You are on page 1of 10
4-5 net Ahote WET tunatise sity RG Nomar en topes con viet Ono ‘Virus attack) Types of virus— Program virus)|Boot sector virus, Macro virus; Stealth Wirus, Other malware—Wormy ‘Trojan, Bomb, Spyware, Sweeper, Protection) against Wists suinatat Sosinen cue TeA Tossa Introduction Sometimes, you might have noticed that your computer starts showing strange and unusual behaviour. This can be because the computer might have been affected by some malicious program(s) The word ‘Malware’ is composed of two words Malicious ai programs that are intentionally created to cause harm to a These perfo system. These may damage, delete or corrupt files, interrupt computer working and gain authorised access to computer resources. There are various kinds of malware that infect which has caused harm to your computer system. nd software. It refers to the software user, computer system or network. rm undesirable actions on a computer computer system such as virus, worms, spyware, trojans, etc. What is a Computer Virus? A virus is a and replicate itself. It is a human-made program, destructive in nature which usually attaches itself to other programs and spreads across the computer system. It runs on a computer without the system, it st be considered as an ‘Electronic Terrorist. The full form of VIRUS is Vital Information Resources Under We will learn about them one-by-one in this chapter. malicious program which has the ability to execute user's knowledge. Once it is loaded in a computer arts damaging the system automatically. It can als iege. Why do people create and spread viruses? As discusses 'd, viruses are the programs developed by humans. But, sometimes it becomes a Casatiat NITE AE ENE Was alittle to agatestanat tte gysqnny Har eR UHH TE Ne fing Whig | a developer may croate a Vidas punghit Aly + to est his ppragtanmninng skills | # to merely canny out expeLtinnenls ty are boneless + te take contial of the computer ai mse CE GAL UnHTl Ut + to make money © to steal sensitive ttaranation. fo Kany the other dndtivitual on an organ! What a virus can and cannot dot ' There are various ways ta whet a vir care atfect computers, Howey 1 Ae SOME th vat chow sigiifies what a conupMlet SHEMET AMAL AIG that a virus cannot glo, the table y Aaa ale A viens cannot tnfect | Jo cuumparter hatstvate sth as monty Keyboart mouse, plinter, ety write protected discs sttell as CD-RONL Lo executable files such ay wont documents, spreadsheets, prescntations, ety disks and drives, aun cassettes, cle 3. files that are sent through emails or transterted 3. antivirus protected sotlwvate, using, secondary storage Sources of Virus ‘There are various sources from which a virus can enter into a computer system, TC does not raise an alarm or alert the user as it enters the system, ‘This makes it necessary for the user to the computer system, A few sources are listed below remain cautious and attentive while us media vis, Compact Disc +A virus infected storag (CD), Digital Versatile Disc (DVD), pen drive, ete, + Pirated software (application/system) + Hired computer games or audio or video CDS + Browsing and downloading unwanted websites through the internet © Unwanted email attachments in the spam folder Symptoms of a Virus Attack If your system is affected by a virus, you may notice one or more of the following symptoms & ‘the speed of the processor becomes comparatively slow. & You may get unusual messages on the screen, A the disk drive light may constantly flash «The opening, oF closing of programs/data files takes, more time A Ceomputer Studies —7 tion pO mE HEN TOACS Anontatge of the user , 8 of CIYDVD pen drive, SOmTEPE oF show EnEual symbalvcharacters in place af the wctuial dat Trpes of Viruses ses can be classified into four cat se OFies Boot sevtor Vitus Program virus, Macro Vitus 6 Stealth virus. = Boot Sector Virus While loading an ‘operating system, the boot sector plays an important tule itv the system jut some types of Viruses affect the Boot Sector/Master Root Record (MBR) of the hand dish during the process of booting and are Known as the Boot Sector Virus. It means that the system is running with an infected hand disk which further starts infecting the stored lata This process continues while booting and the system may not be able ty load an operating system. Thus, the system may come to a halt, For example, Danish boot, Quox, PC stone, ete Program Virus These viruses directly attack the program files of the system with exgusions Whe ENE, SYS, COM, DLL, etc. Once these program files are infeed with the virus, they stuart show!nyt unusual behaviour. Since these dot uses t atlect the boot sector, fhe system stays unattected When a relevant task related to a program file is performed, it becomes active and starts showing its destructive behaviour. For example, Sunday, Cascade, ete, Macro