A computer virus is malicious software that can replicate and spread to other devices, often causing damage to systems and data. There are nine main types of viruses, including boot sector, web scripting, and macro viruses, each with distinct methods of infection and payloads. To protect against viruses, users should install antivirus software, avoid suspicious email attachments, and maintain updated systems.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
3 views9 pages
Computer Virus
A computer virus is malicious software that can replicate and spread to other devices, often causing damage to systems and data. There are nine main types of viruses, including boot sector, web scripting, and macro viruses, each with distinct methods of infection and payloads. To protect against viruses, users should install antivirus software, avoid suspicious email attachments, and maintain updated systems.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9
A computer virus is an ill-natured
software application or authored code
that can attach itself to other programs, self-replicate, and spread itself onto other devices. When executed, a virus modifies other computer programs by inserting its code into them. If the virus’s replication is successful, the affected device is considered “infected” with a computer virus. Every computer virus has a payload that performs an action. The threat actor can code any malicious activity into the virus payload, including simple, innocuous pranks that don’t do any harm. While a few viruses have harmless payloads, most of them cause damage to the system and its data. There are nine main virus types, some of which could be packaged with other malware to increase the chance of infection and damage. The nine major categories for viruses on computers are: Boot Sector Virus Your computer drive has a sector solely responsible for pointing to the operating system so that it can boot into the interface. A boot sector virus damages or controls the boot sector on the drive, rendering the machine unusable. Attackers usually use malicious USB devices to spread this computer virus. The virus is activated when users plug in the USB device and boot their machine. Web Scripting Virus Most browsers have defenses against malicious web scripts, but older, unsupported browsers have vulnerabilities allowing attackers to run code on the local device. Browser Hijacker A computer virus that can change the settings on your browser will hijack browser favorites, the home page URL, and your search preferences and redirect you to a malicious site. The site could be a phishing site or an adware page used to steal data or make money for the attacker. Resident Virus A virus that can access computer memory and sit dormant until a payload is delivered is considered a resident virus. This malware may stay dormant until a specific date or time or when a user performs an action. Direct Action Virus When a user executes a seemingly harmless file attached to malicious code, direct- action viruses deliver a payload immediately. These computer viruses can also remain dormant until a specific action is taken or a timeframe passes. Polymorphic Virus Malware authors can use polymorphic code to change the program’s footprint to avoid detection. Therefore, it’s more difficult for an antivirus to detect and remove them. File Infector Virus To persist on a system, a threat actor uses file infector viruses to inject malicious code into critical files that run the operating system or important programs. The computer virus is activated when the system boots or the program runs. Multipartite Virus These malicious programs spread across a network or other systems by copying themselves or injecting code into critical computer resources. Macro Virus Microsoft Office files can run macros that can be used to download additional malware or run malicious code. Macro viruses deliver a payload when the file is opened and the macro runs. Computer viruses are standard programs; instead of offering useful resources, these programs can damage your device. Computer viruses are typically crafted by hackers with various intentions, like stealing sensitive data to causing chaos in systems. Some hackers create these malicious programs for fun or as a challenge, while others have more sinister motives like financial gain or cyber warfare. Install antivirus software Dont’s open executable email attachment. Keep your operating system updated. Avoid questionable websites. Dont use pirated software. Use strong password. Remain vigilant. thankyou