Assignment On Computer Viruses - Odt

You might also like

Download as odt, pdf, or txt
Download as odt, pdf, or txt
You are on page 1of 5

Assignment On Computer Viruses

Types Of Computer viruses-

1. Boot Sector Virus - This type of virus is stored in the boot sector of floppy
and hard disk. When you start the computer, then it interrupts the operating
system to load and if the operating system starts working in any way, then it
starts interrupting the other work of the computer.

2. Partition Table Virus - This type of virus damages the partition table of
the hard disk. This affects the hard disk's master boot record and has the
following results-
It executes itself at the higher priority location of the master boot record.
This reduces the capacity of RAM.
It generates an error in the disc's input / output controller program.

3. File Virus - This virus damages computer files, it damages the .exe file.

4. Secret Virus (Stealth Virus) - Secret viruses make every effort to hide
their identity from the user in the computer according to their name. These
are called secret viruses.

5. Polymorphic Virus - This virus has the ability to change itself frequently
so that each infection looks completely different from the actual infection. It
is very difficult to stop such viruses because each time it is completely
different.

6. Macro Virus - Macro viruses are specifically meant to damage certain


types of files such as documents, spreadsheets, etc. These viruses only harm
the files in Micro Software Office.

Major Viruses And Their Symptoms


1.Conficker Virus-
This virus affects the systems that run by the Windows operating system. The
virus is used to steal financial data and information. After the attack of this
virus in the system, other devices connected to the local network are also
affected. The virus has affected crores of computers used in government
offices, business offices and homes.

2.Mebroot Virus -

This virus takes control of the entire system as soon as it is downloaded into
the computer and in a few seconds, it copies itself and creates thousands of
files. On the system affected by this virus, hackers have complete control
over any user's file manager, registry editor, webcam, power option, remote
IP scanner, etc.

3.Leap Virus -

This virus first affected Apple's MacBook. This virus sends fake messages to
people connected to i-chat through messages. The system affected by this
virus slows down considerably.

4.Storm Worm -

This virus is installed in the system as soon as you click on the link that
comes with the mail. As soon as it is downloaded into the system, the hackers
can control the computer and send snap (picture) through internet.

5.My Doom -

The virus comes with a title like "mail transaction failed". This virus transfers
to the address book of the mail box and kills the data.

6.I love you Virus -

This virus comes with the title I love you and it is attached to the “love letter
for you” attachment. This virus becomes active as soon as you open this mail.
This virus automatically enters the system and sends exactly the same
message to the 50 people present in the user's mail box through which the
message came in the user's system. This virus crashes the entire mail and
server system. The virus has so far eradicated many banking systems. Many
pagers and paging services have been shut down due to this virus.

7.CIH -

This virus attack causes the system's hard drive to crash. This virus
overwrites the system's BIOS chip.

Tools/Tips Used For Safety-

1. Always install a good Antivirus in your system and keep updating it from
time to time.

2. Be careful while opening your email. Do not open spam mails. If you do
not know about the sender then you should not open it.

3. Do not download anything from Unauthorized Websites such as MP3,


Movies, Software etc. Do not download documents or executable software
from untrusted websites.
If you download any file, video from internet, make sure that the site is good.

4. Get all the downloaded things scanned properly. Because they are more
likely to have a virus.

5. Use removable media such as pendrive, only after scanning the disks. Do
not try to open any unsolicited executable files, documents, spreadsheets,
without scanning.

Some More Dangerous Viruses-

Worms-
Worms are also like viruses, but they multiply themselves and try to spread
themselves as much as possible. Which means that if there are worms in your
system, then they start making many copies of different files, due to which
the system slows down.
If we copy and share the same files with another computer, then worms will
go there and slow down that computer by making many copies of files.

Trojen Horse-

Trojan horse is a harmful computer program that controls our system and
leads to malicious action. Trojan cannot create its own copy like a virus, but
it can install the virus in the system.
Trojan horse is also called trojan, people download the trojan by cheating
thinking that this file is correct but it is trick to trap people.
A Trojan can delete system files and data.It can steal important information
and passwords. It can lock the system. Can download and install malware.
Can restart the system. Can infect CDs. And also it can close the program.

Bad rabbit-

Bad Rabbit is a suspected variant of Petya ransomware. This malicious


software infects computers and restricts user access to the infected systems
until a ransom is paid to decrypt it. It is important to have virus protection
software in place to steer clear from this online danger.
BadRabbit spreads via drive-by downloads on infected websites. In most
cases of BadRabbit infections, visitors are tricked into clicking the malware
by falsely alerting them that their Adobe Flash player requires an important
update.
BadRabbit uses Mimikatz (a post-exploitation tool) to extract common hard-
coded login credentials such as Admin, Guest, User, root, etc. In some cases,
BadRabbit ransomware uses a legitimate tool called DiskCryptor, to encrypt
the victim’s data.
Once the victim’s computer is infected with BadRabbit ransomware and their
data encrypted, the ransomware reboots the computer and a message with the
title “Oops! Your files have been encrypted” is displayed after reboot.
Chameleon

The Chameleon virus is the first polymorphic virus. When a file infected with
Chameleon is executed the virus will infect all .com files in the current
directory. It sets the seconds field of a newly infected file's timestamp to the
impossible value of 62.

Software bomb-

A logic bomb is a malicious program timed to cause harm at a certain point in


time, but is inactive up until that point. A set trigger, such as a pre-
programmed date and time, activates a logic bomb. Once activated, a logic
bomb implements a malicious code that causes harm to a computer. A logic
bomb's application programming points may also include other variables
such that the bomb is launched after a specific number of database entries. A
logic bomb may be implemented by someone trying to sabotage a database
when they are fairly certain they won’t be present to experience the effects,
such as full database deletion.

You might also like