You are on page 1of 9

Computer

Viruses
ABDULKARIM SAEED
What are computer
viruses?

A computer virus is a program that


spreads by infecting files and system
areas of the computer. They spread
and make multiple copies fully taking
over your computer.
How do viruses get on
your computer/network?

Viruses travel onto your


computer/network via sketchy links
through mail or calls. You can also
get hacked by plugging in your
computer/phone into a charger port.
If you ever get a call or a mail that
you don’ t recognize, always assume it
is a scam. Be wary when your outside
as well.
Data Loss

Performance Issues
What type of
damage do Privacy Breaches

viruses do on
Blackmail
your
computer? Identity theft

Damage to hardware
What Type Of Viruses
Are There?
F i l e i n fe c tor V i r u se s: V i r u se s th a t a tta c h
th e mse l v e s to fi l e s a n d e x e c u te c omma n d s.

Wor ms: V i r u se s th a t sp r e a d th r ou g h ou t
n e tw or ks e x p l oi ti n g v u l n e r a b i li ti e s i n th e c od e .

Tr oja n s: Tr oja n s d e sc r i b e th e mse l v e s a s a


l e g i ti ma te softw a r e for e x a mp l e , y ou g e t a
me ssa g e fr om M i c r osoft sa y i n g y ou n e e d to
r e se t y ou r p a ssw or d . You ty p e i n th e n e w
p a ssw or d a n d th e ol d p a ssw or d a n d n ow th e y
h a v e a c c e ss to y ou r a c c ou n ts.

T h e se a r e ju st a fe w e x a mp l e s th e r e a r e ma n y
n e w v i r u se s a p p e a r i n g e v e r y d a y.
You can simply Installing a Constantly do Be cautious with Use strong and
enable a firewall: trusted Antivirus checkups: any sender: Any unique
Activating your software: Using Always doing email, text, call, passwords:
computers a proper checkups on the be very cautious. Sometimes a
firewall can antivirus computer can Opening these hacker doesn't
monitor/control software can stop viruses things can result even need a How can you
incoming detect and because if you in identity theft virus to hack
network history. remove any catch them and many other into your protect your
virus on your before they problems. computer, he
computer/network
computer. happen you only needs a
saved yourself little bit of from viruses?
trouble. information.
Always have
unique and
interesting
passwords so
they can't guess
your password.
Personal
Experiences.
R e c e n tly, my f a th e r go t h is c r e dit c a r d in f o r ma tio n
sto le n . H e w a s gr a bbin g h is mo r n in g c o f f e e f r o m T im
H o r to n s be f o r e h e a din g to w o r k. 4 h o u r s la te r h e c h e c ks
h is ba n k a c c o u n t a n d th e r e is a ba n k sta te me n t f r o m
Ta r ge t in A r iz o n a . T h e h a c ke r spe n t o v e r 8 0 0 do lla r s. M y
f a th e r w a s sh o c ke d a n d c a lle d h is ba n k a c c o u n t to ge t
th e mo n e y ba c k imme dia te ly. T h e y ga v e h im a f u ll r e f u n d
a n d e xpla in e d to h im w h a t migh t h a v e h a ppe n e d. A s h e
w a s pa y in g w ith h is c r e dit c a r d, th e r e migh t h a v e be e n a
skimme r o n to p o f th e c r e dit c a r d sc a n n e r w h ic h to o k
do w n h is pin n u mbe r a n d c a r d in f o . T h e h a c ke r th e n so ld
h is in f o to a bu y e r.
What are some of the more
famous viruses that were
released on the world?
" I LO V E Y O U" - V ir u s th a t e me r ge d in M a y 2 0 0 0
th a t qu ic kly spr e a d w o r ldw ide in f e c tin g millio n s
o f c o mpu te r s w ith in g 5 h o u r s. T h is v ir u s w o u ld
w o r k a s a n e ma il in bo x w ith th e su bj e c t be in g
I LO V E Y O U. Use r s w o u ld th e n c lic k o n th e v ir u s
sin c e it h a s a v e r y in te r e stin g title a n d w o u ld be
h it w ith a v ir u s th a t w o u ld o v e r w r ite f ile s a n d
se n d to sh a r e d n e tw o r ks. T h is v ir u s c a se d m a n y
su f f e r in g du e to its da ma ge lo ss, sy ste m c r a sh e s,
a n d f ile c o r r u ptio n . I t w a s tr a c e d ba c k to th e
P h ilippin e s a s so me h igh -le v e l c o de r s w e r e th e ir
w o r kin g o n it. T h is v ir u s h e lpe d po pu la r iz e th e
u se o f c y be r se c u r ity o n lin e .

This Photo by Unknown author is licensed under CC BY-SA.


Bibliography

http s://ca.norton.com /b log /malware /famous- computer- v iruses

http s://www.cisa.g ov /news- ev ents /news /virus-


basics#:~:text=A%20comp uter%20v irus%20is%20a,and %20 some%20may %20d estroy%2
0files.

http s://www.p roofp oint.com /us /threat- reference /computer -


virus#:~:text=Comp uter%20Viruses%20v s.,-
Malware&text=Malware%20can%20 take%20many %20forms,to%20leg itimate%20files%20a
nd %20prog rams.

http s://www.fortinet.com /resources /cy b erg lossary /comp uter- virus

http s://www.av ast.com /c- computer- virus

You might also like