Computer Virus: Computer Awareness Notes

Mentor for Bank Exams
Computer Virus: Computer Awareness Notes
Computer Virus
A computer virus is a malware program which when executed, replicates itself into computer programs, data files, or the boot sector of the hard drive. It is a program designed to replicate itself into other files or programs stored on your device. 
A Virus harms the computer by using hard disk space or CPU time. Viruses also access the private information of the user, corrupts data, spamming their contacts, or logging their keystrokes. Not all viruses attempt to hide themselves. In simple words, viruses are self-replicating computer programs which install themselves without the user’s knowledge.
Virus spreads through:
  • E-mail attachments
  • Portable devices such as CDs, DVDs, Pendrives, Memory Cards etc
  • Websites containing malicious scripts 
  • File downloads from Internet
Types of Virus
  • Macro Virus - Macro virus harms the documents which use macros such as word processing and excel spreadsheet documents. A macro virus is written in macro language.
  • Companion Virus A virus that creates a new file with same existing filename.
  • Virus hoax – A computer virus hoax is a message, can be a false e-mail warning the recipients to forward it to everyone they know.
  • Computer prank It is a prank related to either the software or the hardware of computers.
  • WORM A computer worm is a computer program that replicates itself in order to spread to other computers. It mostly uses a computer network to spread itself. Unlike a computer virus, it does not need to attach itself to an existing program.
  • Trojan horse A Trojan horse is a generally non-self-replicating type of code which when executed, causes loss or theft of data, and possible system harm.
Some of the famous computer virus
  • Creeper-1971
  • Elk cloner-1982
  • The Morris Internet worm-1988
  • Melissa-1990
  • I Love You-2000
  • Code red-2001
  • Nimade-2001
  • SQL slammer-2003
  • Blaster-2003
  • Sasser-2004
  • Antivirus software is a computer software used to prevent, detect and remove malicious software fromcomputer.
  • Antivirus software detects and removes computer viruses from the system. Antivirus software also provides protection from other computer threats as there is rapid increase of other kinds of malwares.
  • Now days, an antivirus protects the computer from malicious Browser Helper Objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraud tools, adware, and spyware.
  • Examples - Norton, AVG, Optimo, AV, Mcafee, Avira, Bitdefender, Pandasecurity, Eset, QuickHeal, Kaspersky, Immunet and etc.
Important Computer Security Threats
  • Phishing – The act of acquiring private or sensitive data from personal computers for use in fraudulent activities. Phishing is usually done by sending emails that seem to appear to come from credible sources (however, they are in no way affiliated with the actual source/company), which require users to put in personal data such as a credit card number or social security number. This information is then transmitted to the hacker and utilized to commit acts of fraud. 
  • Spam – Spamming is sending unsolicited messages, especially advertising, as well as sending bulk messages on the same site or through an e-mail.
  • Malware Malware disrupts computer operation, gather sensitive information, or gain access to private computer systems without the user’s knowledge.
  • Adware - It is a software package which automatically starts advertisement.
  • Spyware Spyware is software that is secretly installed on a computer without the user’s consent. It monitors user activity or interferes with user control over a personal computer.
  • Firewall A firewall is a network security system which controls the incoming and outgoing network traffic based on a set of rules. A firewall establishes an obstacle between a trusted, secure internal network and another network. Firewalls exist both as a software solution and as a hardware appliance.
  • SPIM - SPIM is spam sent via instant messaging systems such as Yahoo! Messenger, MSN Messenger and ICQ.
  • SPIT - SPIT is Spam over Internet Telephony. These are unwanted, automatically-dialed, pre-recorded phone calls using Voice over Internet Protocol (VoIP).
  • Spoofing - Spoofing is an attack in which a person or program masquerades as another. A common tactic is to spoof a URL or website (see phishing).
  • Pharming - Pharming is an attack in which a hacker attempts to redirect a website's traffic to another website. Pharming can be conducted either by changing the hosts file on a victim’s computer or by exploitation of a vulnerability in DNS server software. 
  • Keylogger - A keylogger is a software program that is installed on a computer, often by a Trojan horse or virus. Keyloggers capture and record user keystrokes. The data captured is then transmitted to a remote computer.
  • Blended Threat - A blended threat is a threat that combines different malicious components, such as a worm, a Trojan horse and a virus. In this way, a blended threat uses multiple techniques to attack and propagate itself.