Premium Essay

8 Common Types of Computer Viruses

In: Computers and Technology

Submitted By Dethwarmdovr
Words 642
Pages 3
Howard Mayo
NT1230
4/3/12

8 Common Types of Computer Viruses Dictionary.com defines a computer virus as “a segment of self-replicating code planted illegally in a computer program, often to damage or shut down a system or network (“Virus,” 2012).” The term virus has become more generic over the years and has come to represent any type of malware, or malicious software. There are many types of malware that can be classified as viruses but it is the intention of this paper to examine 8 of the most common types. These types are virus, worms, trojans, adware/pop-up ads, spyware, keyloggers, rootkits, and scareware. * Virus- as defined above, a virus is self-replicating code planted in a computer program. This malware’s sole purpose is to destroy or shut down systems and networks. (“Virus,” 2012). * Worms- These are standalone programs whose sole purpose is to replicate and spread themselves to other computers. Their main use is to search for and delete certain files from computers. * Trojans- This malware is designed to look like a useful program while giving control of the computer to another computer. It can be used for several malicious things: * As part of a botnet to use automated spamming or distribute denial-of-service attacks. * Electronic money theft * Data theft * Downloading or uploading of files to the computer * Deletion or modification of files * Crashing the computer * Watching the viewer’s screen * Anonymous internet viewing * Adware/pop-up ads- “The definition of adware is a software package which displays or downloads advertisements to a computer. These ads are usually in the form of pop-ups, and the goal of adware is to generate revenue for its author. In itself, adware is harmless, however, some of it may come integrated with spyware (What is the definition of adware? 2012).” * Spyware-

Similar Documents

Premium Essay

Computer Virus

...analyses the spread of viruses and defines certain measures that computer users may take into account to avoid viruses. Overall ,it was learnt from the report that it is important to keep us updated about computer viruses to be able to successfully safeguard us from computer virus attacks Introduction to Computer Virus: Viruses are mischievous programs, the purpose of which is to disrupt the sensible use of computers. It is a type of a mal-ware and do little more than display a message( Usually insulting!!!) on the screen , but some are designed to act after a certain period of time and do such things as make the letters start to drop off the screen or even erase the entire contents of your hard disk. As their name suggests, viruses are able to spread by infecting other disks and they do this by copying themselves onto other disks which are being used by the computer. Viruses are little programs or scripts that can create files, move files, erase files, consume your computer's memory, and cause your computer not to function correctly or to crash completely. Some viruses can duplicate themselves, attach themselves to programs, and travel across networks. They can self-modify or change over time as they copy themselves.  Viruses only spread across multiple computers if an uninfected computer is connected to a network, or if the computer gets connected to infected media such as a USB drive or a CD. Although there are many viruses, the main problems...

Words: 2136 - Pages: 9

Premium Essay

Malware

...occupy as much memory as possible and eliminating opposing programs. This game is considered the precursor to computer viruses. In 1972, Robert Thomas Morris created the first virus as such: Creeper, which could infect IBM 360 on the ARPANET (the predecessor of the Internet) and show an on-screen message saying “I’m the creeper, catch me if you can”. To eliminate it, a virus called Reaper was created to search for it and destroy it”…………………...PANDA SECURITY ( 2011) Malware Overview Retrieved from http://www.google.com/images?rlz=1T4ADFA_enUS391US392&q=virus+clipart&um=1&ie=UTF-8&source=univ&sa=X&ei=nOx7TfqZEoXorAGvu5zCBQ&ved=0CDMQsAQ&biw=1174&bih=463 Malicious software, better known as Malware, is the most sophisticated type of threat to a computer system. Malware is simply code that is designed with purpose and intent to destroy, steal, disrupt or damage someone’s data, computer system or network. Malware is software that is written to do detriment to the data that resides on a computer or network, and is designed to secretly gain access to the system without the owner's knowledge or consent. Once installed, malware can run and stay resident on the system. This disruption, infection, or damage results in system degradation and performance and a loss of security. Before we had the Internet, a virus infected computer...

