Life Cycle of a Virus

Topics: Trojan horse, Computer virus, Antivirus software Pages: 3 (844 words) Published: October 9, 2010
Life Cycle of a Virus
The life cycle of a virus begins when it is created and ends when it is completely eradicated. The following outline describes each stage: Creation
Until recently, creating a virus required knowledge of a computer programming language. Today anyone with basic programming knowledge can create a virus. Typically, individuals who wish to cause widespread, random damage to computers create viruses. Replication

Viruses typically replicate for a long period of time before they activate, allowing plenty of time to spread. Activation
Viruses with damage routines will activate when certain conditions are met, for example, on a certain date or when the infected user performs a particular action. Viruses without damage routines do not activate, instead causing damage by stealing storage space. Discovery

This phase does not always follow activation, but typically does. When a virus is detected and isolated, it is sent to the ICSA in Washington, D.C., to be documented and distributed to antivirus software developers. Discovery normally takes place at least one year before the virus might have become a threat to the computing community. Assimilation

At this point, antivirus software developers modify their software so that it can detect the new virus. This can take anywhere from one day to six months, depending on the developer and the virus type. Eradication

If enough users install up-to-date virus protection software, any virus can be wiped out. So far no viruses have disappeared completely, but some have long ceased to be a major threat. Top 10 Tips to Keep Your Computer Virus-Free

1. Install reliable anti-virus software. Anti-virus software scans files regularly for unusual changes in file size, programs that match the software's database of known viruses, suspicious email attachments, and other warning signs. It's the most important step you can take towards keeping your computer clean of viruses. 2. Don't automatically open attachments. Be...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Life Cycle Essay
  • Life, Cycles Essay
  • Life Cycles, Standards and Best Practices Life Cycles, Standards and Best Practices Essay
  • System Development Life Cycle Essay
  • Web Security Life Cycle Essay
  • Virus and Anti Virus Essay
  • Essay on Lenovo's Product Life Cycle
  • Trojan Virus Essay

Become a StudyMode Member

Sign Up - It's Free