0% found this document useful (0 votes)
21 views7 pages

Eden Solomon Computing Science Assignment

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views7 pages

Eden Solomon Computing Science Assignment

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

St.

Mary’s University
INDIVIDUAL ASSGINMENT
DEPRTMENT OF COMPUTER SINCE

Name: Eden Solomon


ID NO: RCD/0158/2015/A

SUBMITTED TO: Woubshet Bekele


Introduction

Computer viruses are often designed to maliciously corrupt or steal data from
individuals. Sometimes, they can even cause computers to stop working all together.

Computer viruses are different from computer worms. A virus attaches itself to other programs,
while a worm is a self-contained program that is able to spread copies of itself to other
computers without attaching itself to other programs.

Some viruses and worms, coming as attachments in an email, look like a jpg file —for example,
MerryChristmas.jpg! But if your extensions/suffixes were showing, you would see that this is
really a file named MerryChristmas.jpg.exe, and clicking on it would cause it to execute, firmly
embedding itself on your computer. Fix your operating systems preferences so that
extensions/suffixes always show!

Historical Background of Computer Virus

The concept of a computer virus was first introduced in 1949 by computer scientist John von
Neumann.

1971
The first computer virus was born the same year Intel released its first commercially available
microprocessor. It was created as an experiment by BBN Technologies in the US to check if it’s
possible to self-replicate a program. When a virus attacked a computer, it displayed a message
saying: “I’m a creeper, catch me if you can”. That’s where its name comes from - Creeper.

1974
The mid-1970s welcomed the Rabbit virus. As you can tell from its name, this virus was very active.
It self-replicated with the speed of lightning and crashed system performance just as quickly.

A year later, the first Trojan was developed called ANIMAL.


1982
In 1982, the first PC virus was created, and not by a criminal mastermind, as you might think. No,
Rich Skrenta, its creator, was a 15-year-old schoolboy at the time. The virus’s name was Elk Cloner.
It was spread through a floppy disc with a game on it and attached itself to the Apple II operating
system. When the game was launched for the 50th time, the screen showed this poem instead of
the game.
Different Types of Computer Virus
File infectors: are a type of computer virus that infects executable files, such as .exe or .com files,
by inserting their own code into the file. When the infected file is executed, the virus code is also
executed, allowing the virus to spread to other files on the system. File infectors can also modify or
corrupt existing files, making them unusable.
Boot sector viruses: is a type of computer virus that infects the boot sector of a storage device,
such as a hard drive or floppy disk. The boot sector is the first sector of the storage device and contains
important information that is used to boot the operating system. When a computer is turned on, the
BIOS (Basic Input/Output System) reads the boot sector and loads the operating system into memory. A
boot sector virus infects the boot sector by replacing the existing code with its own code. When the
infected computer is booted up, the virus code is executed instead of the original code, allowing the
virus to take control of the computer. Boot sector viruses can spread to other storage devices by
infecting them when they are accessed by an infected computer. Boot sector viruses were more
common in the past when floppy disks were widely used as a means of transferring data between
computers. However, they can still be found today, particularly in older systems that have not been
updated with modern security software.
Macro viruses: is a type of computer virus that infects macro-enabled documents, such as
Microsoft Word or Excel files. Macros are small programs that automate repetitive tasks within these
documents. Macro viruses are designed to exploit the macro programming language to execute
malicious code on a victim's computer.
When a macro-enabled document infected with a macro virus is opened, the virus code is executed
automatically without the user's knowledge or consent. The virus can then spread to other documents
on the victim's computer or network, potentially causing widespread damage.
Polymorphic viruses: is a type of malware that has the ability to change its code or signature
each time it infects a new file or system. This makes it difficult for antivirus software to detect and
remove the virus, as the virus appears as a new variant each time it infects a new host. Polymorphic
viruses achieve this by using encryption and obfuscation techniques to modify their code, making it
difficult for antivirus software to recognize the virus's signature.

Polymorphic viruses can be spread through various means, including email attachments, infected
websites, and infected software downloads. Once a system is infected with a polymorphic virus, the
virus can spread to other systems on the same network or through removable media such as USB drives.

Stealth viruses: These viruses are designed to hide themselves from antivirus software by
intercepting requests from the operating system and returning false information.
One of the key characteristics of a stealth virus is its ability to modify or manipulate the operating
system in order to conceal its presence. This may involve altering system files or registry entries, or using
rootkit technology to hide its processes and files from view. In some cases, a stealth virus may even be
able to intercept and modify system calls in order to avoid detection.
Another common feature of stealth viruses is their ability to spread rapidly and infect other systems
without being detected. This may involve exploiting vulnerabilities in network protocols or applications,
or using social engineering tactics such as phishing emails or fake software updates.

Multipartite viruses: are a type of computer virus that infects multiple parts of a computer
system, including the boot sector, executable files, and system files. These viruses are particularly
dangerous because they can spread quickly and are difficult to detect and remove.
Multipartite viruses typically infect a computer system in two stages. In the first stage, the virus infects
the boot sector of the hard drive or floppy disk. This allows the virus to load into memory every time the
computer is started up or the disk is inserted. In the second stage, the virus infects executable files on
the computer, which allows it to spread to other systems through infected files.

Direct action viruses: type of computer virus that are designed to take action immediately upon
infecting a system. These viruses typically do not remain dormant or hidden on a system, but instead
immediately begin to execute their payload. This can include deleting files, corrupting data, or spreading
the virus to other systems.

One of the defining characteristics of direct action viruses is that they do not require any user
interaction in order to execute their payload. Instead, they are typically designed to automatically
execute as soon as the infected file is opened or executed. This can make them particularly dangerous,
as users may not even be aware that their system has been infected until it is too late.