Words: 3874 - Pages: 16

Premium Essay

On-Line Security: Attacks and Solutions

...EVREN KUCUKKAYA E-COMMERCE SEMINAR Elias A. Hadzilias, PhD NTUA Assignment: On-line security: attacks and solutions 2012 ISG – INTERNATIONAL MBA Table of Context 1. INTRODUCTION ................................................................................................................................... 3 2. MAIN TYPES OF MALWARE ................................................................................................................. 4 2.1. Computer Viruses ............................................................................................................................. 4 2.1. Computer Worms ............................................................................................................................. 5 2.3. Trojan Horses.................................................................................................................................... 6 2.4. Spyware ............................................................................................................................................ 6 2.5. Backdoor........................................................................................................................................... 6 2.6. Spams ............................................................................................................................................... 7 2.7. Keyloggers ....................................................................................................

Words: 5692 - Pages: 23

Premium Essay

On-Line Security: Attacks and Solutions

...EVREN KUCUKKAYA E-COMMERCE SEMINAR Elias A. Hadzilias, PhD NTUA Assignment: On-line security: attacks and solutions 2012 ISG – INTERNATIONAL MBA Table of Context 1. INTRODUCTION ................................................................................................................................... 3 2. MAIN TYPES OF MALWARE ................................................................................................................. 4 2.1. Computer Viruses ............................................................................................................................. 4 2.1. Computer Worms ............................................................................................................................. 5 2.3. Trojan Horses.................................................................................................................................... 6 2.4. Spyware ............................................................................................................................................ 6 2.5. Backdoor........................................................................................................................................... 6 2.6. Spams ............................................................................................................................................... 7 2.7. Keyloggers ....................................................................................................

Words: 5692 - Pages: 23

Free Essay

Developer

...Abstract— Computer viruses are widely recognized as a significant computer threat. The “birth rate” of new viruses is high and increasing due to global connectivity, and technology improvements can accelerate their spread. In response to this threat, some contemporary research efforts are aimed at creating computer virus immune systems. This paper analyses the computer viruses and attacks and also some countermeasures to prevent them. In particular, we discuss Intrusion Detection and Prevention techniques for handling web based attacks and to patch up different kinds of vulnerabilities in computer system. I. INTRODUCTION Web based system makes the next way of computing. Global prosperity and even faster pace of business are driving the desire for employees, partners and customers to able to communicate from different location in this world. With this phenomenal growth of computing devices, the threat of viruses is likewise growing. New platforms such as MAC OS of Apple and Microsoft Windows are highly attractive targets to virus and Trojan writers. As technology in the world of networking industries advances, virus writers have plenty of room for growth. Worse thing is security measures such as firewalls and virus scanners i.e. antivirus softwares are not widely used. The future may be even worse. With distributed programming platforms such as .NET, combine with Microsoft’s Windows platform the potential for viruses is even greater. II. OVERVIEW OF THREATS AND POTENTIAL...

Words: 4071 - Pages: 17

Premium Essay

Lab 4

...the end. Q: From your local computer, use your favorite Internet browser to research the threat identified on this screen and the possible remediation steps and document your findings in your Lab Report file. Viruses found: 1. Win32/DH{eR4UTxVzG3U} 2. Win32/DH{eR4UTxVzG3U} 3. Win32/DH{HhMXFE8Vcxt1} 4. Trojan horse Dropper.Generic4.BVMA 5. Trojan horse Hider.BNG 6. Trojan horse PSW.Generic11.NYJ 7. Potentially harmful program Logger.IAC 8. Potentially harmful program RemoteAdmin.IH 9. Potentially harmful program Tool.IT Assessment: 1. It seems that the first three are all the same type of virus. A “Win/DH is a malicious software that once it is executed has the capability of replicating itself and infect other files and programs”( Win/DH). They “can steal hard disk space and memory that slows down or completely halts your PC, corrupt or delete data, erase your hard drive, steal personal information, hijack your screen and spam your contacts to spread itself to other users” (Win/DH). To avoid the possibility of one, you should be careful of e-mail attachments especially if they are from an outside source, as well as download links on websites. Having a virus removing application such as AVG is essential to being able to remove these viruses before they spread. AVG is capable of detecting this virus while surfing the web and block its download, but should it already be on the computer a simple scan and remove process...

