2024
Computer viruses
Haseeb Mughal
1
Name Roll Departmen
number t
Haseeb
Haseeb Mughal SU O24 BS IT
Abdulrehm 004 BS IT
an
Kashaf 012 BS AI
Asad 021 BS IT
Eman 018 BS IT
Ahmad 035 BS IT
mam laiba tar
P a g e 1 | 12
2
Table of Contents
What Causes Computer Viruses?...............................................................4
Types of Computer Viruses........................................................................5
How Do Computer Viruses Work?................................................................6
Signs of Computer Virus.............................................................................8
How to Remove a Computer Virus...............................................................9
..................................................................................................................9
Computer Viruses vs. Malware..................................................................10
................................................................................................................10
What Is a Computer Worm?......................................................................10
P a g e 2 | 12
3
Computer viruses
A computer virus is a type of malicious software, or
malware that spreads between computers and
causes damage to data and software. Computer
viruses aim to disrupt systems, cause major operational issues, and result in data loss
and leakage.
The malicious activity carried out by the virus’s code can damage the local file system,
steal data, interrupt services, download additional malware, or any other actions the
malware author coded into the program. Many viruses pretend to be legitimate
programs to trick users into executing them on their devices, delivering the computer
virus payload.
What Causes Computer Viruses?
Computer viruses are standard programs; instead of offering useful resources, these
programs can damage your device. Computer viruses are typically crafted by hackers
with various intentions, like stealing sensitive data to causing chaos in systems. Some
hackers create these malicious programs for fun or as a challenge, while others have
more sinister motives like financial gain or cyber warfare.
Cybercrime: Hackers often use computer viruses as tools for ransomware attacks,
identity theft, and other forms of online fraud
Sabotage: In some cases, disgruntled employees create computer viruses
to intentionally damage their employer’s infrastructure.
P a g e 3 | 12
4
Internet: One of the easiest ways to get a virus on your device is through
the Internet. Make sure to check URL before accessing any website
Types of Computer Viruses
Every computer virus has a payload that performs an action. The threat
actor can code any malicious activity into the virus payload, including
simple, innocuous pranks that don’t do any harm. While a few viruses have
harmless payloads, most of them cause damage to the system and its data.
Boot Sector Virus
Your computer drive has a sector solely responsible for pointing to the
operating system so that it can boot into the interface. A boot sector virus
damages or controls the boot sector on the drive, rendering the machine
unusable. Attackers usually use malicious USB devices to spread this
computer virus.
P a g e 4 | 12
5
Web Scripting Virus
Most browsers have defenses against malicious web scripts, but older,
unsupported browsers have vulnerabilities allowing attackers to run code on
the local device.
File Infector Virus
To persist on a system, a threat actor uses file infector viruses to inject
malicious code into critical files that run the operating system or important
programs. The computer virus is activated when the system boots or the
program runs.
Macro Virus
Microsoft Office files can run macros that can be used to download additional malware
or run malicious code. Macro viruses deliver a payload when the file is opened and the
macro runs.
Resident Virus
A virus that can access computer memory and sit dormant until a payload is delivered is
considered a resident virus. This malware may stay
dormant until a specific date or time or when a user
performs an action.
How Do Computer
Viruses Work?
A computer virus is a program that spreads by
first infecting files or the system areas of a
computer or network router's hard drive and then making copies of itself.
Some viruses are harmless, others may damage data files, and some may
destroy files.
P a g e 5 | 12
6
The Infection Process
A virus can attach itself to any legitimate program or document that
supports macros to execute its code, such as an email attachment or a file
download from a website. Once the file is opened or downloaded, the virus
springs into action and starts executing.
Hiding in Plain Sight
Computer viruses can be quite crafty to remain hidden from both users and
antivirus software alike. Viruses employ stealth techniques such as
polymorphism, which changes their appearance, or encryption methods.
The Damage Done
Once activated, a virus may wreak havoc on your computer system. It can
steal sensitive data, corrupt files, slow down performance, and even crash
your entire system. It can spread from system to system after a user takes
action that either intentionally or accidentally facilitates it.
P a g e 6 | 12
7
P a g e 7 | 12
8
Signs of Computer Virus
Malware authors write code that is undetectable until the payload is
delivered. However, like any software program, bugs could present issues
while the virus runs. Signs that you have a computer virus include:
Popup windows, including ads (adware) or links to malicious websites.
Your web browser home page changes, and you did not change it.
Outbound emails to your contact list or people on your contact list alert you
to strange messages sent by your account.
The computer crashes often, runs out of memory with few active programs
or displays the blue screen of death in Windows.
Slow computer performance even when running few programs or the
computer was recently booted.
Unknown programs start when the computer boots or when you open
specific programs.
Passwords change without your knowledge or your interaction on the
account.
Frequent error messages
arise with basic functions like
opening or using programs.
P a g e 8 | 12
9
How to Remove a Computer Virus
Removing a computer virus can be a
challenging task, but there are
several steps you can take to get rid
of it. Common steps to remove a
computer virus include:
1. Download and install antivirus software: Assuming you don’t
already have antivirus software installed, download and install a real-time
and on-demand solution, if possible. A real-time malware scanner scans for
viruses in the background while you use the computer.
2. Disconnect from the internet: Some computer viruses use the
internet connection to spread, so it’s best to disconnect from the internet
when removing a virus from your PC to prevent further damage.
3. Delete any temporary files: Depending on the type of virus, deleting
temporary files can also delete the virus, as some viruses are designed to
initiate when your computer boots up.
4. Run a virus scan: Run a full scan using your antivirus software, opting
for the most thorough or complete scanning option available.
5. Delete or quarantine the virus: Once the virus is detected, your
antivirus software will give you the option to delete or quarantine the virus.
Quarantining the virus will isolate it from the rest of your computer to
prevent it from causing further damage.
P a g e 9 | 12
10
Computer Viruses vs. Malware
While overlapping in intention and meaning, malware and viruses are two
distinct terms that are often used interchangeably.
Malware is a general term for any type of malicious software, while a virus is
a specific type of malware that self-replicates by inserting its code into other
programs. While viruses are a type of malware, not all malware is a virus.
Malware can take many forms, including viruses, worms, spyware, adware,
and ransomware, and it can be distributed through infected websites, flash
drives, emails, and other means. A virus requires a host program to run and
attaches itself to legitimate files and programs. It causes a host of malicious
effects, such as deleting or encrypting files, modifying applications, or
disabling system functions.
What Is a Computer Worm?
A computer worm is a type of
malware designed to replicate itself to
spread to other computers. Unlike
computer viruses, worms do not
require a host program to spread and
self-replicate. Instead, they often use a
P a g e 10 | 12
11
computer network to spread themselves, relying on security failures on the
target computer to access it.
Once a worm infects a computer, it uses that device as a host to scan and
infect other computers. When these new worm-infested computers are
compromised, the worm continues to scan and infect other computers using
these computers as hosts. Worms operate by consuming heavy memory and
bandwidth loads, resulting in overloaded servers, systems, and networks.
P a g e 11 | 12