Virus These types of viruses attack the data files of the system. When my TUE WANES to work on any application package (such as MS NEY! & = Word, MS Excel, MS Access), he/she finds that cither the file is destroyed or it contains some absurd data. ‘Thus, the user is unable , to perform any task on those data files. ‘These viruses can easily i spread from one computer to another through the internet, Once infected, repairing ofthese files is very much difficult. For exemple, i Bloodhound, Melissa, etc. _Bloodhaum : Stealth Virus ‘This virus affect the computer system in various ways but is designed tw remain hidden fram being detected. They do so by changing their codes within the system which makes it difficult to trace the existence of the virus through scanner programs, Sometimes, the user cannot even detect the exact cause of the infected files. It also hides the increased size of the file due to the virus infection, Thus, the infected files seem to be uninfected during, the course of scanning, ene eee For example, Frodo, Brain, ete. , eae Computer Virws Gorms do not affect the functioning of a system but interrupts ser Other Malware Worm itself by using A worm is@ computer program that copies and multipl ‘ ~ . have computer networks and security flaws. These are self-sufficient: the ability of spreading themselves without the use of another program or a usea) For example, a worm email spreads itself to other computers, These then Uses the address box of the infected computer to spread further, vice sample, Swen, Soe —\ These are the programs that are destructive in nature and manipulates the user for jg intent. At first, (hese may not look suspicious but once ed by the user can disrupy and drastically decrease the available memory of the ‘systenl) For Trojan computer system. They are designed to damage and steal sensitive and confidential dy the user. Unlike worms{these do not replicate themselves and can spread only through user interactig, ‘These enter the system when a user installs it, opens an email attachment, downloads ang afl some infected file from the internet. Once activated in the background, they start deleting ang corrupting files inside the system. For example, Backdoor, Nuker, Zeus, ete. Bomb As the name suggests, (he explosion of this virus takes place in the form of a sudden disagg) inside the system. These Viruses TENN Tactve TOF a long Tinie and Wal TOR a SpeanR, or specific event for the disaster.) For example, the virus Friday the 13" waits for this specific date. On this day, the user notice that all the files have been deleted from his system ‘ruses such as Jerusalem B, Saturday the 14"", Happy Birthday 30, Spyware There are many such tuesday the 13", Spyware steals sensitive information, and other internet activities of a person and transmis it to another person or organisation,)Data such as username, password, bank details, audio and video files, browser history while accessing internet, content of enrails and messages tt are stolen and transferred. It consumes a lot of memory and makes the computer slow and inefficient. Sweeper Sweeper is a fake antivirus progam (f enters the computer system when the user unintentionally downloads it, considering it to be an antivirus cae) Once installed, it cfeates variety of fake malware files in the computer which automatically get started when the user logs into the s an control the browsing activity of the user, change system fi without the user’s knowledge. stem. It les, etc. [HOT Comput ue? ae oy @ Whee 8 sx SRUSRATS FM TE PeEHUT ANN GRE SettT (breton Wwe eat ayy ENEMY) ate peanupt eS Acta, those ate fake alerts that Atiyptays the Hat at take mnthvare Ailow Comsagacnthy Che Wer gets LeAPPaad LO HeutavE these files thane the camaputet Protection against Viruses is always adtvisad fo take preaautionary ateastites to) potect your aystent front the vine XE SAY PLORERE YUE gy stent agattst the virtises by talloweings these mewattles! FAL CO/OVD to i ca cat enteeenein il sy Tastall antivirus sotirare in your systent, a d Keep yout antivirus software updated, Al you are using any external storage media to transter data, an the dise properly with antivirus sothwate + Avoid reading unwanted emails. + ah stall any software UY YOUE xy'ston, a pend drive to teanstic data to your aystent, that the deve is thee ftom virus, systent is connected toa LAN (Local tea Networks Keep a check ont the users to avoid the mistise of the system, ys Keep a backup copy of your program/data files Antivirus Software We take vaccines as as rastire lO protect oursell front diseases, Slmnilarly, antivicns software are the utility programs (ic. cut sathywate Us problem) whic Cand prevent viruses frome attacking the system, ‘The mala: take of an antivirus software is to cheek all the programs/data tiles available tn the system, Hea