The Effects of Using ICT VIRUSES

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

COMPUTER VIRUS

- a type of malicious software, or malware, that spreads between computers and causes
damage to data and software
- aim to disrupt systems, cause major operational issues, and result in data loss and
leakage.

OVERVIEW
● BRAIN - the first malicious, self-copying computer code that was unleashed back in
1986
● Mydoom - (2004) the most destructive virus in history and was the only one to spread
even faster than ILOVEYOU
● Viruses are programs that automatically make replicates (copies) of themselves and then
infect/attach to other files within the computer causing huge problems if left undetected

TYPES OF COMPUTER VIRUSES


★ Resident Virus
A resident virus propagates themselves by infecting applications as they are
opened by a user. A non-resident virus is capable of infecting executable files when
programs are not running.

★ Multipartite Virus
A multipartite virus remains in the computer’s memory to infect the hard disk,
then spread through and infect more drives by altering the content of applications.

★ Direct Action
A direct action virus accesses a computer’s main memory and infects all
programs, files, and folders located in the autoexec.bat path, before deleting itself. This
virus typically alters the performance of a system but is capable of destroying all data on
the computer’s hard disk and any USB device attached to it.

★ Browser Hijacker
A browser hijacker manually changes the settings of web browsers, such as
replacing the homepage, editing the new tab page, and changing the default search
engine.

★ Overwrite Virus
Overwrite viruses can delete data and replace it with their own file content or
code. Once files get infected, they cannot be replaced, and the virus can affect Windows,
DOS, Linux, and Apple systems.

★ Web Scripting Virus


A web scripting virus attacks web browser security, enabling a hacker to inject
web-pages with malicious code, or client-side scripting.
★ File Infector
A file infector overwrites files when they are opened and can quickly spread
across systems and networks. It largely affects files with .exe or .com extensions.

★ Network Virus
Network viruses are extremely dangerous, difficult to discover, and can easily
replicate and spread by using the internet to transfer to devices connected to the network.

★ Boot Sector Virus


A boot sector virus targets a computer’s master boot record (MBR) by injecting
its code into a hard disk’s partition table, then moves into the main memory when a
computer restarts.

WHAT PROBLEMS CAN VIRUSES CAUSE?


➢ Annoying pop-up messages on the screen
➢ Causing computer to slow down or crash (stop responding)
➢ Deleting important files or programs
➢ Trying to access personal files (e.g. passwords, bank details or credit card numbers, etc.)
➢ Shutting down or restarting computer unexpectedly
➢ Frequent error message
➢ Malfunctioning antivirus programs or firewalls

HOW DO VIRUSES INFECT COMPUTERS?


❖ Downloading/installing infected files from the internet
❖ Clicking on email attachments, bad link or button on phishing attacks or scam websites
❖ Plugging a flash memory stick (USB) that contains infected files into computer

PREVENTING SOFTWARE VIRUS INFECTIONS


1. Use up-to-date anti-virus software.
2. Use genuine copies of software by downloading from legitimate websites.
3. Only open email attachments from people you trust.
4. Scan flash memory with anti-virus software before you attach it to your computer.
5. Be careful on public wi-fi.
6. Follow the Core 4:
a. Use complex passwords unique to each account and use a password manager to
securely store all passwords.
b. Turn on multi-factor authentication (MFA) or 2-factor authentication.
c. Turn on automatic updates for hardware, software and apps.
d. Learn how to identify phishing.

WHAT TO DO TO INFECTED COMPUTERS?


1. Run a full-system scan
2. Restore to an earlier back-up
3. Delete temporary files
4. Go Safe Mode
5. Reinstall your operating system

You might also like