Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
42 views10 pages

Unit 12 Computer Virus

A computer virus is malicious software that replicates itself and spreads from computer to computer without consent. There are many types of viruses like file infectors, boot sector viruses, and worms. Symptoms of infection include slow performance, crashes, and unusual activity. Antivirus software detects, prevents, and removes viruses through scanning, updates, and other functions.

Uploaded by

hasat25701
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views10 pages

Unit 12 Computer Virus

A computer virus is malicious software that replicates itself and spreads from computer to computer without consent. There are many types of viruses like file infectors, boot sector viruses, and worms. Symptoms of infection include slow performance, crashes, and unusual activity. Antivirus software detects, prevents, and removes viruses through scanning, updates, and other functions.

Uploaded by

hasat25701
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Computer Virus

What is computer virus: A computer virus is a type of malicious software


(malware) that is designed to replicate itself and spread from one computer to
another, often without the knowledge or consent of the computer user.
Computer viruses can cause various types of damage to infected systems,
including data loss, system instability, and unauthorized access
• Types of computer virus
Computer viruses are malicious software programs designed to infect computers
and spread across networks, causing damage, stealing data, or disrupting normal
operations. There are several types of computer viruses, each with its own
characteristics and methods of propagation. Here are some common types of
computer viruses:
• File Infector Viruses:
• File infector viruses attach themselves to executable files (e.g., .exe, .dll) and infect them.
When an infected file is executed, the virus code is activated, allowing it to replicate and
spread to other files on the system.
• Boot Sector Viruses:
• Boot sector viruses infect the master boot record (MBR) or boot sector of a computer's
hard drive or removable storage device. They are activated when the infected system is
booted up, allowing the virus to load into memory and infect the system.
Computer Virus
• Macro Viruses:
• Macro viruses infect documents and spreadsheets that contain macro
programming languages, such as Microsoft Word and Excel. They embed
malicious macros into these documents, which are executed when the
document is opened, allowing the virus to spread to other files.
• Polymorphic Viruses:
• Polymorphic viruses are designed to evade detection by changing their
appearance (code) each time they infect a new file or system. This makes them
difficult to detect using traditional antivirus software, as they appear different
each time they replicate.
• Multipartite Viruses:
• Multipartite viruses combine the characteristics of file infectors and boot sector
viruses. They can infect both executable files and the boot sector of a
computer's hard drive, making them particularly destructive and difficult to
remove.
• Worms:
• Worms are self-replicating malware programs that spread across networks and
computers by exploiting vulnerabilities in operating systems or software
applications. Unlike viruses, worms do not require a host file to propagate and
can spread independently.
Computer Virus
• Trojan Horses:
• Trojan horses are disguised as legitimate software programs or files but
contain malicious code that performs unauthorized actions when executed.
They often masquerade as useful applications, games, or email attachments
to trick users into downloading and installing them.
• Spyware:
• Spyware is designed to secretly monitor and collect information about a
user's activities, such as browsing habits, keystrokes, and personal data. It
often runs in the background without the user's knowledge or consent,
posing privacy and security risks.
• Adware:
• Adware displays unwanted advertisements or pop-up messages on a user's
computer, often disrupting normal browsing activities and degrading system
performance. It may also track user behavior to deliver targeted advertising.
• Rootkits:
• Rootkits are stealthy malware programs that hide themselves and other
malicious processes from detection by antivirus software and system
monitoring tools. They often gain privileged access (root/administrator) to
the operating system, allowing them to control system functions and evade
removal.
Computer Virus
Symptoms of computer virus
• Computer viruses can visible in various ways, and their symptoms can vary
depending on the type of virus, its payload, and the extent of infection.
Here are some common symptoms that may indicate a computer virus
infection:
• Sluggish Performance:
• A sudden decrease in system performance, including slow startup times,
unresponsive applications, and delayed response to user inputs, may
indicate a virus infection. Viruses consume system resources and can
degrade overall system performance.
• Frequent Crashes or Freezes:
• Unexpected system crashes, freezes, or blue screen errors (BSOD) may
occur due to conflicts caused by virus activities, corruption of system
files, or attempts by antivirus software to quarantine infected files.
• Unexplained Pop-up Windows:
• The appearance of pop-up windows, ads, or error messages, especially
when browsing the internet or using specific applications, may indicate
adware, spyware, or other malicious software infections.
Computer Virus
• Changes to Desktop or Browser Settings:
• Unauthorized changes to desktop backgrounds, screensavers, browser homepage,
default search engine, or browser extensions/plugins may be caused by malware
attempting to hijack or manipulate system settings.
• Unusual Network Activity:
• Excessive network traffic, unusual data transfers, or unauthorized connections to
remote servers or IP addresses may indicate the presence of a virus or worm
attempting to spread across networks or communicate with command-and-control
