ITTB

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Definition

A computer virus is a type of malware that, when executed, replicates by inserting its code into
other programs or files on the host system. Computer viruses aim to disrupt systems, cause
major operational issues, and result in data loss and leakage.

(A Virus is a type of malware that when executed, replicates itself by inserting its code
into other programs and can cause either damage or corruption of files rendering them
useless. Computer viruses replicate themselves, spreading through your operating
system and network. At the same time, the virus is wreaking havoc on your computer as
it can damage programs, delete files, and make devastating changes to your hard drive,
all of which can result in reduced performance.)

Viruses propagate through various methods, including:

1. Email Attachments: Malicious files sent via email that activate when opened.

2. Malicious Links: Links leading to infected websites or downloads, often shared through social
media or messaging apps.

3. Mobile Apps: Malware disguised as legitimate apps downloaded from unofficial app stores.

(Computer viruses are a significant threat in our digital world, and they can spread
through various methods an understanding these methods is crucial for effective
cybersecurity.

One common way viruses propagate is through email attachment. Cybercriminals often
send emails with infected files. When a user opens these attachments, the virus is
activated, allowing it to infect the computer.

Another method is through malicious links. These links are often shared on social media
or messaging apps. Clicking on them can lead users to infected websites, which can
automatically download malware onto their devices.

Mobile apps can also be a source of infection. There are fake apps that disguise
themselves as legitimate ones, especially when downloaded from unofficial app stores.
Once installed, they can introduce malware to the device.

Understanding the various methods of virus propagation is essential for maintaining


good cybersecurity practices. By being aware of these risks, users can take steps to
protect their devices and data from potential threats.)
COMMON SIGNS OF THOSE THREE INFECTIONS OR ATTACKS

1. SLOW PERFORMANCE

EXPLANATION: When a virus enters the computer, this uses a lot of the system’s
resources, making the computer run slower than it normally would. Viruses may also
initiate programs which execute at the background and consume memory as well as CPU
usage. These processes decrease the usable capacity on the existing resources hence
make what should be routine to appear slow. This slow down is usually most noticeable
in launching files, web browsing or starting applications. Even in the best scenario it
might slow down as malware tries to connect to external servers or perform any other
activities.

2. UNEXPECTED POP-UPS

EXPLANATION: Usually, when malware is installed, it will sometimes display pop-up


advertisements or even pop-up messages with random messages. These pop-ups may
request you to click on links which redirect other infected sites or try to misguide in
downloading other unhygienic software. This usually happens when the virus is different
from a pop-up and runs on the computer even if it is not browsing the Web. Since these
ads could lead to different sites which are malicious most of the time, they may ask for
personal details. With regard to most of this pop-ups, merely pulling the cursor off the
pop-ups or even clicking the ‘X’ on the page’s top-right corner to close them without
further interaction is usually the best course of action.

3. PROGRAMS OPENING OR CLOSING AUTOMATICALLY

EXPLANATION: Some viruses seize the program such as www, view or the computer, and
open or close on their own. This behavior is a way that is an attempt to interfere with
normal working activities or to create instability in the system. Malware may alter the
functioning of a program in such a way that it is set to start automatically, or do
something else that the user does not want. It could see this with programs which start
up several instances or those that remain open in the background. This unusual behavior
can also be seen when the virus is attempting to avoid the detection of the operating
security program.

4. MISSING OR CORRUPTED FILES


EXPLANATION: Viruses may also permanently delete, move, or alter files with the aim of
inconvenying the user or denying the user to access to information. Malware sometimes
disrupts the structures of files so they become unopened or unusable files. Files may be
also changed their names, containing symbols that do not have any meanings, or added
extensions used by viruses. Sometimes, malware locks files reducing their access until
one pays for a fee to unlock them. Infection and file corruption could occur at any time,
therefore, periodic backups should help in cases when files need to be restored..

5. UNAUTHORIZED EMAILS OR MESSAGES SENT FROM THE USER'S ACCOUNT

EXPLANATION: Some of the viruses are able to access the list of contacts to pass itself
by posting the message from the infected account. They normally convey links or
attachments that contain executable files that seek to infect the computer of the receiver.
Often, people get replies from their contact list asking them questions about some weird
messages that they were sent by them. It's more worrying due to the fact that such
behavior helps in spreading of malware, also it compromises the reputation and privacy.
If the user experience unwanted messages that have been sent from their account it is
always wise to change the passwords and scan the computer for any viruses.

