0% found this document useful (0 votes)
8 views

Abbreviations_&_Terms_-_Notes

The document provides an overview of computer viruses, their types, and symptoms of infection, as well as information on various forms of malware such as ransomware, spyware, and adware. It also explains the role of antivirus software in detecting and removing harmful programs. Additionally, the document touches on cloud computing and its applications in data management and software delivery.

Uploaded by

24llm010
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Abbreviations_&_Terms_-_Notes

The document provides an overview of computer viruses, their types, and symptoms of infection, as well as information on various forms of malware such as ransomware, spyware, and adware. It also explains the role of antivirus software in detecting and removing harmful programs. Additionally, the document touches on cloud computing and its applications in data management and software delivery.

Uploaded by

24llm010
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Abbreviations &

Terms - Notes

UGC NET Paper 1

Copyright © 2014-2023 TestBook Edu Solutions Pvt. Ltd.: All rights reserved
Download Testbook App

A computer virus is a kind of malicious computer program that, when executed, replicates
itself and inserts its own code. When the replication is done, this code infects the other files
and programs present on your system.
These computer viruses are present in various types, and each of them can infect a device in a
different manner.
What is a computer virus?
A computer virus is a program that can harm our devices and files and infect them for no
further use. When a virus program is executed, it replicates itself by modifying other computer
programs and instead enters its own code. This code infects a file or program, and if it spreads
massively, it may ultimately result in the device crashing.
Since the computer virus only hits the programming of the device, it is not visible. But there
are certain indications that can help you determine if a device is virus-hit. Given below are such
signs that may help you identify computer viruses:

Speed of the System In case a virus is completely executed on your device, the time taken
to open applications may become longer, and the entire system processing may start
working slowly.

Pop-up Windows One may start getting too many pop up windows on their screen, which
may be virus affected and harm the device even more.

Self Execution of Programs Files or applications may start opening in the background of
the system by themselves, and you may not even know about them.

Log out of Accounts In case of a virus attack, the probability of accounts getting hacked
increases, and password protected sites may also get hacked, and you might get logged
out of all of them.

Crashing of the Device In most cases, if the virus spreads to the maximum number of
files and programs, there are chances that the entire device may crash and stop working.

different types of computer viruses:

Boot Sector Virus: this is a type of virus that infects the boot sector of floppy disks or the
Master Boot Record (MBR) of hard disks. The boot sector comprises all the files that are
required to start the operating system of the computer. The virus either overwrites the
existing program or copies itself to another part of the disk.

Direct Action Virus: When a virus attaches itself directly to a .exe or .com file and enters
the device during its execution, it is called a direct action virus. If it gets installed in the
memory, it keeps itself hidden. It is also known as Non-Resident Virus.

SUBJECT | UGC NET Paper 1 1 of 7


Download Testbook App

Resident Virus – A virus that saves itself in the memory of the computer and then infects
other files and programs when its originating program is no longer working. This virus
can easily infect other files because it is hidden in memory and is hard to remove from
the system.

Multipartite Virus: A virus that can attack both, the boot sector and the executable files of
an already infected computer is called a multipartite virus. If a multipartite virus attacks
your system, you are at risk of a cyber threat.

Overwrite Virus – One of the most harmful viruses, the overwrite virus can completely
remove an existing program and replace it with malicious code by overwriting it.
Gradually, it can completely replace the host’s programming code with the harmful code.

Polymorphic Virus – Spread through spam and infected websites, polymorphic viruses
are file infectors that are complex and tough to detect. They create a modified or
morphed version of the existing program, infect the system, and retain the original code.

File Infector Virus – As the name suggests, it first infects a single file and then later
spreads itself to other executable files and programs. The main sources of this virus are
games and word processors.

Spacefiller Virus: this is a rare type of virus that fills in the empty spaces of a file with
viruses. It is known as the cavity virus. It will neither affect the size of the file nor be
detected easily.

Macro Virus – A virus written in the same macro language as used in the software
program that infects the computer if a word processor file is opened. Mainly, the source
of such viruses is via emails.

What is an Anti-Virus?