servers.
• Missing or Corrupted Files:
• Missing, renamed, or corrupted files, especially system files, program executables, or
critical data files, may indicate a virus infection that has tampered with or deleted
important files on the system.
• Increased Disk Activity:
• Unexplained disk activity, such as continuous disk thrashing or access to files and
directories, may occur when a virus is performing background tasks, replicating
itself, or attempting to modify system files.
• Security Alerts or Warnings:
• The appearance of security alerts, antivirus warnings, or notifications indicating the
detection of malware threats or suspicious activities by security software may signal
a virus infection.
Computer Virus
Antivirus
• Antivirus software, also known as anti-malware software, is a type of
cybersecurity tool designed to detect, prevent, and remove malicious software
programs, including viruses, worms, trojans, spyware, adware, ransomware,
and other types of malware. Antivirus software employs various techniques and
technologies to protect computer systems and networks from cyber threats,
including signature-based scanning, heuristic analysis, behavior monitoring, and
real-time protection
• function of antivirus
• The primary function of antivirus software is to protect computer systems and
networks from malicious software programs, commonly known as malware.
Antivirus software achieves this through various methods and functionalities
aimed at detecting, preventing, and removing malware threats. Here are the
key functions of antivirus software:
• Malware Detection:
• Antivirus software scans files, programs, and system memory for known
malware signatures, patterns, and behaviors to detect and identify malicious
software threats. It compares file attributes and behavior against a database of
known malware signatures to determine if a file is infected.
Computer Virus
• Real-Time Protection:
• Antivirus software provides real-time protection by continuously monitoring
system activities and intercepting potential malware threats before they can
execute and cause harm. Real-time protection features include on-access
scanning, behavior monitoring, and network firewall capabilities.
• Preventive Measures:
• Antivirus software employs preventive measures to block malware infections
and prevent unauthorized access to system resources. This includes blocking
malicious websites, preventing execution of suspicious files, and detecting and
blocking phishing attempts and social engineering attacks.
• Quarantine and Remediation:
• When malware is detected, antivirus software quarantines the infected files or
programs to prevent them from spreading and causing further harm to the
system. Quarantined files are isolated from the rest of the system, allowing
users to review and decide whether to delete, clean, or restore them.
• Scanning and Cleaning:
• Antivirus software allows users to perform manual or scheduled scans of their
computer systems, removable storage devices, and network drives to identify
and remove malware infections.
Computer Virus
• Automatic Updates:
• Antivirus software regularly updates its malware signature database and
program definitions to ensure protection against the latest threats. Automatic
updates download and install new virus definitions, software patches, and
security updates to keep the antivirus software up to date and effective against
emerging threats.
• Alerts and Notifications:
• Antivirus software generates alerts, notifications, and reports to inform users of detected
malware threats, system vulnerabilities, and security incidents. It notifies users of the
actions taken by the antivirus software, such as quarantining infected files or blocking
malicious activities.
• Performance Optimization:
• Antivirus software minimizes system resource usage, such as CPU and memory usage, to
ensure optimal performance and minimize impact on system responsiveness and
productivity. It balances security requirements with system performance considerations
to provide effective protection without significantly degrading system performance.
• Additional Security Features:
• Some antivirus software solutions offer additional security features and capabilities, such
as web filtering, email scanning, password management, encryption, parental controls,
and device optimization tools, to provide comprehensive cybersecurity and privacy
protection for users.
Computer Virus
Step to safeguard from computer virus
• Safeguarding your computer from viruses is essential to ensure its
security and protect your data. Here are steps you can take to
safeguard your computer:
• Install Antivirus Software: Choose a reputable antivirus software and
keep it updated. Antivirus programs help detect and remove viruses
from your computer.
• Enable Firewall Protection: Ensure your computer's firewall is turned
on. Firewalls help block unauthorized access to your computer and
network.
• Keep Your Operating System Updated: Regularly update your
operating system (e.g., Windows, macOS, Linux) to patch security
vulnerabilities and ensure the latest security features are enabled.
• Update Software Regularly: Keep all software on your computer up
to date, including web browsers, email clients, and plugins. Software
updates often include security patches that address known
vulnerabilities.
Computer Virus
• Exercise Caution with Email Attachments: Be cautious when opening
email attachments from unknown senders or unexpected emails, as
they may contain viruses or malware. Scan email attachments with
antivirus software before opening them.
• Download Software from Trusted Sources: Only download software
from reputable sources, such as official websites or app stores. Avoid
downloading software from pop-up ads or unfamiliar websites, as
they may contain malware.
• Use Strong Passwords: Use strong, unique passwords for your
accounts and change them regularly. Avoid using easily guessable
passwords, such as "password" or "123456."

You might also like