SlideShare una empresa de Scribd logo
1 de 3
Viruses on both stand-alone ad network systems
Stand alone Viruses:
Stand alone viruses are those viruses that are not connected to a network what so ever. It’s a
computer who is isolated from the World Wide Web and the only way for it to get infected is by
a USB drive or by a floppy disk. Stand alone viruses were the most common way of spreading
viruses before the internet became so popular, as people used to insert corrupt files on a
floppy/USB and connected to another computer with the excuse of passing homework or files.
This was also very common on Public cafes were computer used was available, people tend to
use this computer to do work but when type inserted their USB/Floppy it got infected
sometimes without the person noticing this, and this made it even worse as he could pass it to
more people as he dint know and so on.




http://lyle.smu.edu/~tchen/papers/talk-computer-Oct2003.pdf


Virus on network systems:
Viruses on the Network system are now the most common way for spreading viruses. Usually, it
propagates through shared resources, such as shared drives and folders. Once it infects a new
system, it searches for potential targets by searching the network for other vulnerable systems.
(http://library.thinkquest.org/06aug/02257/virus_types.html). Macro Viruses are types of
viruses consists on the distribution of files such as excel or word via email that are corrupt
meaning that they could have the information needed or a message but the file itself is corrupt
and there are two ways of it spreading the unwilling way which you didn’t notice that the file
was corrupt or that you have just been infected so consequently depending on the type of virus
your documents become corrupt and in the time of sending someone an email containing your
document you spread the virus as well. Another way is that you have receive an email and you
forward it without knowing that it’s a virus, on the other hand some people who are not
thinking ethically or don’t care know that what they have received a virus and instead of
deleting it and making society a favor they send the email knowing that a person who is not
protected will be compromised.




       Types of Viruses on the network:

           •   “Worm is a stand alone program that exploits security holes to compromise
               other computers and spread copies of itself through the network.”(
               http://lyle.smu.edu/~tchen/papers/talk-computer-Oct2003.pdf)

                  o   Unlike viruses worms don’t necessarily attach to other programs, and
                      they are not detectable by a file scanner, and the worst part is that they
                      spread without any human action. The most common example of a
                      Worm virus is “Love letter” which was sent via email that pretended to
                      be a love letter, the attachment appeared to be text but once opened it
                      infected Windows and the systems (figure 1).
•     Sentinels: This is a type of virus that allows the virus controller or programmer to
                control the computer already infected.

          •     Boot sector viruses: This is a type of virus that hides on the boot sectors such as
                a bootable disk or hardrive. A boot virus doesn’t affect the files inside this but
                affects the disk containing them.

          •     Multipartite Viruses are a combination of a file virus and a boot sector virus as
                they work together to infected the files and the boot sector of the hard drive
                they are saved on and later on to the system.

          •     Trojan horse Virus: This is a type of virus the which appears to be processing a
                command but instead its downloading malicious function into the system which
                allows he virus controller to save the files on his computer, to watch what you
                are doing and even be able to control the computer.



Bibliography:

   1. http://library.thinkquest.org/06aug/02257/virus_types.html

   2. http://lyle.smu.edu/~tchen/papers/talk-computer-Oct2003.pdf

   3. http://en.wikipedia.org/wiki/Trojan_horse_(computing)

Más contenido relacionado

La actualidad más candente (20)

Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computervirus
ComputervirusComputervirus
Computervirus
 
computer virus presentation
computer virus presentationcomputer virus presentation
computer virus presentation
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Presentation Slide: Computer Virus
Presentation Slide: Computer VirusPresentation Slide: Computer Virus
Presentation Slide: Computer Virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
COMPUTER VIRUS
COMPUTER VIRUSCOMPUTER VIRUS
COMPUTER VIRUS
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 
Computer virus
Computer virusComputer virus
Computer virus
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 

Similar a Revision Viruses (Gerardo E)

Revision Viruses ( Gerardo E)
Revision     Viruses ( Gerardo  E)Revision     Viruses ( Gerardo  E)
Revision Viruses ( Gerardo E)itgsabc
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To MalwaresCyber Vignan
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakrabortyJoy Chakraborty
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Reportrawaabdullah
 
TLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptxTLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptxglainAE
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Virusesadni_shadah
 
Computer Virus
Computer Virus Computer Virus
Computer Virus bebo
 
Presentation24190
Presentation24190Presentation24190
Presentation24190KRT395
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threatSadaf Walliyani
 

Similar a Revision Viruses (Gerardo E) (20)

Revision Viruses ( Gerardo E)
Revision     Viruses ( Gerardo  E)Revision     Viruses ( Gerardo  E)
Revision Viruses ( Gerardo E)
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
TLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptxTLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threat
 

Más de itgsabc

Smart Homes (Alberto & Eduardo)
Smart Homes (Alberto & Eduardo)Smart Homes (Alberto & Eduardo)
Smart Homes (Alberto & Eduardo)itgsabc
 
Smart Houses (Alberto & Eduardo)
Smart Houses (Alberto & Eduardo)Smart Houses (Alberto & Eduardo)
Smart Houses (Alberto & Eduardo)itgsabc
 
Revision Data Protection Act ( Eduardo And Salvador)
Revision    Data  Protection  Act ( Eduardo And  Salvador)Revision    Data  Protection  Act ( Eduardo And  Salvador)
Revision Data Protection Act ( Eduardo And Salvador)itgsabc
 
Revision Psychological Consequences Of Being In Constant Contact ( Jose, ...
Revision    Psychological Consequences Of Being In Constant Contact ( Jose,  ...Revision    Psychological Consequences Of Being In Constant Contact ( Jose,  ...
Revision Psychological Consequences Of Being In Constant Contact ( Jose, ...itgsabc
 
Portfolio Teleworking ( Javier)
Portfolio    Teleworking ( Javier)Portfolio    Teleworking ( Javier)
Portfolio Teleworking ( Javier)itgsabc
 
Revision Terrorist And Rebel Use Of It (David & Jorge)
Revision   Terrorist And Rebel Use Of It (David & Jorge)Revision   Terrorist And Rebel Use Of It (David & Jorge)
Revision Terrorist And Rebel Use Of It (David & Jorge)itgsabc
 
Revision Expert Systems (Claudia, Federico, Natalia)
Revision   Expert Systems (Claudia, Federico, Natalia)Revision   Expert Systems (Claudia, Federico, Natalia)
Revision Expert Systems (Claudia, Federico, Natalia)itgsabc
 
Portfolio Internet Addiction (Monica And Lorena)
Portfolio   Internet Addiction (Monica And Lorena)Portfolio   Internet Addiction (Monica And Lorena)
Portfolio Internet Addiction (Monica And Lorena)itgsabc
 
Portfolio Pro Ana Websites (Joanna And Rebecca)
Portfolio   Pro Ana Websites (Joanna And Rebecca)Portfolio   Pro Ana Websites (Joanna And Rebecca)
Portfolio Pro Ana Websites (Joanna And Rebecca)itgsabc
 
Portfolio Biometric Use In Schools (Fingerprints) (Jenny)
Portfolio   Biometric Use In Schools       (Fingerprints) (Jenny)Portfolio   Biometric Use In Schools       (Fingerprints) (Jenny)
Portfolio Biometric Use In Schools (Fingerprints) (Jenny)itgsabc
 
Revision Psychological Consequences Of Being In Constant Contact (Jose, Bobby)
Revision   Psychological Consequences Of Being In Constant Contact (Jose, Bobby)Revision   Psychological Consequences Of Being In Constant Contact (Jose, Bobby)
Revision Psychological Consequences Of Being In Constant Contact (Jose, Bobby)itgsabc
 
Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)itgsabc
 
Portfolio Should Students Use Wikipedia (David C)
Portfolio   Should Students Use Wikipedia (David C)Portfolio   Should Students Use Wikipedia (David C)
Portfolio Should Students Use Wikipedia (David C)itgsabc
 
Portfolio Teleworking (Javier)
Portfolio   Teleworking (Javier)Portfolio   Teleworking (Javier)
Portfolio Teleworking (Javier)itgsabc
 
School Of 2020 (Monica & Mauxi)
School Of 2020 (Monica & Mauxi)School Of 2020 (Monica & Mauxi)
School Of 2020 (Monica & Mauxi)itgsabc
 
