Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Name: Jessica Peralta Núñez (2019-0611)

Computer Virus and its Types

A virus is software that aims to alter the normal operation of any type of computing device,
without the user's permission or knowledge, mainly to achieve malicious purposes on the
device. Viruses usually replace executable files with other files infected with their code.
Viruses can intentionally destroy the data stored on a computer, although there are also other
more harmless ones, which only cause annoyances or unforeseen events.

Computer viruses basically have the function of spreading through software, they are very
harmful and some also contain a harmful load (payload) with different objectives, from a
simple joke to causing significant damage to systems, or blocking computer networks
generating useless traffic. The operation of a computer virus is conceptually simple. A
program is executed that is infected, in most cases, due to the user's ignorance. The virus
code remains resident (lodged) in the computer's RAM memory, even when the program that
contained it has finished executing. The virus then takes control of the basic services of the
operating system, subsequently infecting executable files that are called for execution.
Finally, the virus code is added to the infected program and recorded on the disk, thereby
completing the replication process.

One of the ideal methods by which viruses spread is through emails – opening the attachment
in the email, visiting an infected website, clicking on an executable file, or viewing an
infected advertisement can cause the virus to spread to your system. Besides that, infections
also spread while connecting with already infected removable storage devices, such as USB
drives.

Types of virus
There are several types of viruses, we will be defining them below:

Boot Sector Virus: This type of virus infects the master boot record and it is
challenging and a complex task to remove this virus and often requires the system to
be formatted. Mostly it spreads through removable media.

Direct Action Virus: This is also called non-resident virus, it gets installed or stays
hidden in the computer memory. It stays attached to the specific type of files that it
infects. It does not affect the user experience and system’s performance.
Resident Virus: Unlike direct action viruses, resident viruses get installed on the
computer. It is difficult to identify the virus and it is even difficult to remove a
resident virus.

Multipartite Virus: This type of virus spreads through multiple ways. It infects both
the boot sector and executable files at the same time.

Polymorphic Virus: These type of viruses are difficult to identify with a traditional
anti-virus program. This is because the polymorphic viruses alters its signature pattern
whenever it replicates.

Overwrite Virus: This type of virus deletes all the files that it infects. The only
possible mechanism to remove is to delete the infected files and the end-user has to
lose all the contents in it. Identifying the overwrite virus is difficult as it spreads
through emails.

Space filler Virus: This is also called “Cavity Viruses”. This is called so as they fill
up the empty spaces between the code and hence does not cause any damage to the
file.

Web scripting virus: Many web pages include complex code to create interesting
and interactive content. This code is often exploited by these types of computer
viruses to produce certain undesirable actions.

Macro Virus: Macro viruses infect files that are created using certain applications or
programs that contain macros such as .doc, .xls, .pps, among others. These mini
programs make it possible to automate a series of operations so that they are carried
out as if it were a single action, thus saving the user from having to carry them out
one by one. These types of computer viruses automatically infect the file that contains
macros and also infect the templates and documents that the file contains. It is usually
a virus that arrives by email.
File infectors

Few file infector viruses come attached with program files, such as .com or .exe files. Some
file infector viruses infect any program for which execution is requested,
including .sys, .ovl, .prg, and .mnu files. Consequently, when the particular program is
loaded, the virus is also loaded. Besides these, the other file infector viruses come as a
completely included program or script sent in email attachments.

Infection methods

There are many ways that a computer can be exposed or infected with viruses. Let's see some
of them:

 Messages left on social networks like Twitter or Facebook.


 Attachments in email messages.
 Suspicious websites.
 Insert USBs, DVDs or CDs with viruses.
 Downloading applications or programs from the internet.
 Fake advertisements.

An effective method in fighting a PC virus is prevention and caution when dealing with
Internet sources. This means, for example, that email attachments or files from unknown
sources should not be opened. In addition, you must use a spam filter, such as the one from
the Spam & Malware Protection service, for your email mailboxes.

If computer viruses reach your PC, an antivirus program can detect, block, and fight the
malware. The versatile antivirus tools available on the market can be divided into three types:
Real-time, manual and online scanners.

You might also like