0 ratings0% found this document useful (0 votes) 100 views10 pagesComputer Virus Class
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
4-5 net Ahote
WET tunatise sity RG Nomar en topes con viet Ono
‘Virus attack) Types of virus— Program virus)|Boot sector virus, Macro virus; Stealth
Wirus, Other malware—Wormy ‘Trojan, Bomb, Spyware, Sweeper, Protection) against
Wists suinatat Sosinen cue TeA Tossa
Introduction
Sometimes,
you might have noticed that your computer starts showing strange and unusual
behaviour. This can be because the computer might have been affected by some malicious
program(s)
The word ‘Malware’ is composed of two words
Malicious ai
programs that are intentionally created to cause
harm to a
These perfo
system. These may damage, delete or corrupt files,
interrupt computer working and gain authorised
access to computer resources.
There are various kinds of malware that infect
which has caused harm to your computer system.
nd software. It refers to the software
user, computer system or network.
rm undesirable actions on a computer
computer system such as virus, worms, spyware,
trojans, etc.
What is a Computer Virus?
A virus is a
and replicate itself. It is a human-made program, destructive
in nature which usually attaches itself to other programs and
spreads across the computer system. It runs on a computer
without the
system, it st
be considered as an ‘Electronic Terrorist. The full form of VIRUS
is Vital Information Resources Under
We will learn about them one-by-one in this chapter.
malicious program which has the ability to execute
user's knowledge. Once it is loaded in a computer
arts damaging the system automatically. It can als
iege.
Why do people create and spread viruses?
As discusses
'd, viruses are the programs developed by humans. But, sometimes it becomes
aCasatiat NITE AE ENE Was
alittle to agatestanat tte gysqnny Har eR UHH TE Ne fing Whig |
a developer may croate a Vidas punghit Aly
+ to est his ppragtanmninng skills |
# to merely canny out expeLtinnenls ty
are boneless
+ te take contial of the computer ai mse CE GAL UnHTl Ut
+ to make money
© to steal sensitive ttaranation.
fo Kany the other dndtivitual on an organ!
What a virus can and cannot dot '
There are various ways ta whet a vir care atfect computers, Howey 1 Ae SOME th
vat chow sigiifies what a conupMlet SHEMET AMAL AIG
that a virus cannot glo, the table y
Aaa ale A viens cannot tnfect |
Jo cuumparter hatstvate sth as monty
Keyboart mouse, plinter, ety
write protected discs sttell as CD-RONL
Lo executable files such ay wont documents,
spreadsheets, prescntations, ety
disks and drives,
aun cassettes, cle
3. files that are sent through emails or transterted 3. antivirus protected sotlwvate,
using, secondary storage
Sources of Virus
‘There are various sources from which a virus can enter into a computer system, TC does not
raise an alarm or alert the user as it enters the system, ‘This makes it necessary for the user to
the computer system, A few sources are listed below
remain cautious and attentive while us
media vis, Compact Disc
+A virus infected storag
(CD), Digital Versatile Disc (DVD), pen drive, ete,
+ Pirated software (application/system)
+ Hired computer games or audio or video CDS
+ Browsing and downloading unwanted websites
through the internet
© Unwanted email attachments in the spam folder
Symptoms of a Virus Attack
If your system is affected by a virus, you may notice
one or more of the following symptoms
& ‘the speed of the processor becomes comparatively
slow.
& You may get unusual messages on the screen,
A the disk drive light may constantly flash
«The opening, oF closing of programs/data files takes,
more time
A Ceomputer Studies —7tion pO
mE HEN TOACS
Anontatge of the user
, 8 of CIYDVD pen drive,
SOmTEPE oF show EnEual symbalvcharacters in place af the wctuial dat
Trpes of Viruses
ses can be classified into four cat
se OFies Boot sevtor Vitus Program virus, Macro Vitus
6 Stealth virus. =
Boot Sector Virus
While loading an ‘operating system, the boot sector plays an important tule itv the system
jut some types of Viruses affect the Boot Sector/Master Root Record (MBR) of the hand dish
during the process of booting and are Known as the Boot Sector Virus. It means that the
system is running with an infected hand disk which further starts infecting the stored lata
This process continues while booting and the system may not be able ty load an operating
system. Thus, the system may come to a halt, For example, Danish boot, Quox, PC stone, ete
Program Virus
These viruses directly attack the program files of the system with exgusions Whe ENE, SYS,
COM, DLL, etc. Once these program files are infeed with the virus, they stuart show!nyt
unusual behaviour. Since these
dot
uses
t atlect the boot sector, fhe system stays unattected
When a relevant task related to a program file is performed, it becomes active and starts
showing its destructive behaviour. For example, Sunday, Cascade, ete,
Macro Virus
These types of viruses attack the data files of the system. When my
TUE WANES to work on any application package (such as MS NEY! & =
Word, MS Excel, MS Access), he/she finds that cither the file is
destroyed or it contains some absurd data. ‘Thus, the user is unable ,
to perform any task on those data files. ‘These viruses can easily i
spread from one computer to another through the internet, Once
infected, repairing ofthese files is very much difficult. For exemple, i
Bloodhound, Melissa, etc.
