0% found this document useful (0 votes)
25 views4 pages

XII T&CA Computer Virus Exercise Solution

A computer virus is a malicious program that can replicate itself and infect other programs without user knowledge, potentially causing harm to the system. Various types of viruses include boot sector viruses, companion viruses, email viruses, macro viruses, worms, and Trojan horses, each with distinct characteristics and effects. Protection against viruses involves using antivirus software, firewalls, and safe browsing practices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
25 views4 pages

XII T&CA Computer Virus Exercise Solution

A computer virus is a malicious program that can replicate itself and infect other programs without user knowledge, potentially causing harm to the system. Various types of viruses include boot sector viruses, companion viruses, email viruses, macro viruses, worms, and Trojan horses, each with distinct characteristics and effects. Protection against viruses involves using antivirus software, firewalls, and safe browsing practices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 4
Class XII T&CA| Computer Virus Exercise Solution 1.Define Computer Virus. ‘A Computer virus is a small program that which can attach it or infect the other programs as well as replicate itself without the knowledge of the user, like its biological counterpart, and runs against user's wishes. ‘A computer virus is a type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another. A virus operates by inserting or attaching itself to a legitimate program or document that supports macros in order to execute its code. In the process, a virus has the potential to cause unexpected or damaging effects, such as harming the system software by corrupting or destroying data. Some examples are aS SS Morris Worm Nimda ILOVEYOU SQL Slammer __Stuxnet CryptoLocker — Conficker Tinba Welchia Shlayer 2. What is a virus? How does it differ from an ordinary progr: 2, A virus is a small program written with malicious tar ordinary program is written to do something meaningful harmless wee 3, How can you protect your computer from virutow\ 0 . Use antivirus protection and a firewall. . Get antispyware software. . Always keep your antivirus protection and antispyware software up-to-date. : Update your operating system regularly. . Increase your browser security settings. . Avoid questionable Websites. . Only download software from sites you trust. ~“ 4, What is the sitoronea NOs the computer virus and biological virus? Biological Virus Computer Virus Parasitism | Replicates only inside the cells ofa | Replicates by copyingitself into | living organism using their other computer programs. Invisible | Replicates inside an organism fora _ | Can be programmed to cause harm Phase while without any symptoms; known | only aftera certain event, such as as the incubation period. the launch of an app. | Mutation | Can produce copies with mutations | Can change the code in its copies that may become resistant to to avoid detection by antivirus antibodies and drugs. software. Self- Can attack and/or compromise the | Can block antivirus software to Defense _| immune system to protect itself. protect itself. 5. What are the various types of viruses? Outline the net effect of each Boot Sector Virus Aboot sector virus damages or controls the boot sector on the drive, rendering the machine unusable. The virus is activated when users plug in the USB device and boot their machine. After the introduction of boot-sector safeguards with the Operating Systems, itis not possible for boot-sector viruses to infect the Computer. Examples of boot viruses include: Polyboot.B, Joshi, Gravity, AntiEXE and Cbrain virus. Companion Virus a companion virus is computer virus which does not modify any files. Instead, it creates a copy of the file and places a different extension on it, usually com. Some examples include: Stator, Asimov.1539, Stator and Terrax.1069* 9S Emi ‘us SS An email virus is malicious software or a program that attaches itself t in Ito infiltrate and infect your computer. Email viruses almost always are lit malware or ) . three ways it can be mropogg® ‘An Email Virus in Phishing Email Email Vrs in an Altachment ¢ An Email Vitus in the Body ofthe Email ge point of time but they do not replicate. It is se d upon the host network only when certain conditions are met. Logic bo! soo their functions, or launch their payload, once a certain condition is met suc! the termination of an employee. Macro Virus \ AMAC or Macro Virus is a vi ich spreads to other computers through software programs that utilize ma se Viruses infect the files created using some applications or progr contain macros such as doc, pps, xls and mdb. Examples of maer« lax, Melissa.A, Bablas, O97M/Y2K. They usually fi es inside the computer memory and get activated during the start of OS an infecting other opened files. They are hidden in RAM. Cross-Sité\ Scripting Virus Cross-site Scripting (XSS) is a client-side code injection attack. The attacker aims to execute malicious scripts in a web browser of the vietim by including malicious code in a legitimate web page or web application. The actual attack occurs when the victim visits the web page or web application that executes the malicious code. WORM The Worm is very similar to a virus and has the ability to self-replicate itself and infect the computer also It does not modity a program like a virus; however, it replicates so much that it consumes the resources of the computer and makes it slow. Worms are independent programs while viruses attach themselves to another program. Examples of Worm: Lovgate.F, Sobig.D, Trile.C, PSWBugbear.B, Mapson, Code Red, Nimda l 1 l 1 l 1 l 1 l 1 l 1 l 1 l 1 l 1 l 1 Logic Bomb Na I Logic bombs and time bombs are small males jgrams to cause harm at a certain : l 1 l 1 l 1 l 1 l 1 l 1 l 1 l 1 l 1 l 1 1 Trojan Horse Itis similar to virus. Trojan horse is a hidden malicious code that could alter or delete the information of client computer or perform any other unauthorized function The activities of Trojans are: *Deleting data * Blocking data * Modifying data * Copying data ‘+ Disrupting the performance of computers or computer networks Trojan horse does not replicate themselves like viruses and do not infect other software. 6. What is the difference between Trojan Horses, WORM and Virus? nN Virus Worm Trojan Horse Virus is a software or Worms replicate Trojan Horse rather than computer program that itselftocausestow replicate capture some connect itself to another down the computer important information about software or computer system. a computer system ora program to harm computer computer network. system Virus replicates itself Worms are also But Trojan horse does not Virus can't be controlled by Worms canbe Like worms, Trojan horse remote. controlled by can also be controlled by remote. remote. Spreading rate of viruses are While spreading rate And spreading rate of Trojan moderate. of wormsare faster —_ horse is slow in comparison than virus and Trojan of both virus and worms horse. 6. Whatare'theleffects of a virus on the computer? ‘& Intrusive pop-ups Slow performance AS Frequent crashes > Unknown login items *& Storage space shortage > Missing files ob Increased network traffic Browser homepage change ob Hijacked email “ Disabled antivirus l 1 l 1 l 1 l 1 l 1 l 1 l 1 l 1 l 1 l 1 replicates itselt. replicate itsel. | l 1 l 1 l 1 l 1 l 1 l 1 l 1 l 1 l 1 l 1 1 7. What is meant by Anti-Virus software? Name few popular anti-virus software, Anti-virus software are software for your computer used to prevent, detect, and remove malware, including computer viruses, worms, and trojan horses. Some popular antivirus softwares are: Norton Anti-Virus McAfee Kaspersky Webroot Symantec (Norton) AVG Microsoft Security Essentials Quick Heal SN EScan xO Fill in the Blanks SS 1. A virus is inactive until you execute an infected program or appli 2. The virus was first found in 1949. 3. The biological virus contains the genetic material in the ha or RNA. RRR RRR EE 4. The full form of Virus is VITAL INFORMATION RESOURCE SEIZE. 5. Viruses do not infect Zip, rar files unless the file was Bee ior to the compression. 6. Virus can infect only computer . 7. Boot-sector virus usually exists on master to hard disks. The logic bombs are used to sabotage database. 9. The worm mostly attacks the host computers and spreads via a network_. 10. Trojan Horse does not replicate ROM viruses and do not infect other software, 11. Which operating system is less ai by the virus Linux. 12. The virus is also attached with emails. 13. Once installed, a fanewie im can be set to work in the background. \) &

You might also like