VIRUS GOAL
- Designed to slow the infected computer system, steal and/or copy information from the
computer and attach itself to send files and attachments in order to spread to other computer
systems.
VIRUS as PROGRAM
- Is able to replicate itself. This means that the virus multiplies on a computer by making copies of
itself.
- This replication is intentional
- It is a part of Virus Program
o A virus program contains to initiate some sort of event that affects the infected
computer
- Each virus has a unique event and their affect can range from harmless to devastating
o For example:
An annoying message appearing on the computer screen
Reduced memory or disk space
Modification of Data
Files over written or damaged
Hard disk erased
TYPES OF VIRUSES
1. Trojan Horse
a. This program has the appearance of having a useful and desired function. While it may
advertise its activity after launching, this information is not apparent to the user
beforehand
2. Worms
a. A program that makes and facilities the distribution of copies of itself.
b. This program may do damage and compromise the security of the computer.
c. It may arrive from via exploitation of a system vulnerability or by clicking on an infected
e-mail.
3. Boot sector Virus
a. A virus when which attaches itself to the first part of the hard disk that is read by
computer upon boot up.
b. This are normally spread by floppy disks
4. Macro Virus
a. Are viruses that use another application’s macro programming language to distribute
themselves
b. They infect documents such as MS Word or MS Excel and are typically spread to other
similar documents
5. Memory Resident Viruses
a. Reside in a computers volatile memory (RAM). They are initiated from a virus which runs
on the computer and they stay in the memory after it’s initiating program closes
6. Rootkit Virus
a. Is an undetectable virus which attempts to allow someone to gain control of a computer
system
b. The term ROOTKIT comes from Linux administrator user.
c. This viruses are usually installed by Trojans and are normally disguised as operating
system files.
7. Polymorphic Virus
a. Not only replicates itself, but also change its digital signature every time it replicates
This make it difficult for less sophisticated antivirus software to detect
8. Logic Bombs or Time Bombs
a. these are viruses which are programmed to initiate at a specific date or when a specific
event occurs
b. Some example are a virus which deletes your photos on Halloween, or a virus which
deletes a database table if a certain employee gets fired
9. Direct Action Virus
a. The main purpose of this virus is to replicate and take action when it is executed
10. Overwrite Virus
a. Virus of this kind is characterized by the fact that it deletes the information contained in
the files that it infects, rendering them partially or totally useless once they have been
infected
11. Directory Virus
a. Change the path that indicate the location of a file
b. When you execute a program file with an extension .EXE or .COM that has been infected
by a virus, you are unknowingly running the virus program, while the original file and
program is previously moved by the virus
12. File infector Virus
a. This type of virus infects programs and executable files (files with .EXE or .COM
extension
b. When one of this programs is run, directly or indirectly, the virus is activated, producing
the damaging effects it is programmed to carry out.
VIRUSES CATEGORIES AND FEATURES
1. Macro Viruses
a. Are known to be platform independent since the virus itself is written in the
application’s language and not the operating systems
b. When the application is running, this allows the macro virus to spread amongst the
operating systems.
c. Thousands of Macro Viruses that exists, and it is considered a major threat
2. Network Viruses
a. Rapidly spread through Local Network Area (LAN), and sometimes throughout the
internet
b. Generally, multiplies through shared resources, shared drives and folders
3. Logic Bombs
a. Is a piece of code that is inputted into a software system
b. When a certain and specific condition is met, such as clicking on an internet browser or
operating a particular file, the logic bomb virus is set off
4. Companion Viruses
a. Takes advantage of MS-DOS
b. This virus creates a new file with typically the .COM extensions, but sometimes the .EXE
extensions as well.
5. Boot Sector Viruses
a. Generally hide in the boot sector, either in the bootable disk or the hard drive.
b. Unlike most viruses, this virus does not harm the files in the hard disk but harm the hard
disk itself
6. Multipartite Viruses
a. Are spread through infected media and usually hides in the memory.
b. Gradually, the viruses moves to the hard drive’s boot sector and infects executable files
on the hard drive and later across the computer system
WHAT VIRUSES DO
- Viruses have many purpose
o Some are designed to play annoying tricks
o Others have destructive intent
o Some viruses present themselves as joke while performing secret destructive functions
- 2 Major Types of Viruses
o Compiled Viruses
Executed by the Operating System
o Interpreted Viruses
Executed by an Application
HOW DO VIRUS SPREAD
- Virus insert themselves into host programs and propagate when the infected program is
executed, generally by user interaction, opening a file, running a program, or clicking on a file
attachment
- The following are few telltale sign that your computer might have a virus:
o Slow response and slow program execution
o Random hard drive crash and restarts
o Distorted graphics and text
o Files that have mysteriously vanished
o Extensive pop-up Ads
o Inability to open files with existing passwords
WAYS TO PREVENT COMPUTER VIRUSES
1. Install a reliable Antivirus program
a. From the first moment you turn your computer on, you should have a trusted antivirus
program by your side
2. Install anti-spyware and anti-malware programs
a. As good as the best antivirus programs are they sometimes need a little bit of help.
Thankfully, many of the top anti-spyware programs are completely free
3. Avoid suspicious websites
a. A good virus protection program will alert you when you visit a website that attempts to
install or run a program on your computer. Many less than reputable adult websites do
this, so if you get a warning, don’t go back, you may end up with a bug that can’t get rid
of
4. Never open Email Attachments Without Scanning Them First
a. The most common way viruses spread throughout internet is still via Email. Some
attachments, like pictures, now display in emails and don’t require an attachment to be
manually opened, but other documents do
5. Set up Automatic Scans
a. Many of the top antivirus programs, as well as the best anti-spyware programs, now
have settings that will let them automatically run during down times or in the middle of
the night
6. Watch your Downloads
a. Part of the fun of the internet is downloading music, movies and other items. However
since these downloads are so massive, it can be easy to sneak a virus along for the ride.
Only download these files from trusted from trusted sites that you can count on, or at
the very least, scan them before you open them.
7. Updates
a. There is a reason why Windows has a feature called Critical Updates. There is an entire
branch of Microsoft dedicated to staying one step ahead of the hackers out there so
when they manage to fix a possible security loophole, you need to download the patch
right away
8. Know what to look for
a. Even if you are just a casual computer user, you should have an idea of how your
machine operates, what normal pop-up windows look like and what popular viruses are
out there, that way, when your computer begins exhibiting telltale signs, you’ll know.
b. You can help prevent computer viruses by staying update and educated
9. Stay away from Cracked Software
a. It is so secret that you can download illegal, cracked versions of some programs online.
As tempting as it may be, these files are almost always infested with advanced and
difficult to detect bugs. Play it safe and get your software away from the source
10. Install a Firewall
a. A firewall is a program that screens incoming internet and network traffic. Along with
your virus program, it can help prevent unauthorized access to your computer
11. Be prepared to Lock Down
a. If you hear of a virus that is spreading like wildfire through the internet, make an extra
effort to be careful. Don’t open any suspicious emails or accept any downloads for a
week or two until your virus protection program has been updated and you are, once
again, safe.