_Bloodhaum :
Stealth Virus
‘This virus affect the computer system in various ways but is designed tw remain hidden fram
being detected. They do so by changing their codes within the system which makes it difficult
to trace the existence of the virus through scanner programs, Sometimes, the user cannot even
detect the exact cause of the infected files. It also hides the increased size of the file due to the
virus infection, Thus, the infected files seem to be uninfected during, the course of scanning,
ene eee
For example, Frodo, Brain, ete.
, eae
Computer VirwsGorms do not affect the functioning of a system but interrupts ser
Other Malware
Worm
itself by using
A worm is@ computer program that copies and multipl ‘
~ . have
computer networks and security flaws. These are self-sufficient:
the ability of spreading themselves without the use of another program or
a usea) For example, a worm email spreads itself to other computers, These
then Uses the address box of the infected computer to spread further,
vice
sample, Swen, Soe
—\
These are the programs that are destructive in nature and manipulates the user for jg
intent. At first, (hese may not look suspicious but once ed by the user can disrupy
and drastically decrease the available memory of the ‘systenl) For
Trojan
computer system. They are designed to damage and steal sensitive and confidential dy
the user.
Unlike worms{these do not replicate themselves and can spread only through user interactig,
‘These enter the system when a user installs it, opens an email attachment, downloads ang afl
some infected file from the internet. Once activated in the background, they start deleting ang
corrupting files inside the system. For example, Backdoor, Nuker, Zeus, ete.
Bomb
As the name suggests, (he explosion of this virus takes place in the form of a sudden disagg)
inside the system. These Viruses TENN Tactve TOF a long Tinie and Wal TOR a SpeanR,
or specific event for the disaster.)
For example, the virus Friday the 13" waits for this specific date. On this day, the user notice
that all the files have been deleted from his system ‘ruses such as
Jerusalem B, Saturday the 14"", Happy Birthday 30,
Spyware
There are many such
tuesday the 13",
Spyware steals sensitive information, and other internet activities of a person and transmis
it to another person or organisation,)Data such as username, password, bank details, audio
and video files, browser history while accessing internet, content of enrails and messages tt
are stolen and transferred. It consumes a lot of memory and makes the computer slow and
inefficient.
Sweeper
Sweeper is a fake antivirus progam (f enters the computer system
when the user unintentionally downloads it, considering it to be an
antivirus cae)
Once installed, it cfeates variety of fake malware files in the computer
which automatically get started when the user logs into the s
an control the browsing activity of the user, change system fi
without the user’s knowledge.
stem. It
les, etc.
[HOT Comput ue? aeoy
@
Whee 8
sx
SRUSRATS FM TE PeEHUT ANN GRE SettT (breton Wwe eat ayy ENEMY) ate peanupt
eS Acta, those ate fake alerts that Atiyptays the Hat at take mnthvare Ailow
Comsagacnthy Che Wer gets LeAPPaad LO HeutavE these files thane the camaputet
Protection against Viruses
is always adtvisad fo take preaautionary ateastites to) potect your aystent front the vine
XE SAY PLORERE YUE gy stent agattst the virtises by talloweings these mewattles!
FAL CO/OVD to i
ca
cat enteeenein il sy
Tastall antivirus sotirare in your systent, a d
Keep yout antivirus software updated, Al
you are using any external storage media to transter data,
an the dise properly with antivirus sothwate
+ Avoid reading unwanted emails.
