Unit 1 What Is The Difference Between A Virus

Good Essays
1) What is the difference between a virus and other types of malicious code?

A virus is a particular type of malicious program designed to duplicate itself and spread from system to system. Normally, viruses attach themselves to files that can be shared enabling the malicious code to access to new computers. Viruses that are more complex may take over your email client, mailing copies of themselves to the contacts for a faster, more effective transmission (Fritsch et al, 2015). Numerous virus contain a load designed to damage the system’s data, while others only spread without causing direct damage to their hosts. Computer viruses are similar to natural viruses in the way they multiply in number and in the way they need a host to survive.
…show more content…
Resident virus stay in memory and are active until the power is down or until the system reboot. Resident viruses are active irrespective whether or nor not the infected program is running and stay viable until the next reboot, even if all the infected files are deleted from disk (Fritsch et al, 2015). Conversely, it is impossible to get rid of such viruses by restoring all the files from distribution disks or the backup copies. So, the virus remains active and infects newly created files. Nonresident viruses do not infect computer memory and are active for a limited time only. Nonresident virus does not store or execute itself from the computer memory.
4) What is a Trojan horse? What are the various types of Trojan horses?
A Trojan horse is a type of malware that is often disguised as appropriate software. Trojans can be applied by cyber criminals and hackers trying to gain access to user’s systems (Fritsch et al, 2015). Users are normally tricked by some form of social engineering into loading and executing Trojans on their systems. When activated, Trojans can enable cyber-criminals to spy on an individual, steal sensitive data, and gain backdoor access to the system. The activities include: deleting, blocking, modifying, copying data and, interrupting the performance of computers and their
…show more content…
They left a text message inside the virus with their name, address, and telephone number. The brothers were software vendors and wanted to know the extent of piracy in their country. In order to complete the infection, the encoded virus needed to return to its original state in order to replicate and infect (Fritsch et al, 2015). A virus is a type of malware that is capable of duplicating itself and spreading to other computers. Hence, usually spread to other computers by joining themselves to various programs and implementing code when a user launches one of those infected programs. Also, they can spread through script files, and documents. Viruses can be used to hack information, harm host computers or networks, steal money, offer advertisements, and

Related Documents

  • Decent Essays

    Adware and spyware are programs that are included in email attachments, downloaded as part of another program or website. The capabilities of adware include adjustments to a computer browser, changing startup pages on the browser, replacing search functions, and generating pop-ups or frames that are difficult to delete or shut down. Spyware are programs that are used by publishers or programmers for marketing purposes which are unknown by the user. Spyware can provide information such as user’s computer hardware, software, browsing habits, and other information. Denial-of-Service and Blended Attacks are two damaging strategies used by individuals that employ malicious codes.…

    • 1682 Words
    • 7 Pages
    Decent Essays
  • Decent Essays

    Computer Viruses Research

    • 2066 Words
    • 9 Pages

    Viruses secretly attach themselves to a document or another program and they execute when that document or program is opened. Viruses require user action to execute. This means that the user must do something to trigger the virus. However, once it is triggered it replicates itself by spreading to other computers. As mentioned on Wikipedia, most of viruses target systems that run Microsoft Windows.…

    • 2066 Words
    • 9 Pages
    Decent Essays
  • Decent Essays

    Malware is defined as malicious software that is installed and designed with the purpose of infecting the user’s computer system. Malware can either affect the user individually or it can effect and damage the entire organization. The victim circumstances depend on the hacker’s intent. Although Malware is designed for malicious intent, the system itself is only the broader term. Malware is the overall software that is designed, but there are variants of Malware that are more specific and have different intents when it comes to the victim.…

    • 1143 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Malware has become a serious issues , as we know the world now depending for technology to communicate , shopping , and educations. So I will explain what type of of malware and how to prevent from it. Malware is a serious problem and customer are mostly victim. The malware basically is a software design by hacker to perform a malicious work. Publish the the advertisements in browser and gain the password account.…

    • 1452 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Hackers uses this collecteddata to find a way which will help them executing an attack on the Operating System, Installed Software, Open Ports, IP Addresses or user accounts. Hacker uses this accumulated informationfor gaining access to the system which is the third phase of ethical hacking. They do tedious amount of work to break the passwords and often utilizes tools like legion. Only gaining access to the system isn 't everything, but to maintain their access in it, they develops a different system paththrough which he can intrude the system as an anonymous. Thisanonymous hacker does its best toremove all the evidences of the system thats being hack, defy the intrusion detection alarms and thus avoid any form of legal actions against him.…

    • 1032 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Cyber Crime is a malicious activity including the illegally receiving data, system interferences that compromises network and integrity and availability and copyright infringements. In other words, Cyber Crime is an illegal activity performed with the help of a computer system. It was started with hackers trying to break into computer networks. Some did it for thrill of accessing high level security networks, but others have quest to gain sensitive, classified material. Eventually, criminals started to infect computer systems with computer viruses, which led to breakdown on personal and business.…

    • 1830 Words
    • 8 Pages
    Decent Essays
  • Decent Essays

    Most, if not all, computers can be inflicted by Malicious software (Malware) are hard to fix an infection found in the system. It can lead to hacking, leaking of valuable information and a vulnerable threat to security. It requires no intervention to propagate across computer networks like the flu shot. Moreover, there are many types of malware like Trojan horses, viruses, worms, rootkits, spyware which penetrates specific application to deteriorate the system thus stealing confidential data from computer. As a consequence, these malware propagates through computer hardware gradually and pave a new way to penetrate operating system.…

    • 1094 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Cyber Security Failure

    • 802 Words
    • 4 Pages

    A tool that many of the hackers are now armed with, is the use of social engineering techniques that are luring people to websites that are full of malware and many types of spy wear. (Howarth). An acritical for SecureWorld put it this way “You can have the very best security tools and programs in place using state-of-the-art computer systems, yet all it takes is just one click to bring it all down” (Cybersecurity). This is the reality that we live in today; that we have to be extra cause on what we click and double check who. To make clear what a security attack is, it is a “A security event that has been identified by correlation and analytics tools as malicious activity that is attempting to collect, disrupt, deny, degrade or destroy information system resources or the information itself” (Gallagher).…

    • 802 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Users infected by web site that contain malicious ads. Because the ads have code that scans user 's system for vulnerabilities. The vulnerability can be exploited to cause the system to download malware and execute it. Finally, it infects the system with a data-stealing program. (Nappa, Rafique & Caballero,…

    • 1807 Words
    • 8 Pages
    Decent Essays
  • Decent Essays

    During this phase, the social networking and phishing emails are used to intrude into an organization’s network. Deerman (2012) shares that the phishing emails are: • Highly focused with attacks embedded as part of the email • Targets individuals with elevated access within the organization • Malicious attachments are in the emails for users to click so the infectious code can install the malware The third phase is the infiltration phase. Once the network has been infiltrated, a connection between the installed malware and the compromised system will be controlled by the attacker on a Command & Control (C2) server. Deerman (2012) explains that though the C2 connections may only last a short while and only connect to a single system, it can still achieve gaining privileged access to the system, updating and installing utilities to collect necessary information, spreading the infection in the network, and more. From the defensive perspective, there are also three phases to ensure security.…

    • 1603 Words
    • 7 Pages
    Decent Essays