Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Devoir Ang

Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

SUMMARY

INTRODUCTION

I- WHAT IS A COMPUTER VIRUS?

II- HOW DO COMPUTER VIRUS WORK?

III- CAN ALL DEVICES GET VIRUSES?

IV- DIFFERENT TYPES OF COMPUTER VIRUSES

V- AVOIDING THE LATEST COMPUTER VIRUS THREATS?

VI- SIGNS YOUR COMPUTER IS INFECTED WITH A VIRUS

VII- EXAMPLES OF COMPUTER VIRUSES

VIII- REMOVE A COMPUTER VIRUS (FROM A PC)

CONCLUSION
INTRODUCTION

A computer is a machine with a processing unit that allows it to run recorded programs. It is a set of
electronic circuits for manipulating data in binary form, or bits. This machine makes it possible to
automatically process data, or information, according to sequences of predefined instructions also
called programs. But the latter is often confronted with many problems in the exercise of its functions
and this is due to many problems including viruses. What is a virus? How do they work? What are the
different types of viruses? The answer to these questions will be the subject of our duty.
I. WHAT IS A COMPUTER VIRUS?
A computer virus is a type of malware that attaches itself to other programs, self-
replicates, and spreads from one computer to another. When a virus infects a computer, it
makes copies of itself and attaches to other files or documents. It then modifies those files and
continues to spread.

II. HOW DO COMPUTER VIRUS WORK?

Computer virus is an umbrella term that includes many different types of viruses, delivery
mechanisms, and impacts. To understand how computer viruses work, it’s helpful to split them into two
categories: those that begin to infect and replicate as soon as they land on your computer, and those
that lie dormant, waiting for you to unwittingly execute the code.

The computer virus definition includes its 4 phases: dormant, propagation, triggering, and execution.
A computer virus can begin infecting your computer immediately, or it can wait for you to unwittingly
trigger it.

Computer viruses have four phases (inspired by biologists’ classification of a real-life virus’s life cycle).

Dormant phase: This is when the virus is hidden on your system, lying in wait.

Propagation phase: This is the viral stage, when the virus begins to self-replicate, stashing copies of itself
in files, programs, or other parts of your disk. The clones may be slightly altered in an attempt to avoid
detection, and these copies will also self-replicate, creating more clones that continue to copy and
spread.
Triggering phase: A specific action is generally required to trigger or activate the virus. This could be a
user action, like clicking an icon or opening an app. Other viruses are programmed to come to life after a
certain amount of time, such as a logic bomb designed to trigger after your computer has rebooted a
certain number of times (this is done to obfuscate the origin of the virus).

Execution phase: Now the virus’s program is executed and releases its payload, the malicious code that
harms your device.

III. CAN ALL DEVICES GET VIRUSES?


All devices, including Macs, can get viruses. iPhones and Androids can get viruses too. In fact, any
device with internet access can get malware — even smart devices like coffee makers.

But it’s worth remembering the distinction between malware and viruses: a virus is just one type of
malware. And there are many types of infections that can damage your device, steal your data, and
otherwise wreak havoc.

From ransomware to spyware to trojans, there are some nasty strains of malware to watch out for
on all your gadgets. Thankfully, many of these threats can be wiped out and prevented with trusted free
antivirus software.

IV. DIFFERENT TYPES OF COMPUTER VIRUSES


Even if we're talking strictly about viruses (as opposed to other forms of malware), there are still
many different types of computer viruses.

Here are a few different types of computer viruses that have been found spreading through the internet:

 Direct action virus

The most common type of virus and the easiest to create, direct action viruses enter your computer,
cause chaos (usually by attaching themselves to a lot of COM or EXE files), then delete themselves.
The famous Vienna virus searched for COM files to infect and/or destroy, and while it was the first
virus ever defeated by an antivirus program in 1987, the fix wasn’t available to those living under
communist regimes. In 1988, Avast co-founder Pavel Baudis also beat the virus and brought the solution
to those who couldn’t access the first fix.

 Boot sector virus

As the name suggests, boot sector viruses sneak into your boot sector (responsible for loading your
computer’s operating system upon startup) to infect your memory right away. These types of viruses
traditionally spread through hardware, such as floppy disks, USB drives, and CDs. As those devices
become obsolete, this type of virus is also on its way out.

