8 - Data Security and Viruses
8 - Data Security and Viruses
VIRUSES
Computer Security Risk
A computer security risk is any event or action that could cause a loss
of or damage to computer hardware, software, data, information, or
processing capability.
While some breaches to computer security are accidental, many are
intentional.
An intentional breach of computer security often involves a deliberate
act that is against the law. Any illegal act involving a computer
generally is referred to as a computer crime.
Computer crime / Cybercrime
Cybercrime, also called computer crime, the use of a computer as an
instrument to further illegal ends, such as committing fraud , intellectual
property , stealing identities or violating privacy.
Cybercrime that uses computer to commit other crimes may involve
using computers or networks to spread malware, illegal information or
illegal images.
The term cybercrime refers to online or Internet-based illegal acts.
Software intellectual property
Software intellectual property, also known as software IP, is a computer code
or program that is protected by law against copying, theft, or other use that is
not permitted by the owner.
Software IP belongs to the company that either created or purchased the
rights to that code or software.
PHISHING IDENTITY THEFT
EXAMPLES
Full Incremental
Spread
• Boot sector computer viruses are most commonly spread using
physical media. An infected floppy disk or USB drive connected to a
computer will transfer when the drive's VBR is read, then modify or
replace the existing boot code.
Trojan Horse (Trojan)
A trojan horse (trojan) is a type of malware that disguises itself as legitimate
code or software. Once inside the network, attackers are able to carry out any
action that a legitimate user could perform, such as exporting files, modifying
data, deleting files or otherwise altering the contents of the device.
Spread
• Trojan horse might be used to infect a personal computer
• The victim receives an official-looking email with an attachment. The
attachment contains malicious code that is executed as soon as the victim
clicks on the attachment.
• File-sharing websites and fake email attachments.
Rootkit
A rootkit is a program that hides in a computer and allows someone from a
remote location to take full control of the computer.
Once the rootkit is installed, the rootkit author can execute programs, change
settings, monitor activity, and access files on the remote computer.
Rootkits are classified as malware (short for malicious software), which are
programs that act without a user’s knowledge and deliberately alter the
computer’s operations.
Spread
• Rootkits can enter computers when users open spam emails and
inadvertently download malicious software.
• Rootkits also use keyloggers that capture user login information.
File Infecting Viruses
File infecting viruses, or file infectors, generally copy their code onto
executable programs such as .COM and .EXE files.
Most file infectors simply replicate and spread, but some inadvertently
damage host programs. There are also file infectors that overwrite host files.
Spread
• These infect program files, such as applications, games or utilities.
• They are often memory-resident, meaning that once they have been
executed they remain active in the computer's memory and can infect
more programs.
Symptoms of computer infected by a virus
Operating system runs much slower than usual
Available memory is less than expected
Files become corrupted
Screen displays unusual message or image
Unknown programs or files mysteriously appear
Music or unusual sound plays randomly
Existing programs and files disappear
Programs or files do not work properly
System properties change
Operating system does not start up
Operating system shuts down unexpectedly
Chernobyl Virus
The famous Chernobyl virus deletes all Microsoft office files.
It also deletes the partition information from the disk that causes a major loss
of data.
It also corrupts the system’s BIOS.
It destroys all computer data when an infected file is executed.
Since many files are executed during computer use, the virus is able to
spread quickly and infect those files.
Logic Bomb
Logic bomb is a virus that activates when certain conditions are met such as
opening a file or when certain date and time occurs.
It is also called time bomb.
It destroys data on the hard disk on March 06.
Computer Virus Hoax
A virus hoax is a false warning about a computer virus. Typically, the warning
arrives in an email note or is distributed through a note in a company's internal
network.
The message is usually a chain e-mail that tells the recipients to forward it to
everyone they know, but it can also be in the form of a pop-up window.
Botnets
Botnet refers to a network of hijacked internet-connected devices that are
installed with malicious codes known as malware.
Each of these infected devices is known as Bots, and a hacker/cybercriminal
known as the "Bot herder" remotely controls them.
For example, an ad fraud botnet infects a user's PC with malicious software
that uses the system's web browsers to divert fraudulent traffic to certain online
advertisements.
Dos Attack
"Denial of service" or "DoS" describes the
ultimate goal of a class of cyber attacks
designed to render a service inaccessible.
The DoS attacks that most people have
heard about are those launched against high
profile websites, since these are frequently
reported by the media.
A DoS attack is characterized by using a
single computer to launch the attack.
Backdoor Attack
A backdoor attack is a type of
cybersecurity threat that could put
companies, websites, and internet users
at risk.
The term covers a wide range of
common cyberattacks, targeting
everyone from individuals to
government agencies and international
corporations.
Spoofing
Spoofing is when an attacker
impersonates an authorized device or user
to steal data, spread malware, or bypass
access control systems.
Examples
• Fake job offers,
• Fake banking-related messages,
• Fake lottery messages,
• Money refund scams
How to preventing viruses and worms
install antivirus and antimalware software on all their systems and networked
devices and keep that software up to date.
train users not to download attachments or click on links in emails from
unknown senders and to avoid downloading free software from untrusted
websites.
Users should also be very cautious when they use P2P file sharing services
and they shouldn't click on ads, particularly ads from unfamiliar brands and
websites.
Antivirus
Antivirus software is a type of program designed and developed to protect
computers from malware like viruses, computer worms, spyware, botnets,
rootkits, keyloggers and such.
Once installed, most antivirus software runs automatically in the background to
provide real-time protection against virus attacks.
Antivirus programs function to scan, detect and remove viruses from your
computer.
Benefits of Antivirus Software
• Detecting, blocking, and removing viruses, malware, and ransomware.
• Preventing identity theft and block phishing and fraud.
• Warning about dangerous websites and links before you click.
• Scanning the Dark Web to find if an email address has been compromised