You are on page 1of 11

CONTENT OUTLINE

Computer Virus: Definition


How do they infect Computers
 Generations of Computers

University School of Business 1


DEFINITION
A computer virus is a type of malicious software (malware) that is
designed to replicate itself and spread from one computer to another. It
attaches itself to legitimate programs or files and can execute various
harmful actions without the user's knowledge or consent. Computer
viruses are often created with the intent to disrupt, damage, or steal
information from computers and networks.

University School of Business


KEY CHARACTERISTICS OF COMPUTER
VIRUSES

Replication: A virus has the ability to make copies of itself and spread to
other files, programs, or systems.
Attachment: Viruses typically attach themselves to executable files,
documents, or other types of files, making them carriers for the virus code.
Activation: Once a computer virus is executed, it can perform various
actions, such as modifying or deleting files, stealing sensitive information,
or causing system crashes.
Propagation: Viruses spread through various means, including infected
email attachments, downloads from compromised websites, shared files,
and infected external storage devices.

University School of Business


KEY CHARACTERISTICS OF COMPUTER
VIRUSES
Payload: Viruses often have a payload, which is the malicious activity they
are designed to perform. This could range from simply displaying a
message to causing severe damage to a system.
Stealth: Some viruses try to remain undetected by using techniques to hide
their presence, such as encrypting their code or disguising themselves as
legitimate files.
Activation Triggers: Some viruses are designed to activate only under
specific conditions, such as a certain date or when a specific event occurs.

University School of Business


HOW DO THEY INFECT
COMPUTERS
Computer viruses can infect computers through various methods and vectors. These
methods exploit vulnerabilities in software, human behavior, and communication
channels. Here are some common ways computer viruses can infect computers:
•Email Attachments: Viruses can be attached to email messages as infected files. When
users open these attachments, the virus can execute and infect the computer.
•Infected Software Downloads: Downloading software, games, or files from untrusted
sources can lead to virus infections. The downloaded files may contain hidden viruses that
activate when executed.
•Malicious Websites: Visiting compromised or malicious websites can expose your
computer to drive-by downloads. These downloads occur without your consent or
knowledge when you visit an infected webpage.

University School of Business


HOW DO THEY INFECT
COMPUTERS
• Infected External Storage: USB drives, external hard drives, and other removable storage
devices can carry viruses. When you connect an infected device to your computer, the virus can
spread.
• Software Vulnerabilities: Viruses can exploit vulnerabilities in software applications, operating
systems, or web browsers. These vulnerabilities might allow viruses to execute code and infect
the system.
• Phishing: Phishing emails and websites trick users into clicking on links that lead to malicious
sites or downloading infected files.
• Social Engineering: Cybercriminals can use social engineering techniques to manipulate users
into downloading and running infected files. This can involve misleading messages or claims
that convince users to take certain actions.
• Network Vulnerabilities: Computers connected to the internet or local networks can be targeted
if they have unpatched security vulnerabilities or weak passwords.

. University School of Business


HOW DO THEY INFECT
COMPUTERS
• File Sharing: Sharing files on peer-to-peer (P2P) networks or downloading files from
such networks can expose your computer to infected files.
• Email Links: Clicking on links in phishing emails or suspicious messages can lead to
infected websites that initiate downloads or exploit vulnerabilities.
• Macro Viruses: Some viruses infect documents that contain macros (scripted sequences
of actions). When users open infected documents, the macro virus can execute and infect
the computer.
• Software Updates and Patches: In rare cases, legitimate software updates or patches can
be compromised, and installing them might introduce viruses.

University School of Business


GENERATIONS OF COMPUTERS
Computers have evolved significantly over time, with each generation marked by notable advancements in
technology, hardware, and capabilities. The development of computers can be categorized into five distinct
generations:
1. First Generation (1940s-1950s):
Technology: Vacuum tubes were the primary electronic components used for computation.
Characteristics: These early computers were large, expensive, and consumed a lot of power. They were
mainly used for scientific and military purposes.
Examples: ENIAC (Electronic Numerical Integrator and Computer), UNIVAC I (Universal Automatic
Computer), EDVAC (Electronic Discrete Variable Automatic Computer).
2. Second Generation (1950s-1960s):
•Technology: Transistors replaced vacuum tubes, making computers smaller, more reliable, and energy-
efficient.
•Characteristics: Second-generation computers were faster and more versatile. They introduced high-level
programming languages and the concept of batch processing.
•Examples: IBM 1401, UNIVAC II, CDC 1604.

University School of Business


GENERATIONS OF COMPUTERS
3. Third Generation (1960s-1970s):
Technology: Integrated circuits (ICs) combined multiple transistors on a single chip,
further reducing size and improving performance.
Characteristics: Third-generation computers were even smaller, faster, and more reliable.
Time-sharing and multiprogramming became possible, allowing multiple users to interact
with the computer simultaneously.
Examples: IBM System/360, DEC PDP-8, CDC 6600.
4. Fourth Generation (1970s-1980s):
Technology: Microprocessors brought the entire CPU onto a single chip, along with
memory, control, and arithmetic logic units.
Characteristics: Computers became more affordable, smaller, and capable of supporting
personal and business applications. Graphical user interfaces (GUIs) and networking
started to emerge.
Examples: Apple II, IBM PC, Commodore 64.
University School of Business
GENERATIONS OF COMPUTERS
5. Fifth Generation (1980s-Present):
Technology: Advances in microprocessor technology, storage, and networking have led to
smaller and more powerful computers.
Characteristics: Personal computers became widely accessible. The development of
parallel processing, artificial intelligence (AI), and nanotechnology are hallmarks of this
generation.
Examples: Modern desktops, laptops, smartphones, tablets, and various specialized
computers used in research, industries, and entertainment.

University School of Business


THANKS
University School of Business

You might also like