School Of 2020 (Willy)
School Of 2020 (Willy)School Of 2020 (Willy)
School Of 2020 (Willy)itgsabc
 
School Of 2020 (Nicolas & Salvador)
School Of 2020 (Nicolas & Salvador)School Of 2020 (Nicolas & Salvador)
School Of 2020 (Nicolas & Salvador)itgsabc
 
School Of 2020 (Gerardo E)
School Of 2020 (Gerardo E)School Of 2020 (Gerardo E)
School Of 2020 (Gerardo E)itgsabc
 
School Of 2020 (Jose & David)
School Of 2020 (Jose & David)School Of 2020 (Jose & David)
School Of 2020 (Jose & David)itgsabc
 
School Of 2020 (Gerardo A)
School Of 2020 (Gerardo A)School Of 2020 (Gerardo A)
School Of 2020 (Gerardo A)itgsabc
 

Más de itgsabc (20)

Smart Homes (Alberto & Eduardo)
Smart Homes (Alberto & Eduardo)Smart Homes (Alberto & Eduardo)
Smart Homes (Alberto & Eduardo)
 
Smart Houses (Alberto & Eduardo)
Smart Houses (Alberto & Eduardo)Smart Houses (Alberto & Eduardo)
Smart Houses (Alberto & Eduardo)
 
Revision Data Protection Act ( Eduardo And Salvador)
Revision    Data  Protection  Act ( Eduardo And  Salvador)Revision    Data  Protection  Act ( Eduardo And  Salvador)
Revision Data Protection Act ( Eduardo And Salvador)
 
Revision Psychological Consequences Of Being In Constant Contact ( Jose, ...
Revision    Psychological Consequences Of Being In Constant Contact ( Jose,  ...Revision    Psychological Consequences Of Being In Constant Contact ( Jose,  ...
Revision Psychological Consequences Of Being In Constant Contact ( Jose, ...
 
Portfolio Teleworking ( Javier)
Portfolio    Teleworking ( Javier)Portfolio    Teleworking ( Javier)
Portfolio Teleworking ( Javier)
 
Revision Terrorist And Rebel Use Of It (David & Jorge)
Revision   Terrorist And Rebel Use Of It (David & Jorge)Revision   Terrorist And Rebel Use Of It (David & Jorge)
Revision Terrorist And Rebel Use Of It (David & Jorge)
 
Revision Expert Systems (Claudia, Federico, Natalia)
Revision   Expert Systems (Claudia, Federico, Natalia)Revision   Expert Systems (Claudia, Federico, Natalia)
Revision Expert Systems (Claudia, Federico, Natalia)
 
Portfolio Internet Addiction (Monica And Lorena)
Portfolio   Internet Addiction (Monica And Lorena)Portfolio   Internet Addiction (Monica And Lorena)
Portfolio Internet Addiction (Monica And Lorena)
 
Portfolio Pro Ana Websites (Joanna And Rebecca)
Portfolio   Pro Ana Websites (Joanna And Rebecca)Portfolio   Pro Ana Websites (Joanna And Rebecca)
Portfolio Pro Ana Websites (Joanna And Rebecca)
 
Portfolio Biometric Use In Schools (Fingerprints) (Jenny)
Portfolio   Biometric Use In Schools       (Fingerprints) (Jenny)Portfolio   Biometric Use In Schools       (Fingerprints) (Jenny)
Portfolio Biometric Use In Schools (Fingerprints) (Jenny)
 
Revision Psychological Consequences Of Being In Constant Contact (Jose, Bobby)
Revision   Psychological Consequences Of Being In Constant Contact (Jose, Bobby)Revision   Psychological Consequences Of Being In Constant Contact (Jose, Bobby)
Revision Psychological Consequences Of Being In Constant Contact (Jose, Bobby)
 
Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)
 
Portfolio Should Students Use Wikipedia (David C)
Portfolio   Should Students Use Wikipedia (David C)Portfolio   Should Students Use Wikipedia (David C)
Portfolio Should Students Use Wikipedia (David C)
 
Portfolio Teleworking (Javier)
Portfolio   Teleworking (Javier)Portfolio   Teleworking (Javier)
Portfolio Teleworking (Javier)
 
