2. virus
Virus are malicious programs that can cause damage to
computer
A computer virus attaches itself to a program or file
enabling it to spread
From one computer to anther leaving infection as it
travels almost
All viruses are attached to an executable file which
means the virus may
Exist on computer but it actually infect our systems
unless we run or open the malicious program
3. A virus cannot be spread without a human action
(such as running an infected
File or program) to keep it going
A virus is spread by sharing files or sending email
with virus as attachments
In the email
4. How they work
Basic structure
{
look for one or more infect able objects
if(none found )
exist
else
}
doesn’t remain in in memory .but executes all of the viral
Code once then returns controls to the infected program
5. Ways infect computer system through virus
Boot sector penetration
Macros penetration
Parasites
6. Worms
A worm is similar to view by design and is considered to
be a sub- class
Of a virus
Worms spread from one computer to anther it has the
capability to travel without any human action it is an
independent program that does not modify
Other program but reproduces itself over and aver again
until it slows down Or shuts down a computer system or
network
7. It uses computer network to spread itself it consume too much
system memory
Infects the environment rather then specific object
Worms send a copy of itself to everyone listed on you are
email address book
8. Difference between viruses and worms
A virus an worms are similar In that they are both forms of malicious
software the virus code is injected into the previously benign program
and is spread
When the program is run
Example of virus carrier program are games email attachments and
animations
A worms is a malicious software which replicates itself a worm spreads
from system to system automatically but virus needs anther program in
order to spread
9. Characteristics of a worms
Enhanced targeting
Enhanced speed
Enhanced capabilities
Enhanced Destructive power
10. Phases of a worm or virus operation
Dormant phase
Propagation phase
Triggering phase
Exaction phase
12. Protecting your computer system
To ensure that your OS is up-to-date
To have antivirus software and files as they are download from the internet
Need to run full disk scans periodically
Use a firewall