vin is detected, the antivirus removes it and gets the systent ready: for the user, Labo displayn a detected, Some of the popular antivirus software ares AL Quek Heal Se Net Protector Antivirus 6. Kaspersky Antivirus AVG GDATA SK on, ° Anti-Virus ions wah Ani TstFot ant = i Antivirus Norton y a McAee us AVS hbif PH rREw & ZONEALARM (:) Sms i Antivirus Software \ Conyputer Vir feats KL to solve a particular compe 2 PANDA —secuniry ity Senpined J iques to accomplish jtg ;, -o different techniques i job, An antivirus software typically uses two di fa virus dicti 1, examining files i. Took for known viruses by ne Program ae 2. identifying suspicious behaviour from any comP! Migh infection. My 1 computer virus are. It s and A quality antivirus program gives you a Protection and shields your PC from other mai automatically scans the suspicious files, website emails, vebsites for It safely tests questionable programs and website : p ertain Viruses. It also restricts unauthorised access to ¢¢ computer components. However, (Ioading of antivirus software ae Shield against the ae : y protecte necessarily mean that the system is totally prot : ) ing devel from the virus attack. Everyday new types of viruses pe es ee me an any software might not be able to detect or eliminate them. S a pe i tant to eA antivirus software updated against the new viruses) It can ¥ using the interg ) Antivirus Tips 1. Don't assume you're not at risk : 1 Every computer, regardless ofits operating system, is susceptible t0 a virus anag.y. an antivirus cannot protect against all types of malware, the security of your a is enhanced substantially, When an antivirus software is installed, it updates the gag which reduces the risk of malfunctioning. 2. Download only from the trusted sources | Download the security software only from known and trusted sources. It is a coma scheme of cyber criminals to pretend to be selling antivirus programs that ares, malware. 3. Keep your sofiware updated | Make sure that you have the latest version of the antivirus installed in your conpes Check the status of the updates periodically to make sure that they are up-to-date) 4. Don't delay updates ] If your computer has been offline or powered off for a long time, your antivirus mz require an update. When you turn it on, reconnect it to the internet. Do not Postpone updates ] 5. Scan additional devices ] such as USB stidy Make sure that your antivirus automatically scans portable devic flash drives/SD cards when you plug them into your computer. 6. Track warnings and alerts Pay attention to the onscreen warnings and alerts generated by your antivirus soft Most of the alerts include the option of clicking the link to get more information recommendation about what to do next, Computer Studies—7 Don't disable the software Do not disable your security software even if you feel it is slowing down your computer. Disabling your antivirus will expose your computer to unnecessary risks and could result in Install one program only aserious security voilation. If problems persist, replace your antivirus with another antivirus. Do not install multiple antivirus programs on your computer at the same time. It may leave your computer with less protection instead of providing more protection. >) What Happens When a Threat is Detected? The specific action that your antivirus program takes depends on its settings. Typicall : ; antivirus software takes one or more of these actions in a specific order. 1. Repai Jsually, the first task of an antivirus is to clean the infected file and remove the threat safely. This is important when it's your personal file and you would like to retain the data. Quarantine: If repairing fails, your antivirus could noose to quarantine or isolate the infected file into a safe location. The file in quarantine cannot be accessed but you will have a copy of the file. When a method Anti 's Software (Net Protector) of removing the threat is discovered, you can retrieve your data safely. . Delete: If the infected file can't be repaired and you don't want to retain the data, you have the choice to delete the antivirus program as well as the infected files from your computer. Working with an Antivirus Software Once an antivirus software is installed in your system, you can get rid of virus attacks for a particular time period. However, you should not forget to update your antivirus software on 2 regular basis. Let us discuss and learn about irus : Poe software with the of Net Protector Antivirus After its installation, you can easily open it by clicking on its icon on the desktop or from the start menu. er © Q Net Protector antivirus window @QONO opens. It shows various options tacos — on the left pane that help us —— perform various tasks. alee 1. Dashboard: It displays Sytem Tuer various details about the software as shown above. U C=] ===) no ao Computer Virus. 