Real Life Attacks

1. Melissa
The Melissa virus was first spotted in March 1999, spreading to the public via internet forums
and emails offering free login credentials to adult websites. The virus was delivered through a
Microsoft Word document with an embedded macro that, when opened, would run a malicious
code. If macros were enabled, Melissa spread itself to the first 50 contacts in a user’s Outlook
address book. Infected devices experienced mass mailings and slowdowns.

("The goal of the virus wasn’t necessarily to steal massive volumes of data but to disrupt
as many computer networks as possible. In fact, Melissa propagated so quickly that it
overwhelmed and shut down the email servers of over 300 major organizations
worldwide. Forensics reports found that at least $80 million was spent recovering from
the global-scale attack")

2. Code red

Code Red was a computer worm designed to exploit major flaws in Microsoft’s Internet
Information Services web server. In July 2001, Code Red reportedly attacked over 350,000 web
servers, defacing web pages with messages like “Hacked by Chinese.”
(This widespread attack was possible because worms self-replicate and spread
themselves to other machines in the same network. The cost of recovery and damages
from this attack was estimated to be $2.75 billion.)

3. ILOVEYOU

ILOVEYOU, also known as the love letter or the LoveBug virus, was first discovered in May
2000. The malware was delivered to millions of users as an email attachment with the subject
line “ILOVEYOU.”

(Once opened, it spread to every contact in a user’s Microsoft Outlook address book and
overwrote certain files (e.g., JPEG and MP3 files) from the hard drive.
Considering how many organizations relied on Outlook for all their email needs at the
time, ILOVEYOU was fairly widespread. According to a retrospective report, the virus
affected over 45 million computers within 10 days, resulting in approximately $10 billion
in damages.)

Getting Rid of a Computer Virus


Antivirus Software:
- Most effective method for virus removal.
- Continuously updates its virus library.
- Regular scans catch and delete viruses.

(When a virus is found, it is better to remove it immediately before it can do more harm.
Antivirus software is created to detect and remove the virus. It remains online to
continuously update its virus library, ensuring it detects new threats as they arise. It
regularly scans your system to identify and remove most viruses, before you even notice
them. You can also scans on specific files or areas of your computer that you suspect
may be infected, like your hard drive.)

Preventing Computer Viruses


1. Use a Firewall
- Built into major operating systems (ex. Windows Security Center).

(Firewall is like a gateway that blocks possible threats)


(All computers that come with major operating systems installed should have a firewall
product. Microsoft Windows, for example, includes a firewall as part of its Windows
Security Center.)

2. Adjust Browser Settings


- Require permission before loading certain pages.

(require that your browser asks for permission before loading certain pages or sending
personal information.)

3. Surf Smart
- Visit only trusted websites and verify downloads. ; Avoid sites with non-secure URLs (not
starting with https://).

(If a website's URL begins with "HTTP" instead of "HTTPS" before the domain name, it
lacks proper encryption, this means that any information you enter on the website, such
as passwords, credit card numbers, or personal information, could potentially be
intercepted by a third party.)

Read terms of service before accepting changes to your system.

(Don’t accept the terms of service for new programs or games without reading them first.
Understand what software or apps will do to your operating system. Don’t automatically
accept terms or allow programs to make changes to your computer without careful
examination)

puwedeng idagdag sa explanation for no. 3


- Do not open suspicious email or social media attachments.

(One of many ways to insert viruses to our devices is through email or social media
attachments, so if an unknown or suspicious email was sent to you, do not open the link
or better yet delete the email.)

- Research the free software before downloading; check for legitimacy and user
experiences.

(May ibang free software na may nakaattach na virus so mag background check muna to
see if it's legit and safe before downloading)

4. Keep Software Updated


- Regularly accept updates for antivirus software and the operating system.
- Updates often address security flaws.

(many of the new updates specifically address security flaws, it’s essential to allow your
PC to perform updates.)

You might also like