Midterm Lesson3

Download as pdf or txt
Download as pdf or txt
You are on page 1of 18

COMPUTER VIRUS

Lesson Objectives:
At the end of this lesson, you will be able to:
● Elucidate the types of network topology and explaining the
difference of each
● Define and differentiate the different computer viruses and
identify how this viruses can harm the device
Computer Virus
is like a human virus that attacks devices. It can harm
the device easily depending on the capacity of the virus
that invades the device.

There are viruses that can damage the device as fast


as one click. Computer virus is not an environmental
cause, it is developed and been distributed to different
devices.
History of Computer VIrus
Robert Thomas, an engineer at BBN Technologies developed the first known computer virus in the year 1971.
The first virus was christened as the “Creeper” virus, and the experimental program carried out by Thomas infected
mainframes on ARPANET.

The teletype message displayed on the screens read, “I’m the creeper: Catch me if you can.” But the original wild
computer virus, probably the first one to be tracked down in the history of computer viruses was “Elk Cloner.”

The Elk Cloner infected Apple II operating systems through floppy disks. The message displayed on
infected Apple Computers was a humorous one. The virus was developed by Richard Skrenta, a teenager in the year
1982.

Even though the computer viruses were designed as a prank, it also enlightened how a malicious program could be
installed in a computer’s memory and stop users from removing the program.

It was Fred Cohen, who coined the term “computer virus” and it was after a year in 1983. The term came into being
when he attempted to write an academic paper titled “Computer Viruses – Theory and Experiments” detailing about the
malicious programs in his work.
1. Boot Sector Virus
This type of virus infects the master boot
record and it is challenging and a complex task to
remove this virus and often requires the system to
be formatted.
Mostly it spreads through removable media.
basta may boot - Boot sector

2. Direct Action Virus


This is also called non-resident virus, it gets
installed or stays hidden in the computer memory.
It stays attached to the specific type of files that it
infect. It does not affect the user experience and
system’s performance.

non - resident kasi hindi naman naktira don


3. Resident Virus
- Unlike direct action viruses, resident viruses get installed on the computer. It is difficult to identify
the virus and it is even difficult to remove a resident virus.
resident- mahirap paalisin syempre don nakaira
4. Multipartite Virus
- This type of virus spreads through multiple ways. It infects both the boot sector and executable
files at the same time.
Multi - keyword nan tapos edi kapag mulitple syempre pwede sa both
5. Polymorphic Virus
- These type of viruses are difficult to identify with a traditional anti-virus program. This is because
the polymorphic viruses alters its signature pattern whenever it replicates
Polymorphic - may pattern tapos nag re-replicate
6. Overwrite Virus
- This type of virus deletes all the files that it infects. The only possible mechanism to remove is to
delete the infected files and the end-user has to lose all the contents in it. Identifying the overwrite
virus is difficult as it spreads through emails.

Overwrite - edi in short nabubura lahat


7. Space filler Virus
- This is also called “Cavity Viruses”. This is called so as they fill up the empty spaces between the code
and hence does not cause any damage to the file.
Sa ngipin? hindi naman pla nakaka damage
8. File Infector Virus
- Attached with program files, such as .com or .exe files. Some file infector viruses infect any program for
which execution is requested, including .sys, .ovl, .prg, and .mnu files. Consequently, when the particular
program is loaded, the virus is also loaded.
- Besides these, the other file infector viruses come as a completely included program or script sent in
email attachments.
May attachment issue , basta mga file name
9. Macro Virus
- As the name suggests, the macro viruses particularly target macro language commands in applications
like Microsoft Word. The same is implied on other programs too. In MS Word, the macros are keystrokes
that are embedded in the documents or saved sequences for commands. The macro viruses are designed to
add their malicious code to the genuine macro sequences in a Word file. However, as the years went by,
Microsoft Word witnessed disabling of macros by default in more recent versions. Thus, the
cybercriminals started to use social engineering schemes to target users. In the process, they trick the user
and enable macros to launch the virus.