Worms: are a type of computer virus that can replicate themselves and spread to other computers
without any human intervention. Unlike other viruses, worms do not need to attach themselves to a
program or file in order to infect a computer. Instead, they exploit vulnerabilities in operating systems
and network protocols to spread from one computer to another.

Once a worm infects a computer, it can perform a variety of malicious actions, such as stealing sensitive
information, deleting files, or using the infected computer as part of a larger botnet to launch attacks on
other computers. Worms can also consume large amounts of network bandwidth, slowing down or even
crashing entire networks.

The Different Ways in Which Computer Virus is transmitted


1.Email attachments: One of the most common ways in which computer viruses are
transmitted is through email attachments. Hackers can send emails with infected
attachments that, when opened, can infect the recipient's computer.

2. Infected software downloads: Another way in which computer viruses can be


transmitted is through infected software downloads. Hackers can create fake software programs that
contain viruses and distribute them through various channels, such as peer-to-peer file sharing
networks or unsecured websites.

3. Malicious websites: Visiting malicious websites can also lead to the transmission of
computer viruses. These websites may contain infected files or links that, when clicked on, can
download and install viruses onto the user's computer.

4. Removable media: Computer viruses can also be transmitted through removable media,
such as USB drives or external hard drives. If an infected device is connected to a computer, the virus
can spread to that computer.

5. Network connections: computer viruses can be transmitted through network


connections. If a computer is connected to a network and one of the other devices on that network
is infected with a virus, it can spread to other devices on the same network.

How Computer Virus Affects (Damages) the computer,


Which Part, and how

One way a computer virus can damage a computer is by infecting and corrupting files. When a virus
infects a file, it can modify or delete its contents, making it unusable or causing errors when the file
is opened. This can be particularly damaging if the file is important or necessary for the functioning
of the computer or other programs.

Another way a virus can damage a computer is by stealing personal information. Some viruses are
designed to collect sensitive information such as passwords, credit card numbers, and other personal
data. This information can then be used for identity theft or other malicious purposes.

Viruses can also cause damage to the hardware of a computer. For example, some viruses are
designed to overheat the CPU or hard drive, which can cause permanent damage to these
components. Additionally, some viruses can cause physical damage to the motherboard or other
internal components of the computer.

How to Protect the Computer from Virus Attack


Protecting a computer from virus attacks is crucial to ensure the safety and security of personal and
sensitive information. Here are some ways to protect a computer from virus attacks:
1. Install Antivirus Software: Antivirus software is designed to detect, prevent, and
remove malicious software from a computer. It is essential to install antivirus software on a
computer and keep it updated regularly. Antivirus software can scan the computer for viruses,
malware, spyware, and other malicious programs that can harm the system.

2. Keep Operating System and Software Updated: Keeping the operating system
and software updated is crucial to protect the computer from virus attacks. Updates often include
security patches that fix vulnerabilities that hackers can exploit to gain access to a computer.

3. Use Firewall: A firewall is a network security system that monitors and controls
incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier
between a trusted internal network and an untrusted external network, such as the internet. Using a
firewall can help prevent unauthorized access to a computer.

4. Be Cautious of Email Attachments: Email attachments can contain viruses or


malware that can infect a computer when opened. It is essential to be cautious of email attachments
from unknown senders or suspicious emails.

5. Use Strong Passwords: Using strong passwords can help prevent unauthorized access to
a computer or online accounts. A strong password should be at least eight characters long, include
uppercase and lowercase letters, numbers, and symbols.

6. Avoid Downloading from Untrusted Sources: Downloading software or files from


untrusted sources can put a computer at risk of virus attacks. It is essential to download software or
files only from trusted sources.

The Most Disastrous Computer Virus in History


The most disastrous computer virus in history is widely considered to be the "ILOVEYOU" virus, also
known as the "Love Bug." This virus was first detected in May 2000 and quickly spread across the
globe, infecting millions of computers and causing an estimated $10 billion in damages.

The "ILOVEYOU" virus was a type of malware that was spread through email attachments. The
subject line of the email would read "ILOVEYOU," and the attachment was labeled "LOVE-LETTER-
FOR-YOU.txt.vbs." When users opened the attachment, the virus would activate and begin
replicating itself, sending copies of the email to everyone in the user's address book.

The virus was able to spread so quickly because it exploited a vulnerability in Microsoft's Outlook
email program. Once infected, the virus would overwrite files on the user's computer and download
additional malware, including a password-stealing program.

The impact of the "ILOVEYOU" virus was felt around the world. It caused widespread disruption to
businesses and governments, with many organizations forced to shut down their email systems to
prevent further spread of the virus. The Philippines, where the virus is believed to have originated,
declared a state of emergency as government agencies and businesses struggled to contain its
spread.

In addition to its financial impact, the "ILOVEYOU" virus also highlighted the need for improved
cybersecurity measures. It prompted many organizations to invest in better antivirus software and to
educate their employees about safe computing practices.

Conclusion
A computer virus is a type of malicious software that can replicate itself and spread from one
computer to another. It is designed to cause harm, steal data, or disrupt normal computer
operations. Computer viruses can be spread through email attachments, infected software
downloads, or by exploiting vulnerabilities in operating systems or applications.
To protect against computer viruses, it is important to use antivirus software and keep it up-to-date
with the latest virus definitions. It is also important to avoid opening email attachments from
unknown sources, downloading software from untrusted websites, and clicking on suspicious links.

In conclusion, computer viruses are a serious threat to computer security and can cause significant
damage if not properly addressed. It is important for computer users to be aware of the risks and
take appropriate measures to protect their systems.

Reference

1. McAfee
2. Microsoft Security

You might also like