+ ah
stall any software UY YOUE xy'ston,
a pend drive to teanstic data to your aystent,
that the deve is thee ftom virus,
systent is connected toa LAN (Local tea Networks
Keep a check ont the users to avoid the mistise of the system,
ys Keep a backup copy of your program/data files
Antivirus Software
We take vaccines as as rastire lO protect oursell front diseases, Slmnilarly, antivicns
software are the utility programs (ic. cut sathywate Us
problem) whic Cand prevent viruses frome attacking the system, ‘The mala: take of an
antivirus software is to cheek all the programs/data tiles available tn the system, Hea vin is
detected, the antivirus removes it and gets the systent ready: for the user, Labo displayn a
detected, Some of the popular antivirus software ares
AL Quek Heal
Se Net Protector Antivirus
6. Kaspersky Antivirus
AVG GDATA SK on, °
Anti-Virus ions wah Ani
TstFot ant = i
Antivirus Norton y a McAee
us AVS hbif
PH rREw & ZONEALARM
(:) Sms i
Antivirus Software
\ Conyputer Vir feats
KL to solve a particular compe
2
PANDA
—secuniry ity Senpined
Jiques to accomplish jtg ;,
-o different techniques i job,
An antivirus software typically uses two di fa virus dicti
1, examining files i. Took for known viruses by ne Program ae
2. identifying suspicious behaviour from any comP! Migh
infection.
My
1 computer virus
are. It
s and
A quality antivirus program gives you a
Protection and shields your PC from other mai
automatically scans the suspicious files, website
emails,
vebsites for
It safely tests questionable programs and website
: p ertain
Viruses. It also restricts unauthorised access to ¢¢
computer components.
However, (Ioading of antivirus software ae Shield against the ae
: y protecte
necessarily mean that the system is totally prot :
) ing devel
from the virus attack. Everyday new types of viruses pe es ee me an any
software might not be able to detect or eliminate them. S a pe i tant to eA
antivirus software updated against the new viruses) It can ¥ using the interg
) Antivirus Tips
1. Don't assume you're not at risk : 1
Every computer, regardless ofits operating system, is susceptible t0 a virus anag.y.
an antivirus cannot protect against all types of malware, the security of your a
is enhanced substantially, When an antivirus software is installed, it updates the gag
which reduces the risk of malfunctioning.
2. Download only from the trusted sources
|
Download the security software only from known and trusted sources. It is a coma
scheme of cyber criminals to pretend to be selling antivirus programs that ares,
malware.
3. Keep your sofiware updated |
Make sure that you have the latest version of the antivirus installed in your conpes
Check the status of the updates periodically to make sure that they are up-to-date)
4. Don't delay updates ]
If your computer has been offline or powered off for a long time, your antivirus mz
require an update. When you turn it on, reconnect it to the internet. Do not Postpone
updates ]
5. Scan additional devices ]
such as USB stidy
Make sure that your antivirus automatically scans portable devic
flash drives/SD cards when you plug them into your computer.
6. Track warnings and alerts
Pay attention to the onscreen warnings and alerts generated by your antivirus soft
Most of the alerts include the option of clicking the link to get more information
recommendation about what to do next,
Computer Studies—7Don't disable the software
Do not disable your security software even if you feel it is
slowing down your computer.
Disabling your antivirus will expose your computer to unnecessary risks and could result in
Install one program only
aserious security voilation. If problems persist, replace your antivirus with another antivirus.
Do not install multiple antivirus programs on your computer at the same time. It may
leave your computer with less protection instead of providing more protection.
>) What Happens When a Threat is Detected?
The specific action that your antivirus program takes
depends on its settings. Typicall
: ; antivirus software takes
one or more of these actions in a specific order.
1. Repai
Jsually, the first task of an antivirus is to clean
the infected file and remove the threat safely. This is
important when it's your personal file and you would
like to retain the data.
Quarantine: If repairing fails, your antivirus could
noose to quarantine or isolate the infected file into a
safe location. The file in quarantine cannot be accessed
but you will have a copy of the file. When a method
Anti
's Software (Net Protector)
of removing the threat is discovered, you can retrieve your data safely.
. Delete: If the infected file can't be repaired and you don't want to retain the data, you have
the choice to delete the antivirus program as well as the infected files from your computer.
Working with an Antivirus Software
Once an antivirus software is installed in your system,
you can get rid of virus attacks for a
particular time period. However, you should not forget to update your antivirus software on
2 regular basis.
Let us discuss and learn about
irus
: Poe
software with the
of Net Protector Antivirus
After its installation,
you can easily open it by clicking
on its icon on the desktop or
from the start menu.
er
©
Q
Net Protector antivirus window
@QONO
opens. It shows various options tacos —
on the left pane that help us ——
perform various tasks. alee
1. Dashboard: It displays Sytem Tuer
various details about the
software as shown above.
U
C=] ===)
no
ao
Computer Virus.1, What does the letter V signify in the word VIRUS?