Words: 1494 - Pages: 6

Premium Essay

Fdess

...Hands-On Ethical Hacking and Network Defense Second Edition Chapter 3 Network and Computer Attacks Objectives • After this lecture and completing the exercises, you will be able to : – Describe the different types of malicious software and what damage they can do – Describe methods of protecting against malware attacks – Describe the types of network attacks – Identify physical security attacks and vulnerabilities Hands-On Ethical Hacking and Network Defense, Second Edition 2 Malicious Software (Malware) • Network attacks prevent a business from operating – Malicious software (malware) • Virus • Worm • Trojan program – Goals • • • • Destroy data Corrupt data Shutdown a network or system Make money 3 Hands-On Ethical Hacking and Network Defense, Second Edition Viruses • Virus attaches itself to a file or program – Needs host to replicate – Does not stand on its own – No foolproof prevention method • Antivirus programs – Detection based on virus signatures • Signatures are kept in virus signature file • Must update periodically • Some offer automatic update feature Hands-On Ethical Hacking and Network Defense, Second Edition 4 Table 3-1 Common computer viruses Hands-On Ethical Hacking and Network Defense, Second Edition 5 Viruses (cont’d.) • Encoding using base 64 – – – – – – – – Typically used to reduce size of e-mail attachments Also, used to encrypt (hide) suspicious code. Represents zero to 63 using six bits A is 000000… Z is 011001 Create groups of four characters...

Words: 1394 - Pages: 6

Premium Essay

Operating System Comparisons

...Comparisons PRG/355 January 14, 2013 Steven Kernan Operating System Comparisons Table of Contents Introduction 3 Memory Management 3 File Management 4 Security 4 Conclusion 4 Reference 5 Introduction An operating system (OS) is software that manages the hardware and software resources of a computer system. Basically an OS is a set of libraries or functions which programs may use to perform specific tasks relating to interfacing with computer system components (The Computer Technology Documentation Project, n.d.). Advantages and disadvantages exist in every operating system. Reviewed in this paper is a comparison of some of the primary responsibilities of popular operating systems. The review includes Unix/Linux, Mac, and Microsoft Windows operating systems. Memory Management An important function of the OS is to manage the computer systems memory. Programs, processes, and resource do not simply float around in memory haphazardly. Memory is shared among these processes and resources. Accordingly, managed by the OS is an organized structure of locating processes in computer memory locations. The two primary types of memory controlled by an OS are main memory and virtual memory. Main memory is… (need general definition). Virtual (secondary) memory is… (need general definition). Intended memory management requirements include relocation, protection, sharing, logical organization, and physical organization. Processes may be swapped from main...

Words: 1019 - Pages: 5

Free Essay

An Overview of Computer Viruses in a Research Environment

...An Overview of Computer Viruses in a Research Environment Matt Bishop Department of Mathematics and Computer Science Dartmouth College Hanover, NH 03755 ABSTRACT The threat of attack by computer viruses is in reality a very small part of a much more general threat, specifically attacks aimed at subverting computer security. This paper examines computer viruses as malicious logic in a research and development environment, relates them to various models of security and integrity, and examines current research techniques aimed at controlling the threats viruses in particular, and malicious logic in general, pose to computer systems. Finally, a brief examination of the vulnerabilities of research and development systems that malicious logic and computer viruses may exploit is undertaken. 1. Introduction A computer virus is a sequence of instructions that copies itself into other programs in such a way that executing the program also executes that sequence of instructions. Rarely has something seemingly so esoteric captured the imagination of so many people; magazines from Business Week to the New England Journal of Medicine [39][48][60][72][135], books [20][22][31][40][50][67][83][90][108][124], and newspaper articles [85][91][92][94][114][128] have discussed viruses, applying the name to various types of malicious programs. As a result, the term “computer virus” is often misunderstood. Worse, many who do understand it do not understand protection in computer systems, for example...

