Abbreviations_&_Terms_-_Notes
Abbreviations_&_Terms_-_Notes
Terms - Notes
Copyright © 2014-2023 TestBook Edu Solutions Pvt. Ltd.: All rights reserved
Download Testbook App
A computer virus is a kind of malicious computer program that, when executed, replicates
itself and inserts its own code. When the replication is done, this code infects the other files
and programs present on your system.
These computer viruses are present in various types, and each of them can infect a device in a
different manner.
What is a computer virus?
A computer virus is a program that can harm our devices and files and infect them for no
further use. When a virus program is executed, it replicates itself by modifying other computer
programs and instead enters its own code. This code infects a file or program, and if it spreads
massively, it may ultimately result in the device crashing.
Since the computer virus only hits the programming of the device, it is not visible. But there
are certain indications that can help you determine if a device is virus-hit. Given below are such
signs that may help you identify computer viruses:
Speed of the System In case a virus is completely executed on your device, the time taken
to open applications may become longer, and the entire system processing may start
working slowly.
Pop-up Windows One may start getting too many pop up windows on their screen, which
may be virus affected and harm the device even more.
Self Execution of Programs Files or applications may start opening in the background of
the system by themselves, and you may not even know about them.
Log out of Accounts In case of a virus attack, the probability of accounts getting hacked
increases, and password protected sites may also get hacked, and you might get logged
out of all of them.
Crashing of the Device In most cases, if the virus spreads to the maximum number of
files and programs, there are chances that the entire device may crash and stop working.
Boot Sector Virus: this is a type of virus that infects the boot sector of floppy disks or the
Master Boot Record (MBR) of hard disks. The boot sector comprises all the files that are
required to start the operating system of the computer. The virus either overwrites the
existing program or copies itself to another part of the disk.
Direct Action Virus: When a virus attaches itself directly to a .exe or .com file and enters
the device during its execution, it is called a direct action virus. If it gets installed in the
memory, it keeps itself hidden. It is also known as Non-Resident Virus.
Resident Virus – A virus that saves itself in the memory of the computer and then infects
other files and programs when its originating program is no longer working. This virus
can easily infect other files because it is hidden in memory and is hard to remove from
the system.
Multipartite Virus: A virus that can attack both, the boot sector and the executable files of
an already infected computer is called a multipartite virus. If a multipartite virus attacks
your system, you are at risk of a cyber threat.
Overwrite Virus – One of the most harmful viruses, the overwrite virus can completely
remove an existing program and replace it with malicious code by overwriting it.
Gradually, it can completely replace the host’s programming code with the harmful code.
Polymorphic Virus – Spread through spam and infected websites, polymorphic viruses
are file infectors that are complex and tough to detect. They create a modified or
morphed version of the existing program, infect the system, and retain the original code.
File Infector Virus – As the name suggests, it first infects a single file and then later
spreads itself to other executable files and programs. The main sources of this virus are
games and word processors.
Spacefiller Virus: this is a rare type of virus that fills in the empty spaces of a file with
viruses. It is known as the cavity virus. It will neither affect the size of the file nor be
detected easily.
Macro Virus – A virus written in the same macro language as used in the software
program that infects the computer if a word processor file is opened. Mainly, the source
of such viruses is via emails.
What is an Anti-Virus?
An anti-virus is software that comprises programs or sets of programs that can detect and
remove all harmful and malicious software from your device. This anti-virus software is
designed in such a manner that it can search through the files on a computer and determine
which files are heavily or mildly infected by a virus.
Below is a list of a few of the major antivirus software that are most commonly used:
Norton Antivirus
F-Secure Antivirus
Kaspersky Antivirus
AVAST Antivirus
Comodo Antivirus
McAfee Antivirus
1. Ransomware
Ransomware is software that uses encryption to disable a target’s access to its data until a
ransom is paid. The victim organization is rendered partially or totally unable to operate until it
pays, but there is no guarantee that payment will result in the necessary decryption key or that
the decryption key provided will function properly.
2 Fileless Malware
Fileless malware doesn’t install anything initially, instead, it makes changes to files that are
native to the operating system, such as PowerShell or WMI. Because the operating system
recognizes the edited files as legitimate, a fileless attack is not caught by antivirus software,
and because these attacks are stealthy, they are up to ten times more successful than
traditional malware attacks.
3. Spyware
Spyware collects information about users’ activities without their knowledge or consent. This
can include passwords, pins, payment information, and unstructured messages.
The use of spyware is not limited to the desktop browser: it can also operate in a critical app or
on a mobile phone.
4. Adware
Adware tracks a user’s surfing activity to determine which ads to serve them. Although adware
is similar to spyware, it does not install any software on a user’s computer, nor does it capture
keystrokes.
The danger in adware is the erosion of a user’s privacy. The data captured by adware is
collated with data captured, overtly or covertly, about the user’s activity elsewhere on the
internet and used to create a profile of that person, which includes who their friends are, what
they’ve purchased, where they’ve traveled, and more. That information can be shared or sold
to advertisers without the user’s consent.
5. Trojan
6. Worms
Worms target vulnerabilities in operating systems to install themselves on networks. They may
gain access in several ways: through backdoors built into software, through unintentional
software vulnerabilities, or through flash drives. Once in place, worms can be used by
malicious actors to launch DDoS attacks, steal sensitive data, or conduct ransomware attacks.
7. Virus
A virus is a piece of code that inserts itself into an application and executes when the app is
run. Once inside a network, a virus may be used to steal sensitive data, launch DDoS attacks,
or conduct ransomware attacks.
A virus cannot execute or reproduce unless the app it has infected is running. This dependence
on a host application makes viruses different from trojans, which require users to download
them, and worms, which do not use applications to execute. Many instances of malware fit
into multiple categories: for instance, Stuxnet is a worm, a virus, and a rootkit.
8. Rootkits
A rootkit is software that gives malicious actors remote control of a victim’s computer with full
administrative privileges. Rootkits can be injected into applications, kernels, hypervisors, or
firmware. They spread through phishing, malicious attachments, malicious downloads, and
compromised shared drives. Rootkits can also be used to conceal other malware, such as
keyloggers.
9. Keyloggers
A keylogger is a type of spyware that monitors user activity. Keyloggers have legitimate uses;
businesses can use them to monitor employee activity, and families may use them to keep
track of children’s online behaviors.
However, when installed for malicious purposes, keyloggers can be used to steal password
data, banking information, and other sensitive information. Keyloggers can be inserted into a
system through phishing, social or malicious downloads.
10. Bots/Botnets
A bot is a software application that performs automated tasks on command. They’re used for
legitimate purposes, such as indexing search engines, but when used for malicious purposes,
they take the form of self-propagating malware that can connect back to a central server.
Cloud Computing
The term cloud refers to a network or the internet. It is a technology that uses remote servers
on the internet to store, manage, and access data online rather than local drives. The data can
be anything, such as files, images, documents, audio, video, and more.
Analysis of data