1 / 7

Understanding Computer Viruses: Mechanisms, Types, and Warning Signs

A computer virus is a self-replicating program capable of infecting systems without user consent. Viruses spread by infecting files on networks and exploiting system vulnerabilities. They replicate by executing code and modifying files, often camouflaging as benign software, like Trojan horses. Viruses may lie dormant, activating based on specific actions or dates, which enhances their potential for widespread infection. Always be cautious with unknown emails and attachments to avoid infection. Stay informed and protect your system from these threats.

Télécharger la présentation

Understanding Computer Viruses: Mechanisms, Types, and Warning Signs

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Virus Code Actions Clara Pirie & Eilidh Currie

  2. Viruses • A virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the user. • Viruses can increase their chances of spreading to other computers by infecting files on a network file system.

  3. Replication • In order to replicate itself, a virus must be permitted to execute code and write to memory. • A simple virus will normally check if a file has been infected, if it hasn’t it will infect it then save the changes to the executable file. After closing the file, the finder will find new files for the replicator to infect.

  4. Camouflaging • Camouflage viruses attempt to appear as a benign program and then pounce and infect your computer. • A Trojan horse is an example of a camouflage virus. • Often email attachments are camouflage viruses, as people open them without realising the danger in them.

  5. Watching • A virus can lie and wait or WATCH for a particular action or date before it is activated. • The longer the time before activation the greater the number of computer systems that will be potentially infected. • A virus which watches for a date is known as a TIME BOMB, and a virus which watches for an action is known as a LOGIC BOMB.

  6. Delivery • The delivery of a virus is the method which it uses in order to enter a computer system and cause the infection. • Viruses are spread in seconds over computer networks and in some cases security flaws in the operating system.

  7. WARNING!!! • If you receive a message from an unknown email address – DO NOT OPEN!! DELETE IT IMMEDIATELY!!!! • This applies even more to emails with attachments. • You have been warned.

More Related