0% found this document useful (0 votes)
36 views22 pages

Computer Virus

A computer virus is a destructive software program that replicates itself and infects other programs, leading to data corruption, functionality issues, and potential system failures. Various types of computer viruses exist, including boot sector viruses, email viruses, and Trojan horses, each with unique methods of infection and effects. Protection against viruses involves using updated antivirus software, avoiding suspicious downloads, and maintaining secure operating systems.

Uploaded by

Ismail
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views22 pages

Computer Virus

A computer virus is a destructive software program that replicates itself and infects other programs, leading to data corruption, functionality issues, and potential system failures. Various types of computer viruses exist, including boot sector viruses, email viruses, and Trojan horses, each with unique methods of infection and effects. Protection against viruses involves using updated antivirus software, avoiding suspicious downloads, and maintaining secure operating systems.

Uploaded by

Ismail
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 22

Computer Virus

Introduction
A computer virus is a software program attached to a legitimate program that is destructive in
nature and infects other programs in the system by replicating and attaching itself to other
healthy programs. These harm the computer in many ways such as:
 Corrupt and delete the data or files.
 Effect the functionality of software applications.
 Effect the Hard Disk by erasing everything.
 Use e-mail to infect the other computers.
 The processing of the computer is also affected.
 The virus also spread through the files downloaded on Internet.
 The virus cannot infect write protected disks or written documents, already compressed
file and computer hardware, it only infects software.
Computer Virus

 A Computer virus is a small program that which can attach it or


infect the other programs as well as replicate itself without the
knowledge of the user, like its biological counterpart, and runs
against user’s wishes.
 All Computer Virus are manmade. Most widespread virus infections
spread through email message attachments that activate when
opened. Internet is the main reason of Virus Infection in Computers
 Virus stands as an acronym for “Vital Information Resources Under
Seige” and this concept is not new but dates back to 1949 when John
Von Neumann introduced the concept of Self Replicating Program.
Computer Virus versus Biological Virus

Computer Virus Biological Virus


 Computer viruses are man-  Biological viruses have little
made, while biological viruses range to spread, as they have
are (mostly if not completely) to come in physical contact
natural. with their potential host to
 infect. Computer viruses can
Computer viruses cannot affect
infect through networks and
living things
that means they have a
(usually) world-wide range.
 while a biological virus could
 They both hijack their  The biological variety don’t
hosts ability to replicate do much beyond destroying
with their own ‘code’ their hosts — the effects are
largely due to what kind of
and attempt to spread the
cell they destroy. Like with
copies to other hosts. AIDS it’s immune T-cells
and thus your immune
system goes to crap.
 biological virus live on a
 Computer virus live on a
living object (Human,
computer. animals, etc)
Computer Virus Classification
Boot Sector Virus

 It is a type of virus which infects master boot record or hard disks


 The infected code runs when the system is booted from an infected disk
 They infect at a BIOS level, they use DOS commands to spread to other
floppy disks
 The computer is infected by this virus only if the virus is used to boot up
the system
 After completing the booting of the system and running the OS, the virus
cannot infect the system.
 Examples of boot viruses include: Polyboot.B, Joshi, Gravity, AntiEXE
and Cbrain virus.
Companion Virus

 Unlike traditional viruses, a companion virus is computer virus which does not
modify any files.
 Instead, it creates a copy of the file and places a different extension on it,
usually .com.
 This makes a companion virus difficult to detect, as anti-virus software tends to use
changes in files as clue.
 The companion virus is an older version of virus that was more prominent during the
MS-DOS.
 It needs human intervention to further infect a computer but after the advent of
Windows XP, as there is no use of the MS-DOS, there are fewer ways for this type of
virus to propagate itself.
 Some examples include: Stator, Asimov.1539, Stator and Terrax.1069
Email Virus

 An email virus is a virus which is attached to email communications


or sent with it.
 Many different types of email viruses work in different ways, there are
also a variety of methods used to counteract such challenging cyber
attacks.
 Email viruses also vary in many ways.
 In some cases the sender of an email virus may be unknown to a user,
or a subject line may be filled with silly text.
 In some other cases, a hacker may cleverly disguise the email as being
from a known and trusted sender.
Logic Bomb

 Logic bombs and time bombs are small malicious programs to cause harm at a certain
point of time but they do not replicate.
 They are not even programs in their own right but rather camouflaged segments of
other programs.
 A logic bomb may be implemented by someone trying to sabotage a database when
they are fairly certain they won’t be present to experience the effects, such as full
database deletion.
 In these instances, logic bombs are programmed to exact revenge or sabotage work.
 For example, a programmer could delete the critical sections of code by establishing a
logic bomb if he/she is terminated from the company.
 Logic bombs are most commonly installed by the insiders who have the access to the
system.
Macro Virus

 A MAC or Macro Virus is a virus which spreads to other computers


through software programs that utilize macros
 These viruses infect the files created using some applications or programs
that contain macros such as doc, pps, xls and mdb
 For example, Microsoft Word and Microsoft Excel are two popular and
widely used programs which have the capability of executing macros.
 They automatically infect the files, templates and documents with macros
that are contained in the file.
 They hide in documents shared through e-mail and networks.
 Examples of macro viruses: Relax, Melissa.A, Bablas, O97M/Y2K.
Cross-Site Scripting Virus

 It is called Cross-site scripting (XSS).


