Thursday, June 23, 2011

Virus

Chapter 7 Virus

Computer virus are malicious programs that infect a computer system causing various problems with its use.

Viruses replicate and attach themselves to programs in the system.

There are more than 20,000 different computer viruses with the number growing daily.

How virus infections spread by:
  • Inserting a disk with an infected program and then starting the program.
  • Downloading an infected program from the Internet.
  • Being on a network with an infected computer.
  • Opening an infected e-mail attachment.
Type of Viruses:

File Infectors; the most common type of virus, usually attach themselves to program files and spread to other programs on the hard drive.

Boot Sector Viruses usually attach themselves to the boot sector of a hard drive. They are executed each time the computer is started and this may lead to destruction to all data.

Macro Viruses infect automatic command capabilities of productivity software. They usually attach themselves to the data files in word processing, spreadsheet, and databases programs thus will be spread when the data files ares exchanged between users.

More rogue programs:

Time bombs (also known as logic bombs). They are harmless until a certain event or circumstance activates the programs.

Worms resemble viruses. They are spread from one computer to another. They control infected computers. and attack other networked computers.

Denial of Service Attack (DoS) is when the syn is flooding. It overload an Internet server with a large number of requests.

Trojan Horses disguise themselves as useful programs but actually they contain hidden instructions. They may erase data or cause other damage.

Fraud and Theft

Like selling social security numbers and etc.

Memory shaving is taking RAM chips from computers.

Salami shaving is when a programmer alters a program to take a small amount of money out of an account.

Data Diddling is when data is altered to hide theft.

Techniques to Obtain Passwords:
  • Password guessing.
  • Shoulder surfing.
  • Packet sniffing.
  • Dumpster diving.
  • Social engineering.
  • Superuser status.

I think that's all covered for this topic... since it's a half an hour replacement class...

Tomorrow is the final session.. and the carry marks will be released..

Related Post:

  • Am I Serious?A classmate asked me a question this afternoon. "Which department are you going to next semester?"  Before this, I would definitely say it it right out. But all of a sudden,… Read More
  • IBE AssignmentAs for today, I decided to work on my Intro. to Built Environment term paper where we're required to choose any international prominent architect (still practicing) and discuss his… Read More
  • Intro. to Built Environment Final ExamOne word: AWESOME! The 6-three difficulty levels questions were pretty much easy except (of course) the third question. The points acquired from the lecture notes are obviously no… Read More
Be First to Post Comment !
Post a Comment