One leftover variety that emerged in 2014 is called the Stoner virus, because it displayed on-screen
messages in support of marijuana legalization.

 Resident virus

A resident virus is another type of memory-infecting virus that sets up shop in your RAM (random
access memory), which lets the virus persist even if you remove the original infector. A notable example
was the Magistr virus, which spreads to your friends by spamming your contact list. It also deletes files
and destroys computer motherboard’s memory.

 Multipartite virus

Increasing their power by infecting both your files and your boot space, multipartite viruses are
brutal. They’re very hard to eradicate because they can hide themselves in either files or the boot space.
The Invader virus was one such example, which began overwriting your hard drive as soon as you hit
CTRL + ALT + DEL to try to get rid of it.

 Polymorphic virus

Another stubborn type of virus, polymorphic viruses hide by changing shape. As they replicate, their
clones are all slightly different, which helps avoid detection. One example is the VirLock virus, which
changes shape while also incorporating a bit of ransomware that locks up your files until you pay to
release them.

 Macro virus
Macro viruses are created to hide inside word document files, such as DOC or DOCX files. When you
download the file, you’ll be prompted to enable macros — as soon as you do, you trigger the computer
virus. Infected macros have also been used in ransomware, such as the Locky strain, which targeted
healthcare institutions, encrypting their files and demanding payment to decrypt them.

V. AVOIDING THE LATEST COMPUTER VIRUS THREATS?


As with any type of malware, prevention is the best medicine. Good digital hygiene and sensible
browsing habits can help you avoid the latest computer virus threats. Here are some other tips to keep
in mind:

Have a healthy sense of skepticism: Be wary of special offers, links, or attachments that you weren’t
expecting in emails and other messages. Use legitimate discounts and special offers whenever possible,
and download a secure browser to protect yourself against dangerous links.

Don’t use pirated software: Pirated media like music or movies you can download from file-sharing
platforms may contain malware. You never know what you might get when you download files from
unverified sources. If you need to, use a reliable VPN such as Avast SecureLine VPN that's optimized for
P2P networking.

Be careful downloading apps: While the Google Play Store and Apple’s App Store monitor their apps for
safety, malware occasionally slips through. Before downloading a new app or program, ensure the app’s
developer website is safe.

Steer clear of ads and pop-ups: Malvertising attacks plant viruses or other malicious code into ads, so be
careful when interacting with online ads. If you’re interested in a product you see, go to the company’s
official website.

Install updates: When you see notifications about updating your operating system or other programs,
take action. These updates can include security patches that plug critical vulnerabilities, so it’s important
to apply them right away. But be wary of tech support scams claiming to fix problems you don’t actually
have.

Use reliable cybersecurity software: No matter how savvy you are online, viruses can sometimes slip
through. Protect your device and your data with a robust antivirus like Avast One, whose threat-
detection capabilities catch viruses before they can infect your system.
VI. SIGNS YOUR COMPUTER IS INFECTED WITH A VIRUS
One obvious sign your computer is infected with a virus is if your friends start receiving suspicious
messages sent from your email account. A classic way viruses spread is by spamming the contact list of
an infected device — using email, text, or another messaging service — and trying to trick recipients into
downloading the malware.

There are several other symptoms of a computer virus to look out for, including:

 Excessive pop-ups

 Crashing or freezing apps

 Slow performance

 Corrupted or deleted files

 Unexplained changes to your device or account settings

A free malware removal tool will monitor your device in real time to detect, block, and remove viruses
and other malware.

VII. EXAMPLES OF COMPUTER VIRUSES

The following list of computer viruses are some examples of computer virus:

Worm

A computer worm is a type of trojan horse malware that, unlike traditional viruses, does not require the
user's intervention to spread from device to device. After breaching a system, it can spread from one
computer to another without human intervention.
ILOVEYOU

The ILOVEYOU virus is an overwrite virus. This virus disguised itself as a love letter from one of its
victims' contacts and spread via email.

It was the most damaging malware event of all time when it occurred in 2000. In just about 10 days, it
reached an estimated 45 million users and caused $10 billion in damages.