(a) Vigilance (b) Vibrant
ital (d) Variety
2. Which of the following can be infected by a computer virus?
(a) Keyboard (b) CPU
{& Operating system (d) Printers
3. Which of the following has the ability to replicate itself?
‘Worm (b) Trojan
(c) Macro (dy Stealth
4, Through which of the following a computer can be infected with viruses?
(a) Pen drive (b) E-mail
(©) Accessing internet os All of these
5. Which of the following is not an antivirus?
(a) Norton (b), AVG
() McAfee Je ‘Trojan Horse
I], State whether the following statements are True/False:
1. A computer shows unusual behaviour due to a virus attack.
2. A computer virus is intentionally made to disturb the —<
proper functioning of the computer system. seceedesseeee
3. A computer virus is destructive in nature. neue
4, Unwanted mails in the spam folder can be a source of virus. T..
5. A system restarting own its own is a symptom of a virus attack. T
6. A system gets affected by the virus automatically. -
7. A computer virus replicates itself within the amount of
available memory.
8. Antivirus software is specially designed to protect _
the entry of viruses into the system.
9, The system gives an alarm, when a virus infected storage
media is connected.
10. Once an antivirus is loaded, your computer will never be =
affected by viruses. f
Ill. Give two examples of each: |
1. Boot Sector Virus (a) .. Vat Wash
: ae
Computer Virus2. Worm (2) GAR Qenenene © Stal,
3. Trojan (a) ee ad ° Kae
4. Macro @ Sq
- om :
5. Bomb (a) Detue gale B i eady X
6. Stealth @ en a Br .
TV. Case-Study Based Questions:
Solved
1. Visi mics program which 8 estuetvim STE agy
ater prog dared cos» mE SFT rus oa a
the users knowledge. Once i enters into the compte it tans damage y
files automaticaly. Diferent types of viruses have different behaviga Thott
some of the viruses are given below: nt
(a) Ie attacks the data files of the sytem when a User Wants to wer gq
package. }
(b) It spreads due to security flaws without the US of another prog
(c) It enters into the system when a user opens an e-mail attach,
Ment,
runs some infected file from the internet. oly
(4) It is used to steal sensitive information of a person such as
Username
bank details, etc. while accessing the internet.
Write the name of the specific virus for each of the behaviour Metin i
(©) and (a).
‘Ans. (a) Macro (b) Worm (©) Trojan (4) Spyrae
Unsolved
1. Antivirus software are the utility programs that d
system from attack of viruses. The main task of an antivirus software isto de
the programs/data files available in the computer. If a virus is detected, the a
clears it from the system. A pirated antivirus software should not be used bea
will not be able to remove all the viruses, rather it m spread the virus itself &
are advised to install orginal antivirus software and keep it updating pein
updated antivirus software also takes care of newly created viruses,
With reference to the above case, answer the following questions:
(a) Which of the following statements is not true about antivirus software?
(i) It locates infected files,
(ii) It searches for the viruses,
(iti) Once installed, it needs not be updated
(iv) It removes viruses,
(b) Which of the following is not an antivirus softw
(i) McAfee
(ii) GDATA
(c) What is meant by pirated antivirus software?
(i) Copied from original software
(iii) Loaded from original CD
etect and prevent your
rare?
(ii) AVG
(iv) Google Chrome
(ii) Reinstalled software
(iv) None of the above{d) What will happen Mf antivirus software is not updated Petiodically?
(i) ft wll be erased after some time.
(is) twill ypread virus itself
(iit) It will not be able to trace new viruses
(iv) ft will force operating system to stop functioning.
Re
1. Define the following:
z
s
4
IL Short Answer Question
1
3
4
Worm
Trojan:
Bomb
Program Virus
What is a computer virus?
Mention two ways of classifying a computer virus, Pacey maS ete .
Name the ditferent sources of virus from which it may entér to a computer system.
Why ss if necessary to update antivirus software installed in your computer system?
in Dining DoE Ihe lowing <2 L NYS RL wit pses.
3
Virus and Antmirus
Worms and Viruses
IN. Long Answer Questions:
awe
What are the various ways to get Virus attack to a computer system?
How will you detect that a computer system is infected by viruses?
Suate the various ways to protect your system from viruses.
Why do people spread viruses? Explain.
What is meant by an antivirus? Name different types of antivirus softwares.
You have loaded Norton Antivirus software in your computer system. Does it make
your computer system free from virus attack for a lifetime? Justify.
Whit acuons can an antivirus take, if a threat is detected in your computer system?
Computer Virus al