Virus Is Simply A Computer Program That Someone Created Often Just For The Fun of It Computer Virus

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

virus is simply a computer program that someone created often just for the fun of it

Computer virus’s have the incredible capacity to spread like wildfire and infect many other
computers along the way. A virus is usually always destructive in some way. An example
whereby a virus may search an infected host computer for all your saved email addresses,
it then emails itself to all your collected email addresses.It may then on some predetermined
day, erase the entire contents of these infected computers that it has been transmitted to.
Quite often the recipients that received this apparently harmless email that was
automatically sent from your PC may then open that email, infect their computer, and the
virus then repeats the process over and over again.
Although a virus is able to spread on its own, it generally needs some sort of human
involvement to spread itself in order to infect other computers. Usually this means someone
has to 'open' (double-click) the virus program. Virus writers usually use some kind of trick to
encourage people into opening their virus programs. This is why it is important to never
open an email attachment that you were not expecting - EVEN if it appears to be from
someone you know.

The Worm:
The worm is somewhat similar to the virus except in one detail. The worm requires
absolutely no human help or involvement to spread itself! The Worm relies totally on
security 'holes' or “gaps” in Microsoft Windows, Microsoft Internet Explorer, or other
systems/programs that allow them to automatically spread themselves over the internet. A
security hole is quite simply an error or oversight in a program that when manipulated in just
the right way, can be made to take control of the computer.

The Trojan horse:


A trojan-horse is program that can do damage like a Virus or a Worm, but it does not have
the ability to spread to other computers. Instead, the Trojan is disguised as something that it
isn't - such as a game, an image or picture-file. The user is then led to believe he or she is
getting something for free, in reality they are getting much more than they expected. If it is
too good to be true then chances are it is dangerous.

Spyware:
Spyware is software that is installed on your computer without your knowledge, remains
hidden, and is often difficult to remove. The purpose of spy-ware is usually to gather
information about your web-surfing habits, your email addresses, or other personal
information, and then transmits the information back to its creator often to be sold for
marketing purposes.
Although spyware usually does not intentionally cause damage to your PC, it often slows it
down or causes it to crash. If you are using Microsoft Windows or Microsoft Internet
Explorer, and you are an average user, and if you have not taken steps to prevent it
Be very cautious downloading Anti-Spyware software, many users have been totally locked
out of their system by Software claiming to be anti Spyware. Always research software
before downloading or have your I.T professional install and run Anti Spyware software for
you. Often a reputable software solution can be misrepresented and offered for sale by
opportunists. There are several very good and yet free Anti Spyware solutions that are
offered for money from web sites that are not in any way connected to the original products
developers.

Educational institutes in Pakistan, like those in many other regions, can be susceptible to various types of
modern viruses and malware. Here are some common types of viruses and potential solutions to
mitigate their impact:

1. **Ransomware:**

- **Description:** Ransomware encrypts files on a system and demands a ransom for their release.
Educational institutes often store sensitive data, making them attractive targets.

- **Solution:** Regularly backup important data and ensure that backups are stored securely offline.
Use reliable antivirus software and educate staff and students about the dangers of clicking on
suspicious links or opening attachments.

2. **Phishing Attacks:**

- **Description:** Phishing involves tricking individuals into revealing sensitive information by posing
as a trustworthy entity. Educational institutions can be targeted through fake emails, websites, or social
engineering.

- **Solution:** Conduct regular awareness training to educate staff and students about phishing
techniques. Implement email filtering solutions to detect and block phishing attempts.

3. **Malicious Software (Malware):**

- **Description:** Malware is a broad category that includes viruses, worms, trojans, and other
malicious software. These can infect systems, steal data, or disrupt normal operations.

- **Solution:** Maintain up-to-date antivirus and anti-malware software on all systems. Regularly scan
and update systems to detect and remove malware. Educate users about safe online practices.

4. **Zero-Day Exploits:**

- **Description:** Zero-day exploits target vulnerabilities that are not yet known to the software
vendor, making them particularly dangerous.

- **Solution:** Keep software and operating systems up-to-date with the latest security patches.
Employ intrusion detection and prevention systems to identify and block suspicious activities.
5. **Denial-of-Service (DoS) Attacks:**

- **Description:** DoS attacks aim to disrupt the normal functioning of a network or website by
overwhelming it with traffic.

- **Solution:** Implement firewalls and intrusion prevention systems to filter malicious traffic. Use
content delivery networks (CDNs) to distribute traffic and absorb DDoS attacks.

6. **Endpoint Security Risks:**

- **Description:** Infections can occur through vulnerable endpoints like computers, laptops, and
mobile devices.

- **Solution:** Enforce endpoint security measures, such as implementing device management


policies, endpoint protection software, and ensuring all devices are updated regularly.

7. **Insider Threats:**

- **Description:** Malicious or unintentional actions by individuals within the organization can pose a
security risk.

- **Solution:** Implement access controls and regularly review and update user permissions. Conduct
periodic security awareness training for staff and students.

8. **IoT Security Concerns:**

- **Description:** Educational institutes increasingly use IoT devices, which can be vulnerable to
attacks.

- **Solution:** Secure IoT devices by changing default credentials, updating firmware regularly, and
isolating IoT networks from critical systems.

It's important for educational institutions to adopt a multi-layered approach to cybersecurity, combining
technical solutions with user education and policy enforcement. Regular risk assessments, security
audits, and collaboration with cybersecurity experts can help in developing and maintaining effective
security strategies. Additionally, fostering a culture of cybersecurity awareness among staff and students
is

You might also like