An anti-virus is software that comprises programs or sets of programs that can detect and
remove all harmful and malicious software from your device. This anti-virus software is
designed in such a manner that it can search through the files on a computer and determine
which files are heavily or mildly infected by a virus.
Below is a list of a few of the major antivirus software that are most commonly used:

Norton Antivirus

F-Secure Antivirus

Kaspersky Antivirus

SUBJECT | UGC NET Paper 1 2 of 7


Download Testbook App

AVAST Antivirus

Comodo Antivirus

McAfee Antivirus

1. Ransomware

Ransomware is software that uses encryption to disable a target’s access to its data until a
ransom is paid. The victim organization is rendered partially or totally unable to operate until it
pays, but there is no guarantee that payment will result in the necessary decryption key or that
the decryption key provided will function properly.

2 Fileless Malware

Fileless malware doesn’t install anything initially, instead, it makes changes to files that are
native to the operating system, such as PowerShell or WMI. Because the operating system
recognizes the edited files as legitimate, a fileless attack is not caught by antivirus software,
and because these attacks are stealthy, they are up to ten times more successful than
traditional malware attacks.

3. Spyware

Spyware collects information about users’ activities without their knowledge or consent. This
can include passwords, pins, payment information, and unstructured messages.

The use of spyware is not limited to the desktop browser: it can also operate in a critical app or
on a mobile phone.

4. Adware

SUBJECT | UGC NET Paper 1 3 of 7


Download Testbook App

Adware tracks a user’s surfing activity to determine which ads to serve them. Although adware
is similar to spyware, it does not install any software on a user’s computer, nor does it capture
keystrokes.

The danger in adware is the erosion of a user’s privacy. The data captured by adware is
collated with data captured, overtly or covertly, about the user’s activity elsewhere on the
internet and used to create a profile of that person, which includes who their friends are, what
they’ve purchased, where they’ve traveled, and more. That information can be shared or sold
to advertisers without the user’s consent.

5. Trojan

A Trojan disguises itself as desirable code or software. Once downloaded by unsuspecting


users, the Trojan can take control of victims’ systems for malicious purposes. Trojans may hide
in games, apps, or even software patches, or they may be embedded in attachments included
in phishing emails.

6. Worms

Worms target vulnerabilities in operating systems to install themselves on networks. They may
gain access in several ways: through backdoors built into software, through unintentional
software vulnerabilities, or through flash drives. Once in place, worms can be used by
malicious actors to launch DDoS attacks, steal sensitive data, or conduct ransomware attacks.

7. Virus

A virus is a piece of code that inserts itself into an application and executes when the app is
run. Once inside a network, a virus may be used to steal sensitive data, launch DDoS attacks,
or conduct ransomware attacks.

Viruses vs. Trojans

A virus cannot execute or reproduce unless the app it has infected is running. This dependence
on a host application makes viruses different from trojans, which require users to download
them, and worms, which do not use applications to execute. Many instances of malware fit
into multiple categories: for instance, Stuxnet is a worm, a virus, and a rootkit.

8. Rootkits

A rootkit is software that gives malicious actors remote control of a victim’s computer with full
administrative privileges. Rootkits can be injected into applications, kernels, hypervisors, or
firmware. They spread through phishing, malicious attachments, malicious downloads, and

SUBJECT | UGC NET Paper 1 4 of 7


Download Testbook App

compromised shared drives. Rootkits can also be used to conceal other malware, such as
keyloggers.

9. Keyloggers

A keylogger is a type of spyware that monitors user activity. Keyloggers have legitimate uses;
businesses can use them to monitor employee activity, and families may use them to keep
track of children’s online behaviors.

However, when installed for malicious purposes, keyloggers can be used to steal password
data, banking information, and other sensitive information. Keyloggers can be inserted into a
system through phishing, social or malicious downloads.

10. Bots/Botnets

A bot is a software application that performs automated tasks on command. They’re used for
legitimate purposes, such as indexing search engines, but when used for malicious purposes,
they take the form of self-propagating malware that can connect back to a central server.

SUBJECT | UGC NET Paper 1 5 of 7


Download Testbook App

Cloud Computing

The term cloud refers to a network or the internet. It is a technology that uses remote servers
on the internet to store, manage, and access data online rather than local drives. The data can
be anything, such as files, images, documents, audio, video, and more.

Developing new applications and services

Storage, backup, and recovery of data

Hosting blogs and websites

Delivery of software on demand

SUBJECT | UGC NET Paper 1 6 of 7


Download Testbook App

Analysis of data

Streaming videos and audios

SUBJECT | UGC NET Paper 1 7 of 7

You might also like