COMPUTER VIRUSES
A Negative Effect of Using ICT
V Vital
I Information
R Resource
U Under
S Siege
Definition:
- a type of malicious software, or malware,
that spreads between computers and
causes damage to data and software
- aim to disrupt systems, cause major
operational issues, and result in data
loss and leakage
★ BRAIN - the first malicious, self-
copying computer code that
was unleashed back in 1986
★ Mydoom - (2004) the most
destructive virus in history and
was the only one to spread
Overview even faster than ILOVEYOU
★ Viruses are programs that
automatically make replicates
(copies) of themselves and then
infect/attach to other files within
the computer causing huge
problems if left undetected
Types of Computer Viruses
● Resident Virus ● Web Scripting
● Multipartite Virus Virus
● Direct Action ● File Infector
● Browser Hijacker ● Network Virus
● Overwrite Virus ● Boot Sector
Virus
A resident virus
propagates themselves
by infecting applications
Resident Virus as they are opened by a
user. A non-resident virus
is capable of infecting
executable files when
programs are not
running.
A multipartite virus
Multipartite remains in
computer’s memory to
the
Virus infect the hard disk,
then spread through
and infect more drives
by altering the content
of applications.
A direct action virus
accesses a computer’s main
memory and infects all
Direct Action programs, files, and folders
located in the autoexec.bat
Virus path, before deleting itself.
This virus typically alters the
performance of a system but
is capable of destroying all
data on the computer’s hard
disk and any USB device
attached to it.
A browser hijacker
manually changes the
Browser settings of web
browsers, such as
Hijacker Virus replacing the
homepage, editing the
new tab page, and
changing the default
search engine.
Overwrite viruses
can delete data and
Overwrite replace it with their own
file content or code.
Virus Once files get infected,
they cannot be
replaced, and the virus
can affect Windows,
DOS, Linux, and Apple
systems.
A web scripting virus
Web Scripting attacks web browser
security, enabling a
Virus hacker to inject web-
pages with malicious
code, or client-side
scripting.
A file infector
File Infector overwrites files when
they are opened and
Virus can quickly spread
across systems and
networks. It largely
affects files with .exe or
.com extensions.
Network viruses are
extremely dangerous,
difficult to discover, and
Network Virus can easily replicate and
spread by using the
internet to transfer to
devices connected to
the network.
A boot sector virus
targets a computer’s
Boot Sector master boot record
(MBR) by injecting its
Virus code into a hard disk’s
partition table, then
moves into the main
memory when a
computer restarts.
WHAT PROBLEMS CAN VIRUSES CAUSE?
➢ Annoying pop-up messages on the screen
➢ Causing computer to slow down or crash (stop
responding)
➢ Deleting important files or programs
➢ Trying to access personal files (e.g. passwords, bank
details or credit card numbers, etc.)
➢ Shutting down or restarting computer unexpectedly
➢ Frequent error message
➢ Malfunctioning antivirus programs or firewalls
HOW DO VIRUSES INFECT COMPUTERS?
➔ Downloading/installing infected files from the internet
➔ Clicking on email attachments, bad link or button on
phishing attacks or scam websites
➔ Plugging a flash memory stick (USB) that contains
infected files into computer
PREVENTING SOFTWARE VIRUS INFECTIONS
1. Use up-to-date anti-virus software.
2. Use genuine copies of software by downloading
from legitimate websites.
3. Only open email attachments from people you trust.
4. Scan flash memory with anti-virus software before
you attach it to your computer.
5. Be careful on public wi-fi.
6. Follow the Core 4:
A. ) Use complex passwords unique to each account and
use a password manager to securely store all passwords.
B. ) Turn on multi-factor authentication (MFA) or 2-factor
authentication.
C. ) Turn on automatic updates for hardware, software and
apps.
D. ) Learn how to identify phishing.
WHAT TO DO TO INFECTED COMPUTERS?
1.Run a full-system scan
2.Restore to an earlier back-up
3.Delete temporary files
4.Go Safe Mode
5.Reinstall your operating system
Thank You!