 It is an injection attack which is carried out on Web applications
that accept input, but do not properly separate data and executable
code before the input is delivered back to a user’s browser.
 It mostly uses the vulnerable website as a vehicle to deliver a
malicious script to the victim’s browser.
 During the page loading, the malicious script execute making the
user unable to avoid the attack.
 The best example of XSS is Java-Script
Worm

 The Worm is very similar to a virus and has the ability to self-replicate itself and
infect the computer also.
 They travel longer distances by storing themselves in critical areas of the disk from
where they get loaded and have with them sufficient code to transfer themselves
outward from the infected system.
 Worms have been known to damage and infect the entire LANs.
 It does not modify a program like a virus; however, it replicates so much that it
consumes the resources of the computer and makes it slow.
 Worms are independent programs while viruses attach themselves to another
program.
 Examples of Worm: Lovgate.F, Sobig.D, Trile.C, PSWBugbear.B, Mapson, Code
Red, Nimda
Trojan Horse

 Trojan horse is a hidden malicious code that could alter or delete the information of client
computer or perform any other unauthorized function.
 Trojan horses contain programs that corrupt the data or damage the files. It can also corrupt
the software applications.
 Trojans can illegally trace important login details of users online – for example E-Banking.
 The activities of Trojans are:
i. Deleting data
ii. Blocking data
iii. Modifying data
iv. Copying data
v. Disrupting the performance of computers or computer networks
The Effects of Computer Virus

 Computer Virus can slow down your computer performance and become inefficient or
run slowly.
 It tends to fill up the computer with useless data.
 Virus can corrupt the system files.
 It can make the changes in the data of the programs or files and cause erratic results.
 It might steal important information from your computer and send the same to some
other person.
 It might reset or reboot a computer by sending the required codes.
 It might format a disk by sending the formatting command to the system thereby
causing to lose everything on the disk.
The Vulnerability of Operating Systems to Virus

 There are many Operating systems in the market such as Mac, Windows, Linux, UNIX,
DOS
 etc. which are being used by billions of professional and personal users.
 Before selecting any operating system, there is always a question: “Which Operating
System is efficient enough to prevent virus”? Viruses are not restricted to DOS or
Windows.
 A virus has the capability of infecting any type of computer, irrespective of the
Operating System it runs.
 Virus writers are like other software developers in their desire to develop for the
biggest market.
 It depends on the users how long he or she can keep it off of viruses
DOS vs. Linux
 As an operating system, Linux works much better than DOS.
 In terms of performance Linux is more reliable than any other operating system,
even windows.
 It easily lowers the number of viruses.

Windows vs. UNIX

 A common belief is that UNIX as an operating is a safer option than using


Windows.
 However, it is true that UNIX has something different to offer to its users and
many of Windows users have experienced this while operating Windows, but
after the recent innovations they may change their opinions
Linux and Mac

 Linux and Mac operating systems are less vulnerable to virus attack as these two
systems need advantaged access to install and run any kind of viruses.
 LINUX can be installed in Super computers to embedded processors and the
Windows is the most recommended OS for desktop.
 People across the world are being able to use it without any major support to
minimize the attack of any Malware, especially when it is compared with
windows
Protection from Virus

 We all are interested in securing our belongings such as Office, home, locality and
even country also.
 So we use different mechanisms to ensure the security- such as we keep our
valuables safely locked in a cupboard, we keep the doors of our houses even
locked;
 we keep the guards to keep secure the localities and police security within the city
and armed forces for the country also.
 It is always advisable to the follow the dictum “Prevention is better than cure”.
 Moreover, since the viruses are made faster than the vaccines, it is a good practice
to follow some simple precautionary measures, which can reduce the possibility of
virus attack.
 Use updated anti-virus program.
 Do not copy pirated software on your computer.
 Use the legal software from the reliable sources only.
 Do not download suspicious shareware programs.
 Use a secure operating system.
 Avoid letting the system to be used by unauthorized users.
 Allow you to schedule scans to automatically run for you.
 Scan the computer using Virus Scanner while booting up the system.
 Avoid loading of games that are passed as freeware.
 Proper backup of all data and program files should be kept
Use of Popular Antivirus Software

 The viruses are not omnipotent. Anti-virus programs


help to cure the viruses. They perform one or more the
following functions:
 Prevention
 Detection
 Vaccination
 Inoculation
 Damage control
There are so many anti-viruses available in the market. One can
choose any one of them on the basis of their characteristics :

 Norton Anti-Virus
 McAfee
 Kaspersky
 Webroot
 Symantec (Norton)
 AVG
 Microsoft Security Essentials
 Quick Heal
 EScan

You might also like