Professional Documents
Culture Documents
Notes For Lesson 2 - Empowerment
Notes For Lesson 2 - Empowerment
Notes For Lesson 2 - Empowerment
masqueraders include identity thieves, software (malware) that can replicate itself
phishers, and social engineers. and spread from one computer to another. It
Payload: The payload is the harmful or stages can be broadly categorized into four Execution phase: In this phase, the virus
unwanted effect that the virus is designed to phases: dormant phase, propagation phase, executes its code and performs its intended
achieve. This can include stealing sensitive triggering phase, and execution phase. malicious activities. This can include deleting
information, deleting files, corrupting data, files, stealing sensitive information,
Dormant phase: In this phase, the virus is
displaying unwanted messages, or turning corrupting data, displaying unwanted
dormant or inactive and does not perform
the infected computer into a botnet or messages, or turning the infected computer
any malicious activities. It may be present on
zombie that can be controlled by the into a botnet or zombie that can be
a computer or network, but it does not
attacker. controlled by the attacker.
execute its code or cause any harm.
It's worth noting that not all viruses follow this
Propagation phase: In this phase, the virus
exact sequence of stages, and some may
In summary, the infection mechanism is how spreads or propagates to other computers or
have additional or different phases
the virus spreads, the trigger is the condition networks. This is typically achieved through
depending on their specific characteristics
that activates it, and the payload is the the virus's infection mechanism, which may
and design. However, understanding the
harmful or unwanted effect it causes. involve exploiting vulnerabilities in software
general stages of a virus can be helpful in
Understanding these parts of a virus is or hardware, infecting files, or tricking users
developing effective strategies to prevent,
essential for developing effective strategies into executing the virus.
detect, and mitigate the damage caused by
to prevent and mitigate the damage caused
Triggering phase: In this phase, the virus malware infections.
by malware infections.
waits for a specific trigger or event to occur
before it activates. The trigger can be a
certain date and time, a user action, the
STAGES OF A VIRUS
presence of specific files or data, or other
A computer virus typically goes through conditions.
several stages during its lifecycle. These
EXAMPLE This action causes the virus to execute its
code and start replicating itself.
The "I Love You" virus, also known as the
Love Bug, is a computer virus that caused Execution phase: In this phase, the virus
widespread damage in 2000. It is an carries out its malicious activities, including
example of a virus that follows a specific overwriting files on the victim's computer,
sequence of stages, including: stealing passwords and other sensitive
information, and downloading and installing
Dormant phase: The virus arrives on a
additional malware.
victim's computer as an email attachment
with the subject line "I love you." When the The "I Love You" virus is notable for its
attachment is opened, the virus enters the effective social engineering tactics, which
dormant phase and does not immediately tricked victims into opening the infected
cause any harm. email attachment. It also highlights the
importance of user awareness and education
Propagation phase: The virus starts to
in preventing malware infections. Overall,
replicate itself and send copies to the victim's
understanding the stages of the "I Love You"
email contacts, spreading rapidly across
virus and other malware can help individuals
networks and causing significant damage. It
and organizations develop better strategies
also overwrites files on the victim's computer
to protect their computer systems and data
and may download and install additional
from cyber threats.
malware.