Unit 1 What Is The Difference Between A Virus

Improved Essays
1) What is the difference between a virus and other types of malicious code?

A virus is a particular type of malicious program designed to duplicate itself and spread from system to system. Normally, viruses attach themselves to files that can be shared enabling the malicious code to access to new computers. Viruses that are more complex may take over your email client, mailing copies of themselves to the contacts for a faster, more effective transmission (Fritsch et al, 2015). Numerous virus contain a load designed to damage the system’s data, while others only spread without causing direct damage to their hosts. Computer viruses are similar to natural viruses in the way they multiply in number and in the way they need a host to survive.
…show more content…
Resident virus stay in memory and are active until the power is down or until the system reboot. Resident viruses are active irrespective whether or nor not the infected program is running and stay viable until the next reboot, even if all the infected files are deleted from disk (Fritsch et al, 2015). Conversely, it is impossible to get rid of such viruses by restoring all the files from distribution disks or the backup copies. So, the virus remains active and infects newly created files. Nonresident viruses do not infect computer memory and are active for a limited time only. Nonresident virus does not store or execute itself from the computer memory.
4) What is a Trojan horse? What are the various types of Trojan horses?
A Trojan horse is a type of malware that is often disguised as appropriate software. Trojans can be applied by cyber criminals and hackers trying to gain access to user’s systems (Fritsch et al, 2015). Users are normally tricked by some form of social engineering into loading and executing Trojans on their systems. When activated, Trojans can enable cyber-criminals to spy on an individual, steal sensitive data, and gain backdoor access to the system. The activities include: deleting, blocking, modifying, copying data and, interrupting the performance of computers and their
…show more content…
They left a text message inside the virus with their name, address, and telephone number. The brothers were software vendors and wanted to know the extent of piracy in their country. In order to complete the infection, the encoded virus needed to return to its original state in order to replicate and infect (Fritsch et al, 2015). A virus is a type of malware that is capable of duplicating itself and spreading to other computers. Hence, usually spread to other computers by joining themselves to various programs and implementing code when a user launches one of those infected programs. Also, they can spread through script files, and documents. Viruses can be used to hack information, harm host computers or networks, steal money, offer advertisements, and

Related Documents

  • Improved Essays

    The Win32/Sogou is a dangerous Trojan Downloader that invades the windows based PCs without getting permission from the user. This malicious application spreads through social media websites and can destroy a computer in a way that it becomes useless permanently. This tricky Trojan application is developed by the hackers to get remote access of the data and system folders in computer. Dalhousie University dataset contains both botnet and benign traces.…

    • 404 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Threat Assessment of ‘Important Security Alert From Windows’ Pop-Ups: ‘Important Security Alert From Windows’ Pop-Ups has created havoc among computer users that does not allow them to usually work in the computer. Where this adware has found its own method to attack the targeted system and to make the infected computer almost useless. In order to trouble computer user, it performs several malicious activities to use the security gaps in the system and it leads to freeze the entire running programs of the computer. Firstly, this malware program affect the processing speed of the infected computer to stop the basic functions of the system so that the computer will respond very slowly when user give any instructions.…

    • 425 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    IS3110 Lab Answers

    • 739 Words
    • 3 Pages

    1. What are the danger to the system? There numerous dangers that can put your system at danger, for example, infections, spyware, worms, Trojans and PC programmers. Your systems are additionally helpless excessively critical who perpetrate cybercrimes. 2.…

    • 739 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Zika Virus Dbq

    • 724 Words
    • 3 Pages

    A “virus” is defined as: “an infective agent that typically consists of a nucleic acid molecule in a protein coat, is too small to be seen by a light microscope, and is able to multiply only within the living cells of a host” (Document B). Originating from Uganda, the Zika virus was first discovered in 1947 in an infected money in the Zika forest, where its name originates. The Zika virus is a typical one-stranded RNA virus with nucleotide sequences relating it to other African and Asian virus strains. It is capable of infecting other species such as monkeys, elephants, lions, zebras, and rodents. Primates, like humans and monkeys, are known to be the primary hosts and reservoirs.…

