9.VIRUSES AND OTHER DESTRUCTIVE PROGRAMS
9.VIRUSES AND OTHER DESTRUCTIVE PROGRAMS
A virus is a computer program that executes when an infected program is executed. Therefore,
only executed files can be infected.
WORMS:
TROJAN HORSES:
- Trojan Horses are destructive programs that have been disguised, or concealed
(மறைத்து) in, an innocuous (harmless) piece of software (virus or worm may be within
trojan horse) can be in games, graphics)
- Trojan horses do not reproduce themselves and spread
LOGIC BOMBS:
- Logic bombs are similar to a trojan horse, but are set to go off at a particular date and
time (can be delayed a long time)
- Logic bombs do not reproduce
- Often designed to do maximum damage
- Often used by disgruntled(dissatisfaction) employees, e.g., when their name is removed
from payroll records
- Can be used to hold software "hostage" until a money demanded is paid. Also
"insurance" for payment to computer system suppliers or consultants
TYPES OF VIRUSES
A virus may attach itself to other programs and hide in them. Or it may enter gradually into the
computer's operating system
Usually contracted from external software source virus host programs made deliberately
(intentional) attractive to victims (e.g., e-mail message, game)
Can act immediately or lie dormant (sleeping) for a period of time (e.g., michelango virus, on
michelango's birthday) or until some event (1-2-3 virus when 1.2.3 typed)
BOOT SECTOR VIRUSES ("boot sector" is the first thing loaded when a computer
starts):
- infect the "boot sector" on a computer system, overwriting it with infected code
- they then move the original boot sector information to another sector on the disk,
marking that sector as a bad spot on the disk so it will not be used in the future
- takes full command of the infected computer
- the only way a system can become infected with a boot sector virus is to boot using an
infected floppy disk
POLYMORPHIC VIRUSES
MULTI-PARTITE VIRUSES
MACRO VIRUSES
- Currently account for about 80 percent of all viruses. Fastest growing viruses in computer
history
- unlike other virus types, macro viruses aren't specific to an operating system and spread
via email attachments, floppy disks, web downloads, file transfers and cooperative
applications
- Macro viruses are, however, application specific. They infect macro utilities that
accompany such applications as Microsoft word and excel, which means a word macro
virus cannot infect excel document or vice versa
- Instead, macro viruses travel between data files in the application and can eventually
infect hundreds of files in no time.
- macro viruses are written in visual basic and are relatively easy to create
- they can infect at different points during a file's use, for example, when it is opened,
saved closed or deleted
FLOPPY DISKS
MODEMS
NETWORKS
TECHNICIANS AND THIRD PARTIES
TRAPDOORS
- avoid passwords and security procedures
- usually built in by programmers for easy access
- can be created by hackers a second entrance in case kicked off the system
ANTIVIRUS SOFTWARE