Macro - Micro OoO

10. Rootkit Virus


- The rootkit virus is a malware type which secretly installs an illegal rootkit on an infected system. This
opens the door for attackers and gives them full control of the system. The attacker will be able to
fundamentally modify or disable functions and programs. Like other sophisticated viruses, the rootkit

basta malware, yung ano.. galing sa hackers/attackers


11. System or Boot-record Infectors
- Also known as Boot sector virus. The Boot-record Infectors infect executable code found in specific
system areas on a disk. As the name implies, they attach to the USB thumb drives and DOS boot sector
on diskettes or the Master Boot Record on hard disks. Boot viruses are no more common these days as the
latest devices rely less on physical storage media.

may boot nanaman, pinaganda lang yung meaning

12. Browser Hijacker


- This type of virus infects your web browser in which it will bring you to different websites. Typically, if
you key in a domain name in the internet address bar, the browser hijacker will open multiple fake
websites that may harm your computer. On the other hand, most trusted browsers have built-in features to
block them ahead.

browser edi mga web browsers


13. Web Scripting Virus
- This virus lives in certain links, ads, image placement, videos, and layout of a website. These may carry
malicious codes in which when you click, the viruses will be automatically downloaded or will direct you
to malicious websites.

like phising? think before you click

14. Directory Virus


- Directory viruses change file paths. When you run programs and software that are infected with directory
viruses, the virus program also runs in the background. Further, it may be difficult for you to locate the
original app or software once infected with directory viruses

si direct ang daming binabago


15. Encrypted Virus
- This type of virus uses encrypted malicious codes which make antivirus software hard to detect them.
They can only be detected when they decrypt themselves during replication. Although they don’t delete
files or folders, they can badly affect PC performance.

parang mga code virus TROJAN yung example

16. Network Virus


- Basically, this type of virus spreads out through Local Network Area (LAN) and through the internet.
These viruses replicate through shared resources, including drives and folders. When network viruses
enter a computer, they look for their potential prey. Dangerous network viruses include Nimda and
SQLSlammer.

Basta may internet Network Virus


17. Companion Virus
- This is a type of virus that doesn’t survive without accompanying an existing file or folder. In order to
carry out damages, the file or folder being accompanied by companion viruses should be opened or
run.
Some examples of companion viruses include Terrax.1069, Stator, and Asimov.1539.

Kaya companion need pa ng kasama, hindi independent

18. Nonresident Virus


- Nonresident viruses replicate through modules. When the module is executed, it will select one or
more files to infect.

so naulit lang? marami ang pinipili


19. Stealth Virus
- Stealth viruses trick antivirus software by appearing like they are real files or programs and by
intercepting its requests to the OS. Some antivirus software cannot detect them. Sometimes, it
temporarily removes itself from the system without deletion.

Stealth - find the impostor


20. Sparse Infector
- Sparse infectors use different techniques to minimize its detection. They are viruses that infect
“occasionally”.
For example, they may only want to infect a program every tenth execution. Because they
are occasional infectors, antivirus software has a hard time detecting them.

May schedule pala siya


21. FAT Virus
Basically, this type of virus ruins file allocation system where the information about files,
including the location, exist.
Hindi ito taba, pero masama
Signs of Virus Infection
It is vital for any computer user to be aware of these warning signs –
1. Slower system performance

2. Pop-ups bombarding the screen

3. Programs running on their own

4. Files multiplying/duplicating on their own

5. New files or programs in the computer

6. Files, folders or programs getting deleted or corrupted

7. The sound of a hard drive


How to take care of your computer?
1. Keep your software up-to-date
- Your computer will prompt you if there are software updates. It is important that you keep your software up-to-date, including
your operating system to fix bugs, glitches, and vulnerabilities of the previous version. They also strengthen the security o f your computer.
Some computers perform automatic updates.

2. Install antivirus software


- A computer virus is a primary threat to computer health. They damage not just certain programs and software in your computer,
but your system as a whole. It is important that you keep these viruses from entering your computer. Install antivirus softwa re that will
detect, block, and eliminate all types of viruses. There are dozens of competitive antivirus software available on the internet.

