Program Security (Final Report in ITE185)-1
Program Security (Final Report in ITE185)-1
Work?
What is a computer virus and how does it work?
Emails
Downloads
Messaging Services
Old Software
Malvertising
What can viruses do to your computer?
Boot sector virus - As the name suggests, boot sector viruses sneak into your boot sector to infect your
memory right away. These types of viruses traditionally spread through hardware, such as floppy disks,
USB drives, and CDs.
Example: The Stone virus is a well-known example of a boot sector virus. It was one
of the most widespread viruses in the early 1990s and spread through infected floppy disks.
When a computer was booted from an infected disk, the virus would immediately load into the
system’s memory, allowing it to replicate and infect the system.
Resident virus - A resident virus is another type of memory-infecting virus that sets up shop in your RAM
(random access memory), which lets the virus persist even if you remove the original infector.
Example: The CIH (Chernobyl) virus is a famous resident virus. It stays in memory
and is able to infect files as they are accessed or run. This virus caused significant damage in
the late 1990s by overwriting crucial system data
Different types of computer viruses
Multipartite virus - Increasing their power by infecting both your files and
your boot space, multipartite viruses are brutal. They’re very hard to eradicate
because they can hide themselves in either files or the boot space.
The Invader virus was one such example, which began overwriting your
hard drive as soon as you hit CTRL + ALT + DEL to try to get rid of it.
Polymorphic virus - Another stubborn type of virus, polymorphic viruses hide
by changing shape. As they replicate, their clones are all slightly different,
which helps avoid detection.
One example is the VirLock virus, which changes shape while also
incorporating a bit of ransomware that locks up your files until you pay
to release them.
Different types of computer viruses
Macro viruses are created to hide inside word document files, such as
DOC or DOCX files. When you download the file, you’ll be prompted to
enable macros — as soon as you do, you trigger the computer virus.
Infected macros have also been used in ransomware, such as the Locky
strain, which targeted healthcare institutions, encrypting their files and
demanding payment to decrypt them.
Avoiding the latest computer virus threats
There are several other symptoms of a computer virus to look out for,
including:
Excessive pop-ups
Crashing or freezing apps
Slow performance
Corrupted or deleted files
Unexplained changes to your device or account settings
Reference: https://www.avast.com/c-computer-virus