Computer Virus: Computer Awareness Notes
Computer
Virus
A computer virus is a malware program which
when executed, replicates itself into computer programs, data files, or the
boot sector of the hard drive. It is a program designed
to replicate itself into other files or programs stored on your device.
A Virus harms the computer by using hard disk
space or CPU time. Viruses also access the private information of the user,
corrupts data, spamming their contacts, or logging their keystrokes. Not all
viruses attempt to hide themselves. In simple words, viruses are
self-replicating computer programs which install themselves without the user’s
knowledge.
Virus
spreads through:
- E-mail attachments
- Portable devices such as CDs, DVDs, Pendrives, Memory Cards etc
- Websites containing malicious scripts
- File downloads from Internet
Types of
Virus
- Macro Virus - Macro
virus harms the documents which use macros such as word processing and
excel spreadsheet documents. A macro virus is written in macro language.
- Companion Virus – A
virus that creates a new file with same existing filename.
- Virus hoax – A
computer virus hoax is a message, can be a false e-mail warning the
recipients to forward it to everyone they know.
- Computer prank – It is
a prank related to either the software or the hardware of computers.
- WORM – A
computer worm is a computer program that replicates itself in order to
spread to other computers. It mostly uses a computer network to spread
itself. Unlike a computer virus, it does not need to attach itself to an
existing program.
- Trojan horse – A Trojan
horse is a generally non-self-replicating type of code which when
executed, causes loss or theft of data, and possible system harm.
Some of the famous
computer virus
- Creeper-1971
- Elk cloner-1982
- The Morris Internet worm-1988
- Melissa-1990
- I Love You-2000
- Code red-2001
- Nimade-2001
- SQL slammer-2003
- Blaster-2003
- Sasser-2004
Anti-Virus
- Antivirus software is a computer software used to prevent, detect
and remove malicious software fromcomputer.
- Antivirus software detects and removes computer viruses from the
system. Antivirus software also provides protection from other computer
threats as there is rapid increase of other kinds of malwares.
- Now days, an antivirus protects the computer from malicious Browser
Helper Objects (BHOs), browser hijackers, ransomware, keyloggers,
backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraud
tools, adware, and spyware.
- Examples - Norton, AVG, Optimo, AV, Mcafee, Avira, Bitdefender, Pandasecurity,
Eset, QuickHeal, Kaspersky, Immunet and etc.
Important
Computer Security Threats
- Phishing – The
act of acquiring private or sensitive data from personal computers for use
in fraudulent activities. Phishing is usually done by sending emails that
seem to appear to come from credible sources (however, they are in no way
affiliated with the actual source/company), which require users to put in
personal data such as a credit card number or social security number. This
information is then transmitted to the hacker and utilized to commit acts
of fraud.
- Spam –
Spamming is sending unsolicited messages, especially advertising, as
well as sending bulk messages on the same site or through an e-mail.
- Malware – Malware
disrupts computer operation, gather sensitive information, or gain access
to private computer systems without the user’s knowledge.
- Adware - It is
a software package which automatically starts advertisement.
- Spyware – Spyware
is software that is secretly installed on a computer without the user’s
consent. It monitors user activity or interferes with user control over a
personal computer.
- Firewall – A
firewall is a network security system which controls the incoming and
outgoing network traffic based on a set of rules. A firewall establishes
an obstacle between a trusted, secure internal network and another
network. Firewalls exist both as a software solution and as a hardware
appliance.
- SPIM - SPIM
is spam sent via instant messaging systems such as Yahoo! Messenger, MSN Messenger and
ICQ.
- SPIT - SPIT
is Spam over Internet Telephony. These are unwanted, automatically-dialed,
pre-recorded phone calls using Voice over Internet Protocol (VoIP).
- Spoofing - Spoofing
is an attack in which a person or program masquerades as another. A common
tactic is to spoof a URL or website (see phishing).
- Pharming - Pharming
is an attack in which a hacker attempts to redirect a website's traffic to
another website. Pharming can be conducted either by changing the hosts
file on a victim’s computer or by exploitation of a vulnerability in DNS
server software.
- Keylogger - A
keylogger is a software program that is installed on a computer, often by
a Trojan horse or virus. Keyloggers capture and record user keystrokes.
The data captured is then transmitted to a remote computer.
- Blended Threat - A
blended threat is a threat that combines different malicious components,
such as a worm, a Trojan horse and a virus. In this way, a
blended threat uses multiple techniques to attack and propagate itself.