Page 400 - Computer Science Class 11 With Functions
P. 400

●  A boot sector virus is a virus that affects the boot sector of the disks. It gets activated when the drive is started
           (booted up). The Michelangelo virus is an example of a boot sector virus.




               A boot sector is a part of secondary storage that contains instructions on how to boot (start) a device.


        ●  File Infectors are viruses that attach themselves to executable files by overwriting a part of their code or appending
           their code to the files. For example, the Romeo and Juliet virus.
        ●  Macro viruses embed themselves into the documents. A macro refers to specific instructions within an application.
           The macro viruses are executable files that may be received as email attachments. When a recipient opens an
           attachment, the viruses gets activated and starts affecting the system programs (deleting, creating, or overwriting
           other files). For example, the Melissa Virus got spread through a Microsoft Word document sent as an attachment.
           When the Word file was opened, the virus got activated. Using the Microsoft Outlook program, the attachment
           would be sent to the first 50 contacts in the address book.
        15.4.2 Trojan Horse

        A Trojan horse is malware that presents itself as desirable and helpful program but actually causes harm to the system.
        A Trojan horse generally attaches itself to a safe application. For example, it may be attached to a game downloaded
        over the Internet. Fig 15.5 shows how a Trojan horse makes a backdoor entry into the system that hackers can use to
        get into the system. Hackers can keep track of everything that happens on the system and take control of it by looking
        at or damaging its data.

                                                                 BackDoor Attack














                                                    Fig 15.5: Trojan Horse

        15.4.3 Worms

        A worm is a malicious program that replicates itself. So, a networked device could have several copies of a worm
        infecting many files. Like viruses, to spread a worm for the first time, an email or an instant chat is sent with attachments
        from seemingly trustworthy senders. Once the infected email attachment is opened, the worm is downloaded onto
        the recipient’s system. Then it replicates itself and spreads to the devices of the contacts (again via mail) in the user’s
        mail account. For example, the Code Red worm can make around 3 lakh copies in a few hours.

        15.4.4 Spyware

        The spyware secretly collects information from a system.  One may unknowingly install spyware on their device when
        downloading files or software from dubious websites or by opening suspicious email attachments. Therefore, one
        must exercise caution while opening emails or downloading files from suspicious sources. Some common signs of a
        system under the spyware attack are: getting constant error messages, random icons being displayed on the desktop,
        or unwanted opening of tabs while  browsing the Internet.





         398   Touchpad Computer Science-XI
   395   396   397   398   399   400   401   402   403   404   405