Words: 12539 - Pages: 51

Free Essay

Password Security

...[pic] Password Security And Other Effective Authentication Methods [pic] Table of Contents Introduction 1 User Accounts 1 Account and Password Policy 2 Password Attacks 4 Authentication Methods and Password Management 5 Public Key Infrastructure 6 Single Sign-On (SSO) 6 One-Time Password (OTP) Tokens 7 Biometrics 7 Fingerprints 7 Face Scans 7 Retina Scans 7 Iris Scans 7 Palm Scans 8 Hand Geometry 8 Heart Patterns 8 Voice Pattern Recognition 8 Signature Dynamics 8 Keystroke Patterns 8 Password Managers 8 Conclusion 9 Bibliography 10 Introduction Human beings are arguably the weakest link in computer and information security. People pose such a significant threat to their own computer networks and personal information simply because they don’t keep password security in the forefront of their mind. This is one of the reasons passwords are considered a poor security mechanism. Still, passwords are the most common method for user authentication on computer systems and websites. Passwords are so easily hacked and used to steal personal information such as bank account credentials, credit card numbers, etcetera, contributing to the significant growth of identity theft, most of which could be prevented by using strong passwords and not writing them down. End user education on more secure authentication methods such as strong password creations and two factor authentication can help to improve cyber security for...

Words: 2777 - Pages: 12

Free Essay

Social Perspective on Violent Video Games

...Online Computer crime better known as Cybercrime refers to any crime that involves a computer and a network. Cybercrime may happen anywhere on the internet such as the chat room, email, notice groups, and even mobile phones. Technology is becoming so advance and more common that there are so many people who will take a chance to commit crimes that involve technology. It is so hard for the police to crack these type of cases, luckily there are people fighting computer crimes and federal agencies take this type of offense very seriously. such cybercrimes can be writing or spreading computer viruses or worms, making and digitally distributing child pornography, identity theft where this is accomplished by use of fraudulent computer transactions, and Salami slicing is the practice of stealing money repeatedly in extremely small quantities, and in which these are only a few cybercrimes that are and can be violated. Computer crime is a felony violation of section 1030 of the United States Code. Back in 2012 the FBI made a bust on the largest cybercrime ring in history when more the 2 dozen people in the United States were arrested. Suspects allegedly stole credit card and banking data and they shared this information via internet. One of the biggest cybercrimes is spreading a virus on someones computer. The most common type of computer virus is the “Trojan”.These types of viruses are usually downloaded unknowingly by the computer user thinking that the file is...

Words: 1125 - Pages: 5

Free Essay

Future of Technology

...today’s world of technology computer viruses attack the software of a computer- the operating system usually attacks the software. (Microsoft /TechNet 2011), states the macro virus is known as a written virus in the internal macro language of applications. In some cases macro virus can cause no damage to the data, however; in other cases, macros viruses have been written that can cause damage to your work. This paper explains. What macro viruses are? How they spread. What affect they have? How to avoid a macro virus How to protect your computer What are Macro viruses…..? A macro virus is a computer infraction written in macro language, which is commonly built into word processing applications. (Goggle 2011, pg., 1) In general, Marcos viruses are a series of commands and executions that help automate specific tasks. Regardless of how many they create, they must be executed by a system that is able to interpret stored commands. There are some macro systems that are actually self-contained utilities while others are built into more advanced applications for users to easily repeat a sequence of commands or enable a programmer to customize the application to suite the user’s needs. (Marti, 2011 pg.1) explains while there is no concrete definition of a computer virus, some if not all will agree that it refers to an executable code, (programming language), that, when the run, will attach to or infects other files or applications in the host computer in an...

