Virus Case Study

1458 Words 6 Pages
1) What is the difference between a virus and other types of malicious code?

A virus is a particular type of malicious program designed to duplicate itself and spread from system to system. Normally, viruses attach themselves to files that can be shared enabling the malicious code to access to new computers. Viruses that are more complex may take over your email client, mailing copies of themselves to the contacts for a faster, more effective transmission (Fritsch et al, 2015). Numerous virus contain a load designed to damage the system’s data, while others only spread without causing direct damage to their hosts. Computer viruses are similar to natural viruses in the way they multiply in number and in the way they need a host to survive.
…show more content…
Resident virus stay in memory and are active until the power is down or until the system reboot. Resident viruses are active irrespective whether or nor not the infected program is running and stay viable until the next reboot, even if all the infected files are deleted from disk (Fritsch et al, 2015). Conversely, it is impossible to get rid of such viruses by restoring all the files from distribution disks or the backup copies. So, the virus remains active and infects newly created files. Nonresident viruses do not infect computer memory and are active for a limited time only. Nonresident virus does not store or execute itself from the computer memory.
4) What is a Trojan horse? What are the various types of Trojan horses?
A Trojan horse is a type of malware that is often disguised as appropriate software. Trojans can be applied by cyber criminals and hackers trying to gain access to user’s systems (Fritsch et al, 2015). Users are normally tricked by some form of social engineering into loading and executing Trojans on their systems. When activated, Trojans can enable cyber-criminals to spy on an individual, steal sensitive data, and gain backdoor access to the system. The activities include: deleting, blocking, modifying, copying data and, interrupting the performance of computers and their
…show more content…
They left a text message inside the virus with their name, address, and telephone number. The brothers were software vendors and wanted to know the extent of piracy in their country. In order to complete the infection, the encoded virus needed to return to its original state in order to replicate and infect (Fritsch et al, 2015). A virus is a type of malware that is capable of duplicating itself and spreading to other computers. Hence, usually spread to other computers by joining themselves to various programs and implementing code when a user launches one of those infected programs. Also, they can spread through script files, and documents. Viruses can be used to hack information, harm host computers or networks, steal money, offer advertisements, and

Related Documents