School Of 2020 (Monica & Mauxi)
School Of 2020 (Monica & Mauxi)School Of 2020 (Monica & Mauxi)
School Of 2020 (Monica & Mauxi)
 
School Of 2020 (Willy)
School Of 2020 (Willy)School Of 2020 (Willy)
School Of 2020 (Willy)
 
School Of 2020 (Nicolas & Salvador)
School Of 2020 (Nicolas & Salvador)School Of 2020 (Nicolas & Salvador)
School Of 2020 (Nicolas & Salvador)
 
School Of 2020 (Gerardo E)
School Of 2020 (Gerardo E)School Of 2020 (Gerardo E)
School Of 2020 (Gerardo E)
 
School Of 2020 (Jose & David)
School Of 2020 (Jose & David)School Of 2020 (Jose & David)
School Of 2020 (Jose & David)
 
School Of 2020 (Gerardo A)
School Of 2020 (Gerardo A)School Of 2020 (Gerardo A)
School Of 2020 (Gerardo A)
 

Último

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Último (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Revision Viruses (Gerardo E)

  • 1. Viruses on both stand-alone ad network systems Stand alone Viruses: Stand alone viruses are those viruses that are not connected to a network what so ever. It’s a computer who is isolated from the World Wide Web and the only way for it to get infected is by a USB drive or by a floppy disk. Stand alone viruses were the most common way of spreading viruses before the internet became so popular, as people used to insert corrupt files on a floppy/USB and connected to another computer with the excuse of passing homework or files. This was also very common on Public cafes were computer used was available, people tend to use this computer to do work but when type inserted their USB/Floppy it got infected sometimes without the person noticing this, and this made it even worse as he could pass it to more people as he dint know and so on. http://lyle.smu.edu/~tchen/papers/talk-computer-Oct2003.pdf Virus on network systems:
  • 2. Viruses on the Network system are now the most common way for spreading viruses. Usually, it propagates through shared resources, such as shared drives and folders. Once it infects a new system, it searches for potential targets by searching the network for other vulnerable systems. (http://library.thinkquest.org/06aug/02257/virus_types.html). Macro Viruses are types of viruses consists on the distribution of files such as excel or word via email that are corrupt meaning that they could have the information needed or a message but the file itself is corrupt and there are two ways of it spreading the unwilling way which you didn’t notice that the file was corrupt or that you have just been infected so consequently depending on the type of virus your documents become corrupt and in the time of sending someone an email containing your document you spread the virus as well. Another way is that you have receive an email and you forward it without knowing that it’s a virus, on the other hand some people who are not thinking ethically or don’t care know that what they have received a virus and instead of deleting it and making society a favor they send the email knowing that a person who is not protected will be compromised. Types of Viruses on the network: • “Worm is a stand alone program that exploits security holes to compromise other computers and spread copies of itself through the network.”( http://lyle.smu.edu/~tchen/papers/talk-computer-Oct2003.pdf) o Unlike viruses worms don’t necessarily attach to other programs, and they are not detectable by a file scanner, and the worst part is that they spread without any human action. The most common example of a Worm virus is “Love letter” which was sent via email that pretended to be a love letter, the attachment appeared to be text but once opened it infected Windows and the systems (figure 1).
  • 3. Sentinels: This is a type of virus that allows the virus controller or programmer to control the computer already infected. • Boot sector viruses: This is a type of virus that hides on the boot sectors such as a bootable disk or hardrive. A boot virus doesn’t affect the files inside this but affects the disk containing them. • Multipartite Viruses are a combination of a file virus and a boot sector virus as they work together to infected the files and the boot sector of the hard drive they are saved on and later on to the system. • Trojan horse Virus: This is a type of virus the which appears to be processing a command but instead its downloading malicious function into the system which allows he virus controller to save the files on his computer, to watch what you are doing and even be able to control the computer. Bibliography: 1. http://library.thinkquest.org/06aug/02257/virus_types.html 2. http://lyle.smu.edu/~tchen/papers/talk-computer-Oct2003.pdf 3. http://en.wikipedia.org/wiki/Trojan_horse_(computing)