    • 724 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    The definition of a virus from the Oxford Dictionary is, an infective agent that typically consists of a nucleic acid molecule in a protein coat, is too small to be seen by light microscopy, and is able to multiply only within the living cells of a host: To me that means that they are these tiny molecules that are not cells, but able to multiply, but only inside of the cells of the person the virus has gone into. Viruses are not living things. They do have many things inside them that a living thing may have like proteins, nucleic acids, carbohydrates and Lipids. the problem is that they can't function…

    • 938 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Influenza Virus

    • 1669 Words
    • 7 Pages

    A) The infection process of a vertebrate virus consists of 6 stages. Provide the name for each stage and provide details of the events that take place at each stage using Influenza virus A as the model. The 6 stages consist of: Attachment, Penetration, Uncoating, Biosynthesis, Assembly, and Release. Attachment is when the virus attaches or “locks” itself onto an acceptable cell. This occurs because a protein receptor is recognized by the virus and the virus attaches to the cell.…

    • 1669 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    At the beginning of “Act I.”, a historical outline of the virus pre-apocalypse is given. In 1995, researchers found that they could use "viruses linked to healthy respiratory cells to destroy and replace diseased cells in patients afflicted with lung cancer.” It was highly effective. Two years later, humans found a way to manipulate this virus in a way that it could decimate any threat within the human body-- "tumors, thickening arteries, decaying bones. " The virus would "consume, digest and" transform the byproducts into useful energy for the virus.…

    • 233 Words
    • 1 Pages
    Improved Essays
  • Great Essays

    It may also do a task without you knowing about it. Malware probably looks innocent enough to you, but it is a very dangerous site by installing an authorized program. Malware may be a word document or a PowerPoint presentation. Malware may also be a version of the Trojan Horse, which may appear after a successful virus attack. Once this malware is installed on your computer, the attacker can see what you are doing.…

    • 1229 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    * Virus detection software needs to be in place at all…

    • 1016 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    P3: Explain the potential risks to an organization of committing to an e-commerce system Risks 1. Hacking In computer interacting, hacking is any technical effort to operate the normal performance of network links and connected systems. A hacker is any person engaged in hacking. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks.…

    • 1208 Words
    • 5 Pages
    Decent Essays
  • Superior Essays

    1918 Influenza Outbreak

    • 1549 Words
    • 7 Pages

    In less than a year there were 40 million people who died from this virus, which spread at an intense pace, while it seemed that nothing and no one could do something to stop the epidemic. This research paper will disclose the damage that this powerful virus caused, along the scientific discoveries that have been made about the causes of this disease, and how the world has progressed ever…

    • 1549 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Rabie Virus

    • 491 Words
    • 2 Pages

    Viruses are typically species-specific, with one type of virus affecting one species of host. Therefore, a human virus cannot infect a feline and vice versa. The reasoning behind this limitation is that viruses use docking proteins to attach to surface receptors on host cells. Moreover, the cell membrane proteins attach to docking chemicals (Daempfle, 2016).…

    • 491 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Both of these viruses have proven over time that they are not to be fooled around with, and often times have sent strong nations scrambling for survival. In Emily St. John Mandel’s science fiction novel Station Eleven, she shows us what life could be like if our population was to be swept away by disease. In this story, a highly lethal…

    • 647 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Ransomware Essay

    • 1262 Words
    • 6 Pages

    Information systems permeate the fabric of everyday life. Families use them to remain in touch, organize their lives, and store memories. Multibillion dollar businesses use them to store critical data, increase efficiency, and maximize profits. They exist on cell phones, laptops, ATMs, televisions, servers, and more. A vast amount of data is gathered, stored, and processed from millions of devices worldwide to influence commerce and advise governments.…

    • 1262 Words
    • 6 Pages
    Great Essays