3. Secure a backup of your files


- Sometimes, computer problems and issues come unexpectedly. This may be due to cyberattack or power outage. It is best to be
secure your files and documents in advance. There are two ways in backing up your data. First, you can use cloud storage in which you
can upload copies of your files and documents through the internet. The second one is through external storage devices. Make sure to
have multiple backups.

4. Defragment your hard drive


- Part of computer maintenance is by defragmenting your hard drive. Usually, computers are equipped with disk defragmenters.
You just need to go to the system tools and run the disk defragmenter. In cases you do not have this, there are dozens of disk
defragmenting programs and software that can be downloadable.

5. Get rid of unused programs


- Make it a habit to declutter your PC. Get rid of old files and programs that you do not need anymore. This will lessen the bu rden
of your PC from running them in the background. The best way to do this is to install and run a disk cleanup program that deletes
temporary files and clean your registry.
6. Activate the Firewall
- Viruses can penetrate your computer systems through the internet. It is important to activate your firewall.A
firewall acts as a gate or barrier that filters data from gaining unauthorized access to the computer system. Typically,
computers have a built-in firewall. But if you want to strengthen security, install a third-party firewall that provides
maximum internet protection.
7. Safely remove devices
- Most of you are guilty of this one – not safely removing external devices. It is a must that you eject devices,
drives, and other media in a safe mode. This prevents corruption of data both in the computer and on the external drive.
8. Consider reformatting
- If your computer is really full of viruses and loads, affecting PC performance, consider reformatting. Of course,
to do this, make sure you backup your files. Reformatting will bring back your computer the way it is before. However,
we recommend that you let PC technicians do this for you.
9. Clean your computer screens
- When we tend to overuse the computer, we forget cleaning the computer externally, especially the screens. Like
any other appliances, computers need regular cleaning. We advise that you use a soft cloth or special wipes in cleaning
your computer screens and some other external parts of your computer. Get rid of dust, smudge, dirt, etc.
10. Invest in cooling pads
- Another factor that affects PC performance is overheating. When you use your computer's for a longer period of
time, consider buying cooling pads. Cooling pads are external devices that prevent computers from overheating. Apart
from cooling pads, you can use fans. But if you want it to be easy, avoid using your computers in an environment with
extreme temperatures.
11. Take care of your battery
- Laptop batteries do not last a lifetime. But you can extend its lifespan by taking good care of your battery. Avoid
overcharging your battery. If it reaches 100%, make sure to unplug it. If you are not using your laptop, it is also recommended to
remove the battery pack.

12. Use a surge protector


- Surge protectors are special appliances or devices that protect appliances, including the computer from voltage spikes.
They limit the voltage supply, by blocking or shorting, to avoid the power from exceeding a safe threshold. It is a safe practice for
your laptop or computer, especially when they are plugged into the power supply.

13. Protect your desktop


- When we say “protect”, we meant literal protection. Buy cases or bags where you can safely store your laptops especially
when traveling. Moreover, cover your desktop computer with a cloth. This can keep your computer away from dust.

14. Avoid eating near computers


- This is a must! Avoid eating near your computers, or better, do not eat while using your computer. Food crumbs or pieces
may get into your keyboard and other parts of your computer which will attract ants, termites, and other insects. If this happens, the
insects might destroy some internal parts on your computer.

15. Consult a PC expert


- Lastly, always ask a PC technician about your computer health. If you want to be 100% sure that your computer is doing
okay, bring your unit to your favorite PC technician. Let them do the rebooting or reformatting, defragmentation, troubleshooting,
and complete computer maintenance. If you are an owner of a website, make sure you consult an IT expert to make sure that your
websites are safe and secure.
M2:L2 - ENRICHMENT ACTIVITY
Name: ________________________________ Score: __________________
Year and Section: ______________________ Professor: _______________

1. Think of something that can prevent viruses from damaging your computer. (minimum of 5 sentences maximum of 10 sentences)
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
_____________________.
2. What are the best ways to take good care of your device in your own words. (minimum of 5 sentences maximum of 10 sentences)
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
______________________________.
3. What percentage do you think you are in taking good care of your device? Explain briefly. (minimum of 5 sentences maximum
of 10 sentences)
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________

You might also like