INTRODUCTION OF COMPUTER
VIRUS
The introduction of a computer virus involves the unauthorized insertion
of malicious code into a computer system, typically with the intent of
causing harm or disruption. These viruses can spread rapidly through
networks, infecting files and compromising the security of the system.
TYPS OF COMPUTER VIRUS
TYPES OF INFECTION MODES OF SPREADING
Computer viruses can be categorized into different types based on their behavior and Some viruses are designed to replicate and spread rapidly across networks, known as
mode of operation. One common type is the file infector virus, which attaches itself to network viruses. These viruses can exploit vulnerabilities in network protocols to infect
executable files and spreads when the infected file is executed. Another type is the boot multiple computers connected to the same network. Another type is the macro virus,
sector virus, which infects the boot sector of a disk or partition, making it difficult to which infects documents and spreads when the document is opened in a program that
remove. supports macros.
DECEPTIVE MALWARE EVASION TECHNIQUES
Trojan horses are a type of malware that disguise themselves as legitimate software to Some viruses are designed to remain hidden on a system and evade detection by
trick users into installing them. Once installed, they can perform malicious activities such antivirus software, known as stealth viruses. These viruses can modify their code to avoid
as stealing sensitive information or giving an attacker remote access to the infected detection and may also use rootkit techniques to hide their presence on the system.
computer. Another type is the ransomware, which encrypts files on the infected computer Another type is the polymorphic virus, which changes its code each time it infects a new
and demands a ransom for the decryption key. file to evade detection by signature-based antivirus software.
2
BOOT SECTOR VIRUS
INTRODUCTION TO BOOT SECTOR VIRUS
A boot sector virus is a type of malware that infects the boot sector of a computer's hard drive or removable storage device. This virus is typically spread through
infected media such as USB drives or floppy disks, and is activated when the infected device is booted up. Once the virus is in the boot sector, it can spread to
other parts of the computer and potentially cause damage to the system.
PERSISTENCE AND STEALTH OF BOOT SECTOR VIRUS
One of the key characteristics of a boot sector virus is its ability to remain active even after the infected device is rebooted. This makes it particularly dangerous
as it can continue to infect other devices and spread throughout a network. Boot sector viruses can also be difficult to detect and remove, as they are typically
designed to evade detection by antivirus software.
PREVENTION AND PROTECTION AGAINST BOOT SECTOR VIRUS
To protect against boot sector viruses, it is important to regularly scan all storage devices for malware and ensure that antivirus software is kept up to date.
Additionally, users should be cautious when inserting unknown or suspicious media into their computers, as this is a common way for boot sector viruses to
spread. By taking these precautions, individuals can help prevent the spread of boot sector viruses and protect their systems from potential damage.
3
PROGRAM VIRUS
CHARACTERISTICS OF
COMPUTER VIRUS
A computer virus is a specific type of program virus that is designed to infect computer
INTRODUCTION TO PROGRAM
systems and spread from one system to another. It can be transmitted through email
attachments, downloads, or infected websites. Once a computer virus infects a system, it
can cause a variety of harmful effects, such as deleting files, slowing down the system, or
VIRUS compromising security.
A program virus is a type of malicious software that can replicate itself and spread to other
programs on a computer system. It is designed to disrupt the normal operation of a
computer and can cause damage to files or steal sensitive information. PREVENTION AND
PROTECTION AGAINST
VIRUSES
Protecting against program viruses and computer viruses requires the use of antivirus
software, regular system updates, and safe browsing practices. Users should also be
cautious when opening email attachments or downloading files from unknown sources. By
taking these precautions, individuals can reduce the risk of infection and keep their
computer systems secure.
4
MACRO VIRUS
MACRO VIRUS DEFINITION
A macro virus is a type of computer virus that is designed to infect files created using macros, which are small programs that automate tasks in software
applications. These viruses can spread through email attachments, infected documents, or malicious websites, and can cause damage to a computer system by
corrupting files or stealing sensitive information.
COMPUTER VIRUS OVERVIEW
A computer virus is a malicious software program that can replicate itself and spread from one computer to another, often causing damage to files, software, and
hardware. These viruses can be transmitted through email attachments, infected websites, or removable storage devices, and can be difficult to detect and
remove without the use of antivirus software.
5
STEALTH VIRUS
CHARACTERISTICS OF
STEALTH VIRUS
One of the key characteristics of a stealth virus is its ability to remain hidden within a
DEFINITION OF STEALTH system for an extended period of time. This allows the virus to quietly gather information,
corrupt files, or perform other harmful actions without alerting the user or system
administrator. By operating covertly, stealth viruses can cause significant damage before
VIRUS they are discovered and removed.
A stealth virus is a type of computer virus that is designed to evade detection by antivirus
software and other security measures. These viruses are often programmed to hide within
the computer's operating system or other legitimate programs, making them difficult to
detect. Once activated, stealth viruses can carry out malicious activities without the user's
knowledge or consent.
PREVENTION OF STEALTH
VIRUS
To protect against stealth viruses, it is important for users to regularly update their antivirus
software and run system scans to detect any suspicious activity. Additionally, users should
be cautious when downloading files or clicking on links from unknown sources, as these can
be common ways for stealth viruses to infiltrate a system. By staying vigilant and practicing
good cybersecurity habits, users can reduce the risk of falling victim to stealth viruses.
Made with Slidey
6
SOURCES OF VIRUS
SOCIAL ENGINEERING
COMMON SOURCES TACTICS
Viruses can be sourced from various places, including infected files downloaded from the Social engineering tactics, such as phishing emails or fake software updates, are also
internet, email attachments, and removable storage devices. These sources can sources of viruses. Attackers use these tactics to deceive users into providing personal
unknowingly introduce viruses into a computer system, causing harm to the device and information or downloading malicious software onto their devices.
compromising sensitive information.
MALICIOUS WEBSITES OUTDATED SOFTWARE
Another common source of viruses is through malicious websites that trick users into Lastly, outdated software and operating systems can serve as sources of viruses as they
downloading harmful software or clicking on infected links. These websites can appear may have vulnerabilities that attackers can exploit to infect devices. It is essential to
legitimate but are designed to infect devices with viruses or malware. regularly update software and operating systems to prevent viruses from infiltrating a
system.