1, What does the letter V signify in the word VIRUS? (a) Vigilance (b) Vibrant ital (d) Variety 2. Which of the following can be infected by a computer virus? (a) Keyboard (b) CPU {& Operating system (d) Printers 3. Which of the following has the ability to replicate itself? ‘Worm (b) Trojan (c) Macro (dy Stealth 4, Through which of the following a computer can be infected with viruses? (a) Pen drive (b) E-mail (©) Accessing internet os All of these 5. Which of the following is not an antivirus? (a) Norton (b), AVG () McAfee Je ‘Trojan Horse I], State whether the following statements are True/False: 1. A computer shows unusual behaviour due to a virus attack. 2. A computer virus is intentionally made to disturb the —< proper functioning of the computer system. seceedesseeee 3. A computer virus is destructive in nature. neue 4, Unwanted mails in the spam folder can be a source of virus. T.. 5. A system restarting own its own is a symptom of a virus attack. T 6. A system gets affected by the virus automatically. - 7. A computer virus replicates itself within the amount of available memory. 8. Antivirus software is specially designed to protect _ the entry of viruses into the system. 9, The system gives an alarm, when a virus infected storage media is connected. 10. Once an antivirus is loaded, your computer will never be = affected by viruses. f Ill. Give two examples of each: | 1. Boot Sector Virus (a) .. Vat Wash : ae Computer Virus 2. Worm (2) GAR Qenenene © Stal, 3. Trojan (a) ee ad ° Kae 4. Macro @ Sq - om : 5. Bomb (a) Detue gale B i eady X 6. Stealth @ en a Br . TV. Case-Study Based Questions: Solved 1. Visi mics program which 8 estuetvim STE agy ater prog dared cos» mE SFT rus oa a the users knowledge. Once i enters into the compte it tans damage y files automaticaly. Diferent types of viruses have different behaviga Thott some of the viruses are given below: nt (a) Ie attacks the data files of the sytem when a User Wants to wer gq package. } (b) It spreads due to security flaws without the US of another prog (c) It enters into the system when a user opens an e-mail attach, Ment, runs some infected file from the internet. oly (4) It is used to steal sensitive information of a person such as Username bank details, etc. while accessing the internet. Write the name of the specific virus for each of the behaviour Metin i (©) and (a). ‘Ans. (a) Macro (b) Worm (©) Trojan (4) Spyrae Unsolved 1. Antivirus software are the utility programs that d system from attack of viruses. The main task of an antivirus software isto de the programs/data files available in the computer. If a virus is detected, the a clears it from the system. A pirated antivirus software should not be used bea will not be able to remove all the viruses, rather it m spread the virus itself & are advised to install orginal antivirus software and keep it updating pein updated antivirus software also takes care of newly created viruses, With reference to the above case, answer the following questions: (a) Which of the following statements is not true about antivirus software? (i) It locates infected files, (ii) It searches for the viruses, (iti) Once installed, it needs not be updated (iv) It removes viruses, (b) Which of the following is not an antivirus softw (i) McAfee (ii) GDATA (c) What is meant by pirated antivirus software? (i) Copied from original software (iii) Loaded from original CD etect and prevent your rare? (ii) AVG (iv) Google Chrome (ii) Reinstalled software (iv) None of the above {d) What will happen Mf antivirus software is not updated Petiodically? (i) ft wll be erased after some time. (is) twill ypread virus itself (iit) It will not be able to trace new viruses (iv) ft will force operating system to stop functioning. Re 1. Define the following: z s 4 IL Short Answer Question 1 3 4 Worm Trojan: Bomb Program Virus What is a computer virus? Mention two ways of classifying a computer virus, Pacey maS ete . Name the ditferent sources of virus from which it may entér to a computer system. Why ss if necessary to update antivirus software installed in your computer system? in Dining DoE Ihe lowing <2 L NYS RL wit pses. 3 Virus and Antmirus Worms and Viruses IN. Long Answer Questions: awe What are the various ways to get Virus attack to a computer system? How will you detect that a computer system is infected by viruses? Suate the various ways to protect your system from viruses. Why do people spread viruses? Explain. What is meant by an antivirus? Name different types of antivirus softwares. You have loaded Norton Antivirus software in your computer system. Does it make your computer system free from virus attack for a lifetime? Justify. Whit acuons can an antivirus take, if a threat is detected in your computer system? Computer Virus al

You might also like