Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
38 views12 pages

Computer Virus

Uploaded by

zdg2tvfctz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views12 pages

Computer Virus

Uploaded by

zdg2tvfctz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

2024

Computer viruses

Haseeb Mughal
1

Name Roll Departmen


number t
Haseeb
Haseeb Mughal SU O24 BS IT
Abdulrehm 004 BS IT
an
Kashaf 012 BS AI
Asad 021 BS IT
Eman 018 BS IT
Ahmad 035 BS IT

mam laiba tar

P a g e 1 | 12
2

Table of Contents

What Causes Computer Viruses?...............................................................4


Types of Computer Viruses........................................................................5
How Do Computer Viruses Work?................................................................6
Signs of Computer Virus.............................................................................8
How to Remove a Computer Virus...............................................................9
..................................................................................................................9
Computer Viruses vs. Malware..................................................................10
................................................................................................................10
What Is a Computer Worm?......................................................................10

P a g e 2 | 12
3

Computer viruses

A computer virus is a type of malicious software, or


malware that spreads between computers and
causes damage to data and software. Computer
viruses aim to disrupt systems, cause major operational issues, and result in data loss
and leakage.

The malicious activity carried out by the virus’s code can damage the local file system,
steal data, interrupt services, download additional malware, or any other actions the
malware author coded into the program. Many viruses pretend to be legitimate
programs to trick users into executing them on their devices, delivering the computer
virus payload.

What Causes Computer Viruses?

Computer viruses are standard programs; instead of offering useful resources, these
programs can damage your device. Computer viruses are typically crafted by hackers
with various intentions, like stealing sensitive data to causing chaos in systems. Some
hackers create these malicious programs for fun or as a challenge, while others have
more sinister motives like financial gain or cyber warfare.

 Cybercrime: Hackers often use computer viruses as tools for ransomware attacks,
identity theft, and other forms of online fraud

 Sabotage: In some cases, disgruntled employees create computer viruses


to intentionally damage their employer’s infrastructure.

P a g e 3 | 12
4

 Internet: One of the easiest ways to get a virus on your device is through
the Internet. Make sure to check URL before accessing any website

Types of Computer Viruses


Every computer virus has a payload that performs an action. The threat
actor can code any malicious activity into the virus payload, including
simple, innocuous pranks that don’t do any harm. While a few viruses have
harmless payloads, most of them cause damage to the system and its data.

 Boot Sector Virus


Your computer drive has a sector solely responsible for pointing to the
operating system so that it can boot into the interface. A boot sector virus
damages or controls the boot sector on the drive, rendering the machine
unusable. Attackers usually use malicious USB devices to spread this
computer virus.

P a g e 4 | 12
5

 Web Scripting Virus


Most browsers have defenses against malicious web scripts, but older,
unsupported browsers have vulnerabilities allowing attackers to run code on
the local device.

 File Infector Virus


To persist on a system, a threat actor uses file infector viruses to inject
malicious code into critical files that run the operating system or important
programs. The computer virus is activated when the system boots or the
program runs.

 Macro Virus
Microsoft Office files can run macros that can be used to download additional malware
or run malicious code. Macro viruses deliver a payload when the file is opened and the
macro runs.

 Resident Virus
A virus that can access computer memory and sit dormant until a payload is delivered is
considered a resident virus. This malware may stay
dormant until a specific date or time or when a user
performs an action.

How Do Computer
Viruses Work?
A computer virus is a program that spreads by
first infecting files or the system areas of a
computer or network router's hard drive and then making copies of itself.
Some viruses are harmless, others may damage data files, and some may
destroy files.

P a g e 5 | 12
6

 The Infection Process


A virus can attach itself to any legitimate program or document that
supports macros to execute its code, such as an email attachment or a file
download from a website. Once the file is opened or downloaded, the virus
springs into action and starts executing.

 Hiding in Plain Sight


Computer viruses can be quite crafty to remain hidden from both users and
antivirus software alike. Viruses employ stealth techniques such as
polymorphism, which changes their appearance, or encryption methods.

 The Damage Done

Once activated, a virus may wreak havoc on your computer system. It can
steal sensitive data, corrupt files, slow down performance, and even crash
your entire system. It can spread from system to system after a user takes
action that either intentionally or accidentally facilitates it.

P a g e 6 | 12
7

P a g e 7 | 12
8

Signs of Computer Virus

Malware authors write code that is undetectable until the payload is


delivered. However, like any software program, bugs could present issues
while the virus runs. Signs that you have a computer virus include:

 Popup windows, including ads (adware) or links to malicious websites.

 Your web browser home page changes, and you did not change it.

 Outbound emails to your contact list or people on your contact list alert you
to strange messages sent by your account.

 The computer crashes often, runs out of memory with few active programs
or displays the blue screen of death in Windows.

 Slow computer performance even when running few programs or the


computer was recently booted.

 Unknown programs start when the computer boots or when you open
specific programs.

 Passwords change without your knowledge or your interaction on the


account.

 Frequent error messages


arise with basic functions like
opening or using programs.

P a g e 8 | 12
9

How to Remove a Computer Virus

Removing a computer virus can be a


challenging task, but there are
several steps you can take to get rid
of it. Common steps to remove a
computer virus include:

1. Download and install antivirus software: Assuming you don’t


already have antivirus software installed, download and install a real-time
and on-demand solution, if possible. A real-time malware scanner scans for
viruses in the background while you use the computer.

2. Disconnect from the internet: Some computer viruses use the


internet connection to spread, so it’s best to disconnect from the internet
when removing a virus from your PC to prevent further damage.

3. Delete any temporary files: Depending on the type of virus, deleting


temporary files can also delete the virus, as some viruses are designed to
initiate when your computer boots up.

4. Run a virus scan: Run a full scan using your antivirus software, opting
for the most thorough or complete scanning option available.

5. Delete or quarantine the virus: Once the virus is detected, your


antivirus software will give you the option to delete or quarantine the virus.
Quarantining the virus will isolate it from the rest of your computer to
prevent it from causing further damage.

P a g e 9 | 12
10

Computer Viruses vs. Malware

While overlapping in intention and meaning, malware and viruses are two
distinct terms that are often used interchangeably.

Malware is a general term for any type of malicious software, while a virus is
a specific type of malware that self-replicates by inserting its code into other
programs. While viruses are a type of malware, not all malware is a virus.

Malware can take many forms, including viruses, worms, spyware, adware,
and ransomware, and it can be distributed through infected websites, flash
drives, emails, and other means. A virus requires a host program to run and
attaches itself to legitimate files and programs. It causes a host of malicious
effects, such as deleting or encrypting files, modifying applications, or
disabling system functions.

What Is a Computer Worm?


A computer worm is a type of
malware designed to replicate itself to
spread to other computers. Unlike
computer viruses, worms do not
require a host program to spread and
self-replicate. Instead, they often use a

P a g e 10 | 12
11

computer network to spread themselves, relying on security failures on the


target computer to access it.

Once a worm infects a computer, it uses that device as a host to scan and
infect other computers. When these new worm-infested computers are
compromised, the worm continues to scan and infect other computers using
these computers as hosts. Worms operate by consuming heavy memory and
bandwidth loads, resulting in overloaded servers, systems, and networks.

P a g e 11 | 12

You might also like