INFORMATION COMUNICATION TECHNOLOGY
TITLE: COMPUTER VIRUSES
← MARDHIAH BT RAMLAN (1120411)
BACHELOR OF SHARIAH & LAW
A computer virus is a potentially damaging computer program designed to affect, or infect, your computer negatively by altering the way it works without your knowledge or permission. More specifically, a computer virus is a segment of program code that implants itself in a computer file and spreads systematically from one file to another. Viruses can spread to your computer if an infected floppy disk is in the disk drive when you boot the computer, if you run an infected program, or if you open an infected data file in a program.
Viruses have become a serious problem in recent years. Currently, more than 45,000 known virus programs exist and an estimated six new virus programs are discovered each day. The increased use of networks, the Internet, and e-mail has accelerated the spread of computer viruses, by allowing individuals to share files – and any related viruses – more easily than ever
COMPUTER VIRUS DEFINITION
The Internet is constantly being flooded with information about computer virus, worm,Trojan Horse, adware and spyware. These terms have been used interchangeably, but most of the time the public do not know that they have different meanings and functions. Thus, it is critical that we understand these malicious codes or what we call computer virus, worm, Trojan Horse, adware and spyware. Malicious code can be referred as any software program that moves from one computer to another or network to network and can modify computer system without the consent of the owner or operator. There are many ways in which malicious codes spread. The common mediums are through email attachments, scripts in web pages and networks and file sharing. In this paper, we will specifically focus on virus.
Virus is defined as a program, which when executed, can add itself to other programs, without permission or right. This is done in such a way that the infected program, when executed, can add itself to other programs as well. The virus inserts itself into the chain of command and executes a legitimate program that results in the execution of the virus as well as the program. If we relate to our daily life, computer virus programming logic mimics human virus biological counterparts.
First, it invades the host victims by changing the underlying structure. Once infected, host files become viruses themselves and begin to infect other files. Later, computer viruses mutate and evolve to fight antivirus ‘antibiotic’ programs, and massive infection results in the larger system malfunctioning. Different with worm where it is defined as a program that replicates itself from system to system without the use of a host file. As for Trojan Horse it is referred as to impostors, files that claim to be something desirable but, in fact, are malicious. Viruses are in contrast to worms, which require the spreading of an infected host file. A very important distinction between Trojan Horse programs and viruses is that they do not replicate themselves. Trojan Horse contains malicious code that when triggered can cause loss, or even theft of data. In order for a Trojan Horse to spread, it is a must for the Trojan Horse program to be executed in the victim’s host. As for adware and spyware they can easily be installed on a victim’s pc by downloading free software or by browsing the Internet. Adware usually comes together with free software or demo version of softwares.
Generally, most or all features of the free softwares are enabled but users have to look at sponsored advertisements which are known as adware while using the software. It is considered as malicious code because it is installed automatically together with free softwares into the user’s machine without user...
Please join StudyMode to read the full document