Page 105 - 2617_JSSPS_C-5
P. 105

Some of the malwares are as follows:  HARMS CAUSED BY COMPUTER MALWARE
   Virus: A computer virus is a program that is able to copy itself when it is run. It gets activated   Different malwares  will affect your computer in different ways.
 each time the program or file to which it is attached is opened or executed. It is the most
 common  type  of  malware.  It  can  spread  itself  by  infecting  other  programs  or  files.  This    They can crash your hard disk.
 affects the original program, causing it to no longer work properly.   They can destroy all or some of your data.

   Worm: A worm is similar to virus but it can copy itself and spread rapidly to any device    They decrease the processing speed of the computer.
 attached. A worm does not need any program to activate it.    They can reduce or block the memory of the computer or hard disk.
   Trojan Horse: A trojan horse is a dangerous virus. It represents itself as helpful software    They stop you from restarting your computer or keep on restarting your computer.
 program. Once the user clicks on it to agree to run it, it gains access to sensitive data and then    They send e-mails from your account without your knowledge.
 modifies, blocks, or deletes the data. It cannot copy itself from one computer to another.
   Spyware: A spyware steals important information and data on the device, such as account   HOW DOES A COMPUTER GET INFECTED?
 passwords or bank details. It observes the user's activity without their knowledge.

   Adware:  An  adware  tracks  user's  browser  and  download  history  and  keeps  popping   Computer malwares spread through several ways. Some of them are:
 advertisements on the screen.     using infected CDs/Pen drives
                    opening an infected e-mail attachment

 Factbot            downloading an infected program from Internet, Pen drives,             e-mail       Computer game
                   CDs or DVDs
 In 1986, the first virus was written for Windows based PCs by two brothers, Basit and Amjad     running an infected program (which can be a game, screen
 Farooq Alvi, from Pakistan, who were only 17 and 24 years old at the time. They named it “Brain”.
                   saver, etc.)

                    through local computer networks                                          CD             Pendrive
 THE MOST DANGEROUS MALWARES KNOWN


  Wabbit Virus (1974) makes multiple copies of itself until the system slows down and crashes.   SYMPTOMS OF AN INFECTED COMPUTER
  ILOVEYOU Virus (2000) worked by sending a fake “love letter” that looked like a harmless   An infected computer system will:
 text file.         start displaying unusual messages on the screen                    Factbot
  Code Red Worm (2001) would spread itself with the message: “Hacked By Chinese!”    take time to load the programs.  Fred  Cohen  introduced  the  term

  Mydoom Worm (2004) scraped addresses from infected machines, then sent copies of itself     take more time to shut down the Windows  ‘Virus’  in  1986  that  stands  for  "Vital
 to those addresses.    increase the size of the files                          Information Resources Under Siege."
  Storm Worm (2007) attacked millions of computers with an email about approaching bad     change the file names or types automatically
 weather.

  Zeus, also known as Zbot Trojan horse (2007) was made with an intention to steal banking   HOW TO PROTECT YOUR COMPUTER
 information of United States Department of Transportation.
  Emotet (2014) is considered one of the most destructive and dangerous Trojans. It spreads
 through spam emails to steal banking information.
  Pegasus (2016) is commercial spyware. It secretly infects a smartphone (Android or iOS)     Download only legal software.    Don’t open any unknown e-mail.
 and tracks the device completely for every action.    Use the original version of Windows.    Don’t  open  any  e-mail  attachment  from
                     Scan Pen drive, CD and any other external          unknown sources.

 What if you could design an impenetrable cyber fortress to protect your computer   storage device for viruses before opening     Don’t download music, program or games
 from  hackers?  What  features  would  it  have,  and  how  would  you  use  technology   in computer.  from unknown sources on the Internet.
 to build it?






                                                                                     Safeguarding Your Computer    103
   100   101   102   103   104   105   106   107   108   109   110