SQL Slammer

The SQL Slammer is a worm that attacks unpatched Microsoft SQL 2000 servers. It resulted in a denial of
service on some internet hosts as well as a significant slowdown in overall internet traffic. It spread
quickly, infecting the vast majority of its 75,000 victims within ten minutes.

Stuxnet

Stuxnet is a highly sophisticated computer worm that was designed to attack Iran's nuclear facilities but
has since mutated and spread to other industrial and energy-producing facilities.

CryptoLocker

The CryptoLocker ransomware encrypts files on Windows computers and then demands a ransom
payment in exchange for the decryption key. It first appeared on the Internet in 2013 and was aimed at
computers running Windows.

Tinba

Tinba is a trojan that infects end-user devices and attempts to compromise and steal funds from their
financial accounts. The Trojan was discovered in 2012 and initially infected thousands of Turkish
computers.

Welchia
The Welchia worm, also known as Nachi, is a Nematode that deletes Blaster and fixes the vulnerabilities
that allow them to exist. While it has no malicious intent, it does tend to slow down computers and
networks. On August 18th, 2003, it was first reported.

Shlayer

Shlayer is a trojan-type virus that spreads adware and potentially unwanted applications and promotes
bogus search engines.

VIII. REMOVE A COMPUTER VIRUS (FROM A PC)


It’s action time. You’ve got an infected computer, and together, we’re going to remove all viruses from it
and restore it to working order. The most reliable way to remove malware like viruses is to use a
dedicated virus removal tool. It’ll automatically scan your computer to find any traces of infection while
freeing you from having to worry about how to remove viruses yourself.

Below, we’ll show you how to remove malware from Windows 10, but you can apply the same basic
principles to older versions if needed. But first, a quick note: Running older software is a security risk, as
updates and patches frequently repair vulnerabilities found in previous versions. If you’re connecting a
computer to the internet, it should be equipped with the most current software available. Install
antivirus software for Windows 10 or Windows 11 to keep your device protected.

Onward and upward! Let’s find out how to get rid of viruses on your PC.

Enter Safe Mode on your PC


You’ll first need to restart in Safe Mode, which limits your computer to the basic operations that it needs
to function. This is helpful when removing viruses from your computer or laptop, because it should
deactivate infected files as well.

Depending on the degree of computer access you currently have, you can get to Safe Mode in a few
ways:

Option 1: Enter Safe Mode from the Settings menu


Press the Windows key + I to open the Settings menu. You can also reach the Settings menu by opening
the Start menu, then scrolling down to Settings.

Select the Update & Security category. You may need to scroll down to find it.

In the Update & Security settings, select Recovery, then click the Restart Now button under the
Advanced startup heading.
From here, your PC will restart and display the Choose an option screen. You can tell Windows 10 how
you want it to boot. Navigate through Troubleshoot > Advanced options > Startup settings > Restart.

After another restart, you’ll see a new list of options for loading your OS. Select 4 or press F4 to start in
Safe Mode.
Option 2: Enter Safe Mode from the sign-in screen

If you’re unable to log into your computer, you can restart in Safe Mode from the sign-in screen. While
there, press and hold Shift while clicking the Power icon and selecting Restart.

Your computer will then restart to the Choose an option screen. From there, you can follow the same
process as is outlined in the previous step.

Option 3: Enter Safe Mode by shutting down your computer

If your computer is unusable, force it to shut down by holding down the power button for 10 seconds.
After it shuts down, start it back up again by pressing the power button as you normally would. As soon
as it shows the first signs of life — a startup chime, a logo on the screen — hold down the power button
again for 10 seconds to shut your computer back down. Repeat this on-off process one more time.

When you turn your computer on for the third time, let it fully restart to enter WinRE (the Windows
Recovery Environment). From there, follow the same steps from the Choose an option screen to select
Safe Mode, as outlined above in Option 1.
CONCLUSION

At the end of our presentation where we were talking about defining the computer
virus, showing how it works, citing the different types of viruses etc. it appears that the
computer virus is a very harmful element to the operation of the latter and to overcome this
problem we have listed some measures to take without forgetting the importance of antivirus
(Norton kapersky ...).

You might also like