You are on page 1of 55

Diff between V, W, T H

What is Virus
 On contaminated media (DVD, USB drive, or other)
 Through email and social networking sites
 As part of another program
Armored Virus

Armored Virus An armored virus is designed to make itself
difficult ,to detect or analyze. Armored viruses cover themselves
with ,protective code that stops debuggers or disassemblers
from, examining critical elements of the virus
 code hides in other areas in the program
Companion Virus
A companion virus attaches itself to legitimate programs and then
creates a program with a different filename extension. This file
may reside in your system’s temporary directory. When a user
types the name of the legitimate program, the companion virus
executes instead of the real program
Macro Virus
A macro virus exploits the enhancements made to many
application programs that are used by programmers to expand
the capability of applications such as Microsoft Word and Excel.
Word
For example, a macro can tell your word processor to spell-check
your document automatically when it opens. Macro viruses can
infect all of the documents on your system and spread to other
systems via email or other methods.
Multipartite Virus
A multipartite virus attacks your system in multiple ways. It may
attempt to infect your boot sector, infect all of your executable
files, and destroy your application files. The hope here is that
you won’t be able to correct all of the problems and this will
allow the infestation to continue.
Phage Virus
A phage virus modifies and alters other programs and databases.
The virus infects all of these files. The only way to remove this
virus is to reinstall the programs that are infected. If you miss
even a single incident of this virus on the victim system, the
process will start again and infect the system once more.
Polymorphic Virus Polymorphic viruses and polymorphic malware
of any type—though viruses are the only ones truly prevalent—
change form in order to avoid detection. These types of viruses
attack your system, display a message on your computer, and
delete files on your system. The virus will attempt to hide from
your antivirus software. Frequently, the virus will encrypt parts of
itself to avoid detection. When the virus does this, it’s referred to
as mutation. The mutation process makes it hard for antivirus
software to detect common characteristics of the virus. It is
common for a virus to change a signature to try to fool antivirus
software.
Retrovirus A retrovirus attacks or bypasses the antivirus software
installed on a computer. You can consider a retrovirus to be an
anti-antivirus. Retroviruses can directly attack your antivirus
software and potentially
destroy your virus definition database file. Destroying this
information without your knowledge would leave you with a false
sense of security. The virus may also directly attack an antivirus
program to create bypasses for itself.
Stealth Virus A stealth virus attempts to avoid detection by
masking itself from applications. It may attach itself to the boot
sector of the hard drive. When a system utility or program runs,
the stealth virus redirects commands around itself in order to
avoid detection. An infected file may report a file size different
from what is actually present in order to avoid detection. Stealth
viruses may also move themselves from fileA to fileB during a
virus scan for the same reason.
Diff between V, W, T H
APT attack
Dos Denial of Service
DoS Vs DDoS

Remember that the difference between a DoS attack and a DDoS


attack is that the latter uses multiple computers—all focused on one
target. DDoS is far more common—and effective—today than DoS

You might also like