Professional Documents
Culture Documents
Malware Safety
Malware Safety
Chapter One
Viruses
What is a computer virus?
Computer viruses are programs that implant themselves within computer program files and boot sectors
and generate problems. Computer viruses can be very harmful, they block use of your computer or delete data on
drives. Computer viruses were created by people for different objectives and reasons such as, taking control of a
computer to use it for their needs or tasks, to make money, to steal personal information like credit card info or
passwords to accounts or to shut down a computer network. The Love Letter virus was sent in an email from the
Philippines on May 5, 2000. The email claimed to be from a secret admirer, but as soon as one would open the
attachment a virus would spread.
Paths to infection
There are many ways viruses that can enter you system, a virus can occur with the use of disks or CD-
ROMs. It can be spread when a tainted disk is left in the drive and you restart your computer. Another way viruses
infiltrate your system is when you open files found on the Web and message attachments, such as email are infected
and are opened. Once you open these files the virus spreads. A third common way viruses are spread is when you
use a LAN. A virus can be spread this way by using a machine's network connection to look for other machines
connected to that network and use any network vulnerabilities against that machine. If triumphant the virus can
spread to all of the machines connected to that network.
Worms
What Is A Worm?
A worm is a virus that spreads by making copies of itself on computers and spreading them by sending its
duplicates to other computers through the internet. Computer worms take control of the computers they have
infected to spread themselves to other computers. Usually computer worms are used to steal personal information or
to transform the computer into a remote-controlled "bot". Once the computer becomes a remote-controlled "bot"
they are then used by organized crime to attack other computer systems, such as the government. One well known
computer worm would be the Morris Worm, which was released through email at the end of the year 1988. Even
though the worm did not severely damage any computers, it created many duplicates and sent them to many
computers.
Paths to Infection
A common way computer worms spread is through email. In a tainted email the virus is usually hidden in
an attachment or link that is connected to an infected website. There are two ways one could activate a worm, you
can either activate the worm by clicking on the email or opening the attachment or link. Another way a computer
worm infects you computer is through the internet, these worms will scan the internet for liable machines and try to
take control of them by connecting to them. File-sharing network worms spread viruses by duplicating itself into
folders being shared, usually with a local machine. The worm will disguise itself by hiding underneath a harmless
name, once that is done the worm will infect and spread viruses to your computer and those connected to the same
network.
Malware Safety
Chapter Three
Trojan Horse
What Is A Trojan Horse?
A Trojan Horse is a type of malware that pretends to be real software, once triggered the malware has the
ability to delete, modify, block, copy data, disrupt your computer network, computer performance or whatever the
attacker has programmed it to do. Trojan Horses are usually created by people who want to steal another person's
personal information. An example of the Trojan Horse would be the Zeus Trojan which was added to a bank website
hidden as extra security questions so the hacker could retain that users' personal information to hack their account.
Paths To infection
There are many different ways a Trojan Horse can infect your computer usually they do so by tricking users
into opening them and downloading the malware. A common way Trojan Horses infect your computer is when
hackers spam you with emails making the emails look innocent but are actually malware, the users are tricked into
downloading the malware and then their systems get infected. For some Trojan Horses all a person needs to do is
view an infected page and the malware will automatically install without the user knowing.
Malware Safety
Chapter Four
Adware
What Is Adware?
Adware is software that displays unwanted ads when a users is using the internet, adware collects the users
information without he or she knowing. Adware opens up pages that are malicious with or without the users'
permission.
Paths to Infection
There are two types of adware, there are the ones that are used as actual advertisements to help fund a
company or a website and then there are the malwares that are installed without consent when a user opens up an
infected website, this type of adware is usually malicious. In most situations malicious adware is typically
downloaded from the internet when a page pops up and you click on it thinking that you have closed it.
Malware Safety
Chapter Five
Spyware
What Is Spyware?
Spyware is software that does things without your permission such as advertising, collecting personal
information or changing your computer. Spyware can change your computer by adding unwanted things to your
browser, slowing it down or making it crash.
Paths to Infection
Spyware is usually installed when a user downloads a file or program off of the internet and the spyware
attaches itself to it, the spyware in a way piggybacks the users' download. Another way spyware spreads is when it
tricks you into downloading it, for example a window might pop up and say you "must" download the software in
order to complete a task. In some situations spyware is downloaded when you think you are downloading a program
that will protect your computer from malware but does the complete opposite of that, because instead of protecting
your computer from malware it is the malware itself. Changing your security settings or features may have turned
off alerts that allow you to see files and programs that are downloading, allowing spyware to be downloaded
unknowingly. When you change or adjust your security you may allow holes that allows spyware to download
undetected.
Bibliography
Notenboom, Leo. Can a Virus Spread over a Local Network? Google. N.p., 14 Apr. 2013. Web.
6 Mar. 2017.
My evaluation of this website is that it contained a good amount of substance, I did not find any
grammatical errors, there was more information than visuals and the article was written in detail. I could find
information about the author and it said when the article was published. Overall I think this website was a reliable
source.
Tenny, Jessica. Email Viruses: How to Avoid Them and How to Get Rid of Them.
TopTenReviews. N.p., 16 Mar. 2011. Web. 6 Mar. 2017.
The article "Email Viruses: How to Avoid Them and How to get Rid of Them" provides a good amount of
information and substance, goes into detail about the topics, provides examples on how viruses enter your system,
when the article was published is at the top written clearly, the author has provided contact information, there are
links and I see no grammatical errors. In my opinion I think this website is reliable and contains true information.
Benton, Brian. 10 Tips on How to Prevent Malware From Infecting Your Computerand Your
Livelihood. AutoDesk. Redshift, 22 Apr. 2014. Web. 7 Mar. 2017.
This article is reliable in my opinion because it meets the criteria of a creditable site. This site has the
author and date published at the very top of the page, has references to other articles to back up their information, a
short biography on the author is at the bottom of the page to prove the author's creditability, there are no spelling
mistakes or grammatical errors, explains why these precautionary methods are important and the amount of
information is greater than the number of visuals.
Barwise, Mike. What Is an Internet Worm? BBC. N.p., 9 Sept. 2010. Web. 7 Mar. 2017.
I think this website is holds accountable information because this site is a well known news channel, goes
into detail on the topic, author and date published can be found, there are no spelling or grammatical errors found
and there are links going more into detail on this topic.
Robinson, Erin. What Is a Computer Worm? Aol Digital Matters. N.p., 5 Oct. 2012. Web. 8
Mar. 2017.
This website meets the criteria of a reliable website because the author and date is at the top of the page and
can be easily found and there are links providing more information on certain areas. Besides those pros this website
does not go into detail about the topics mentioned and there is little detail in the article.
Landesman, Mary. What Are Adware and Spyware? Lifewire. N.p., 4 Sept. 2016. Web. 8 Mar.
2017.
In my opinion I think this website is reliable because the author and date published is at the top and can be
found, has more substance than "flash", goes into detail about the topics mentioned and the author has provided
links and references to back up her information.
Beal, Vangie. The Difference between Adware & Spyware. Microsoft. Webopedia, 12 Feb.
2017. Web. 9 Mar. 2017.
This website is reliable in my opinion this website is reliable because it has all the characteristics a good
website is supposed to have. This website has references and links that explains certain topics in depth, has the
author and a link to a biography on the author, the date of when the article was published is at the top, has lots of
information, more information than visuals and no spelling or grammatical errors.