You are on page 1of 8

Computer Virus Types & How to Stay Safe

Student’s name:

Supervisor:

0
Table of Contents

Computer Virus......................................................................................1

The History of Computer Virus………………………………………1

Types of Computer Virus……………………………….…………. 2-3

Signs of Virus Infection………………………………….…….…… 3

Protecting Your Computer Against a Virus………………………….4

What to Do If You Get a Virus………..……………………………..5

References…………………………………………………………..6
Computer Virus
A computer virus is a malicious program that self-replicates by copying itself to another
program. In other words, the computer virus spreads by itself into other executable code or
documents. The purpose of creating a computer virus is to infect vulnerable systems, gain
admin control and steal user sensitive data. Hackers design computer viruses with malicious
intent and prey on online users by tricking them.

One of the ideal methods by which viruses spread is through emails - opening the attachment
in the email, visiting an infected website, clicking on an executable file, or viewing an
infected advertisement can cause the virus to spread to your system. Besides, infections also
spread while connecting with already infected removable storage devices, such as USB
drives.

It is quite easy and simple for the viruses to sneak into a computer by dodging the defense
systems. A successful breach can cause serious issues for the user such as infecting other
resources or system software, modifying or deleting key functions or applications and copy /
delete or encrypt data.

The History of Computer Virus


Robert Thomas, an engineer at BBN Technologies developed the first known computer virus
in the year 1971. The first virus was christened as the “Creeper” virus, and the experimental
program carried out by Thomas infected mainframes on ARPANET. The teletype message
displayed on the screens read, “I’m the creeper: Catch me if you can.”

But the original wild computer virus, probably the first one to be tracked down in the history
of computer viruses was “Elk Cloner.” The Elk Cloner infected Apple II operating systems
through floppy disks. The message displayed on infected Apple Computers was a humorous
one. The virus was developed by Richard Skrenta, a teenager in the year 1982. Even though
the computer viruses were designed as a prank, it also enlightened how a malicious program
could be installed in a computer's memory and stop users from removing the program.

It was Fred Cohen, who coined the term “computer virus” and it was after a year in 1983. The
term came into being when he attempted to write an academic paper titled “Computer Viruses
- Theory and Experiments” detailing about the malicious programs in his work.

1
Types of Computer Virus

Boot Sector Virus

The Boot Sector virus infects the master boot record, and it mostly spreads through the
removable media. It is a complex task to remove this virus and often requires the system to be
formatted.

Direct Action Virus

The Direct-Action Virus remains dormant on a computer until the file containing the virus is
executed.

Resident Virus

The Resident Virus inserts itself in a computer system's memory. It is hard to identify the
virus, and it is equally tough to remove it.

Multipartite Virus

The Multipartite Virus infects and spreads in multiple ways. This virus infects both the
program files and the system sectors.

Polymorphic Virus

A Polymorphic Virus is more capable of altering its signature pattern whenever it replicates
thus rendering it hard to be detected.

Overwrite Virus

As the name suggests, an Overwrite Virus spreads through emails and deletes all the files it
infects.

Spacefiller Virus

The spacefiller Virus is also known as Cavity Virus; it occupies the empty spaces between
the codes. It does not harm the files.

File infectors

Few file infector viruses come attached with program files, such as .com or .exe files. Some
file infector viruses infect any program for which execution is requested, including .sys, .ovl,

2
.prg, and .mnu files. Consequently, when the particular program is loaded, the virus is also
loaded.

Besides these, the other file infector viruses come as a completely included program or script
sent in email attachments.

Web Scripting Virus

This sneaky virus disguises itself in the coding of links, ads, images, videos, and site code. It
can infect systems when users download malicious files or visit malicious websites.

Network Virus

Network viruses travel through network connections and replicate themselves through shared
resources.

Signs of Virus Infection


It is vital for any computer user to be aware of these warning signs -

• Slower system performance

• Pop-ups bombarding the screen

• Programs running on their own

• Files multiplying / duplicating on their own

• New files or programs in the computer

• Files, folders or programs getting deleted or corrupted

• The sound of a hard drive

If you come across any of these above-mentioned signs then there are chances that your
computer is infected by a virus or malware. Not to delay, immediately stop all the commands
and download an antivirus software. If you are unsure what to do, get the assistance of an
authorized computer personnel.

3
Protecting Your Computer Against a Virus
While hackers are continuously creating smarter and more advanced viruses, there are several
ways to protect your device and files.

The best way to deal with a virus is to prevent it in the first place by using antivirus
protection and antispyware software. It’s important to keep these applications up to date, as
well as regularly updating your operating system and making sure that your browser’s
security settings are current. Regularly back up your files (to the cloud or safe external hard
drive) in case they become corrupted, ransomed or are deleted. Use a security tool to evaluate
your device and find out how vulnerable it might be.

When you’re surfing the internet, don’t click questionable links or pop-ups. Your browser
may warn you about suspicious websites, or you might see a red unlocked lock to the left of
the URL at the top of the webpage if it is unsecured. This doesn’t always mean a website is
dangerous, but you may want to think twice about browsing or entering your information.

Another good rule of thumb is to never open an email or attachment unless you know and
trust the sender. Oftentimes, hackers will use a friend’s name as the sender or use “Re:” in
the subject line to trick you, so double check the actual email address to see if you recognize
it. If you open the email and still aren’t sure, even if it’s from a trusted source, it’s still best to
delete.

Be very careful when downloading software. Only download programs, movies and music
from legitimate websites or services.

Many people connect using public Wi-Fi in cafes, restaurants or stores, but these unsecured
networks can leave your phone, tablet or computer susceptible to viruses. Instead, consider
using a personal hotspot to connect to the internet. If public Wi-Fi is your only option,
use a VPN to better protect your device and data.

Finally, educate yourself about the types of threats out there and teach others to do the
same. For instance, around 95 percent of teens use the internet, but 18 percent say they
haven’t been educated about “good online behavior.” By taking the time to talk with your
family about safe online habits, you can drastically lower the risk of devices being
compromised.

4
What to Do If You Get a Virus
If you think your computer has been infected, start by running a full system scan using your
antivirus software and an anti-malware program. Review the threats and take any action that
you can (the software should guide you through this). If you are unable to delete the virus or
infected files from your software, try restoring your computer to an earlier back-up before
you began having problems.

Another strategy to try is deleting all of the temporary files on your computer. The method of
clearing those files differs between systems but these processes are easy enough to research
and implement for the average user. If your computer is malfunctioning and preventing you
from accessing files to delete, you can try booting up in safe mode. Safe mode restricts
certain programs so you can work to fix the issue without interruption.

In some cases, you may need to reinstall your operating system. If you aren’t familiar with
how to do that, take your device to a local store that offers computer services and have a
professional take a look.

All in all, prevention and education are the most effective ways to stop your computer from
getting infected by a virus. Know the basics of staying safe online and share articles like
these with family, friends and colleagues.

5
References

How to Tell If Your Computer Has a Virus and What to Do About It. 5 June 2019,
staysafeonline.org/blog/how-to-tell-if-your-computer-has-a-virus-what-to-do-about-it/.

“What Is a Computer Virus?: Types of Computer Viruses [Updated 2020].” Anti, 30 June
2020, antivirus.comodo.com/blog/computer-safety/what-is-virus-and-its-definition/.

ht_admin. “9 Common Types of Computer Viruses.” High Touch Technologies, High Touch
Technologies, 3 Oct. 2019, hightouchtechnologies.com/9-common-types-of-computer-
viruses/.

You might also like