Words: 2341 - Pages: 10

Premium Essay

Computer Viruses

...Computer Virus A computer virus is a malicious piece of executable code that propagates typically by attaching itself to a host document that will generally be an executable file. ✓ Typical hosts for computer viruses are: – Executable files (such as the ‘.exe’ files in Windows machines) that may be sent around as email attachments – Boot sectors of disk partitions – Script files for system administration (such as the batch files in Windows machines, shell script files in Unix, etc.) – Documents that are allowed to contain macros (such as Microsoft Word documents, Excel spreadsheets, Access database files, etc.) ✓ Any operating system that allows third-party programs to run can support viruses. ✓ Because of the way permissions work in Unix/Linux systems, it is more difficult for a virus to wreak havoc in such machines. Let’s say that a virus embedded itself into one of your script files. The virus code will execute only with the permissions that are assigned to you. For example, if you do not have the permission to read or modify a certain system file, the virus code will, in general, be constrained by the same restriction. ✓ At the least, a virus will duplicate itself when it attaches itself to another host document, that is, to another executable file. But the important thing to note is that this copy does not have to be an exact replica of itself. In order to make more difficult the detection by pattern matching, the virus may alter itself...

Words: 2382 - Pages: 10

Free Essay

Information Security Chapter Two

...management groups are responsible for implementing information security to protect the organization’s ability to function? Both General management and IT management. 4. Has the implementation of networking technology created more or less risk for businesses that use information technology? Why? More risk, now that attackers have the potential to access the networks from anywhere. 5. What is information extortion? Describe how such an attack can cause losses, using an example not found in the text. When information is held hostage until demands are met. 7. What measures can individuals take to protect against shoulder surfing? Avoid, if possible, accessing sensitive information whenever others are present. Be aware of your surroundings. 8. How has the perception of the hacker changed over recent years? What is the profile of a hacker today? The perception of a hacker has changed and grown to include male/females from the ages of 12-60. 9. What is the difference between a skilled hacker and an unskilled hacker (other than skill levels)? How does the protection against each differ? A skilled hacker will create their own tools to get their jobs done, while an unskilled hacker will use tools created...

Words: 907 - Pages: 4

Premium Essay

Student

...Information Computer Technology Author Musisi Boney 2013 EDITION Authored by Musisi Boney; +256788489095 2 Table of contents Topics Page Introduction To Computer …………………………………………………….. 5 History & Evolution Of Computers ………………………………………….... 7 Computer Generation …………………………………………………………. 11 Computers Today ……………………………………………………………... 15 Computer Classification ………………………………………………………. 19 Computer System ……………………………………………………………... 25 Computer Hardware ………………………………………………………….. 27 - Input devices/hardware .………………………………………………..27 - Output devices/ hardware..…………………………………….…….....39 - Storage hardware /devices ……………………………………………..49 - Processing devices/hardware …………………………………………..63 - Communication devices/hardware…………………………………….. Computer Software …………………………………………….……………...69 - Utility program …………………………………………………………70 - Operating system ……………………………………………….………72 - Programming languages ………………………………………………78 - Terminologies Used in Software ………………..……………….…....80 Powering A Computer ……………………………………………….………..83 Uninterrupted Power Supply……………………………………………….....85 Computer Configuration…………...…………………………….……………87 Computer Viruses ……………………………………………….……………89 Communication ………………………………………………………………95 Internet ………………………………………………………………………113 Web Design …………………………………………………………………121 Computer Ethics …………………………………………………….………125 Computer Crimes …………………………………………………….……..129 Authored by Musisi Boney; +256788489095 3 Authored by Musisi Boney; +256788489095 4 A COMPUTER A computer is a...

Words: 30445 - Pages: 122