Understanding Comuputer Viruses

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

Understanding

Comuputer
Viruses
By - Devansh
INTRODUCTION TO
COMPUTER VIRUSES
Computer viruses are malicious software
programs designed to often cause
damage to computer systems or stealing
sensitive information.
ONLINE
They dont like like this ETIQUETTE
We need to practice proper
behavior and good manners
in our online classroom.

WeBut
needdo the same
to remember andthing,
followto your
these computers.
simple rules
during class.
HOW ARE THEY SPREAD?
Via Internet: By downloading infected files from
internet
Media Appliances: USB drives, CDs and DVDs can
carry viruses, which when plugged into your computer,
can immediately start doing its job.
Fraud Emails: By opening infected emails, you can
introduce viruses to your computers.
Types of Computer Viruses
There are several types of computer viruses and list goes on. Here are some of them -

Trojan: A computer program that disguises itself as something else, usually to sneak
onto your computer and deliver malware.
Worm: A type of malware that can spread across systems and networks on its own,
without any action from a user.
Logic Bomb: A piece of code that causes havoc only when a specific set of
circumstances occur.
Rootkit: A software package that gives attackers administrative access to a system.
Software bug: A flaw or mistake in the code that a software program is made of.
WHAT TYPE OF
DAMAGE DO
THEY DO?
Identity Theft: Most of the times viruses are
made to steal people’s private info like bank
account info, address and private info. The
reason bieng more money stealing.

Data Loss: Viruses can delete or corrupt files.

Hacking: They can be used to hack and stalk


you without you even knowing.
All these viruses are just basically hacking. Hacking
can be done on any platform, may it be your router
and a whole software system of a brand. With
increasing tech advancements and AI, hacking has
gotten more easier. Even the safest programs like
Yahoo, Microsoft and Facebook are hacked
previously. It’s important to protect your private
info. Following are some ways to help protect your
data.
ALWAYS QUESTION
YOU FILES FROM A
NON-TRUSTED SITE
OR PLATFORM.

....?
SOME SECURITY
MEASURES :-
Update your software constantly provides hackers
with less pot holes
Use unique passwords for different sites
Only trust sites with Hypertext Transfer Protocol
Secure (HTTPS) prefix.
Avoid clicking on ads and strange things
Don’t use public wi-fi or charging ports
PERSONAL
EXPERIENCE
I haven’t faced any serious issues
related to getting scammed as I always
follow the safety measures. But i often
get fake emails asking me to either tap
on a link to sign up for the fake $1
million I won or a fake person saying
it’s your time to pay for your internet. I
make sure to not fall for that.
‘ILOVEYOU’

The "ILOVEYOU" virus, also known as the Love Bug or Love


Letter, was one of the most infamous computer viruses in
history. It emerged in May 2000 and spread rapidly via
email, infecting millions of computers worldwide within a
matter of hours. The virus was distributed via email with a
subject line that said "ILOVEYOU" and an attachment
named "LOVE-LETTER-FOR-YOU.TXT.vbs". Once opened,
the virus would overwrite files, spread itself by sending
copies of the email to all contacts.
It is no longer active now and served as
an example for rapid improvements of
email softwares and other companies.
The creators of the virus were two
Filipino programmers, Reonel Ramones
and Onel de Guzman. They claimed that
the virus was intended as a harmless
experiment to steal internet access
passwords, but it quickly got out of
control.
For more detail on what the creators of
this virus thought check the following
page.

https://www.dailymail.co.uk/sciencetech
/article-8294281/Creator-one-worlds-
global-computer-viruses-regrets-
infecting-45-million.html
CITATIONS
Ihttps://www.fortinet.com/resources/cyberglossary/what-is-
hacking
https://www.fortinet.com/resources/cyberglossary/computer-
virus
https://www.paubox.com/hubfs/Imported_Blog_Media/Untitled-
design-2-2-4.png
https://uk.norton.com/blog/malware/famous-computer-viruses
https://cyberhoot.com/wp-content/uploads/2020/02/Screen-
Shot-2017-11-06-at-11.34.12-PM.png
https://www.siliconindia.com/news/newsimages/special/p4xNk
y1V.jpeg

You might also like