damage to these
components. Additionally, some viruses can cause physical damage to the motherboard or other
internal components of the computer.
2. Keep Operating System and Software Updated: Keeping the operating system
and software updated is crucial to protect the computer from virus attacks. Updates often include
security patches that fix vulnerabilities that hackers can exploit to gain access to a computer.
3. Use Firewall: A firewall is a network security system that monitors and controls
incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier
between a trusted internal network and an untrusted external network, such as the internet. Using a
firewall can help prevent unauthorized access to a computer.
5. Use Strong Passwords: Using strong passwords can help prevent unauthorized access to
a computer or online accounts. A strong password should be at least eight characters long, include
uppercase and lowercase letters, numbers, and symbols.
The "ILOVEYOU" virus was a type of malware that was spread through email attachments. The
subject line of the email would read "ILOVEYOU," and the attachment was labeled "LOVE-LETTER-
FOR-YOU.txt.vbs." When users opened the attachment, the virus would activate and begin
replicating itself, sending copies of the email to everyone in the user's address book.
The virus was able to spread so quickly because it exploited a vulnerability in Microsoft's Outlook
email program. Once infected, the virus would overwrite files on the user's computer and download
additional malware, including a password-stealing program.
The impact of the "ILOVEYOU" virus was felt around the world. It caused widespread disruption to
businesses and governments, with many organizations forced to shut down their email systems to
prevent further spread of the virus. The Philippines, where the virus is believed to have originated,
declared a state of emergency as government agencies and businesses struggled to contain its
spread.
In addition to its financial impact, the "ILOVEYOU" virus also highlighted the need for improved
cybersecurity measures. It prompted many organizations to invest in better antivirus software and to
educate their employees about safe computing practices.
Conclusion
A computer virus is a type of malicious software that can replicate itself and spread from one
computer to another. It is designed to cause harm, steal data, or disrupt normal computer
operations. Computer viruses can be spread through email attachments, infected software
downloads, or by exploiting vulnerabilities in operating systems or applications.
To protect against computer viruses, it is important to use antivirus software and keep it up-to-date
with the latest virus definitions. It is also important to avoid opening email attachments from
unknown sources, downloading software from untrusted websites, and clicking on suspicious links.
In conclusion, computer viruses are a serious threat to computer security and can cause significant
damage if not properly addressed. It is important for computer users to be aware of the risks and
take appropriate measures to protect their systems.
Reference
1. McAfee
2. Microsoft Security