SlideShare une entreprise Scribd logo
1  sur  3
Viruses on both stand-alone ad network systems
Stand alone Viruses:
Stand alone viruses are those viruses that are not connected to a network what so ever. It’s a
computer who is isolated from the World Wide Web and the only way for it to get infected is by
a USB drive or by a floppy disk. Stand alone viruses were the most common way of spreading
viruses before the internet became so popular, as people used to insert corrupt files on a
floppy/USB and connected to another computer with the excuse of passing homework or files.
This was also very common on Public cafes were computer used was available, people tend to
use this computer to do work but when type inserted their USB/Floppy it got infected
sometimes without the person noticing this, and this made it even worse as he could pass it to
more people as he dint know and so on.




http://lyle.smu.edu/~tchen/papers/talk-computer-Oct2003.pdf


Virus on network systems:
Viruses on the Network system are now the most common way for spreading viruses. Usually, it
propagates through shared resources, such as shared drives and folders. Once it infects a new
system, it searches for potential targets by searching the network for other vulnerable systems.
(http://library.thinkquest.org/06aug/02257/virus_types.html). Macro Viruses are types of
viruses consists on the distribution of files such as excel or word via email that are corrupt
meaning that they could have the information needed or a message but the file itself is corrupt
and there are two ways of it spreading the unwilling way which you didn’t notice that the file
was corrupt or that you have just been infected so consequently depending on the type of virus
your documents become corrupt and in the time of sending someone an email containing your
document you spread the virus as well. Another way is that you have receive an email and you
forward it without knowing that it’s a virus, on the other hand some people who are not
thinking ethically or don’t care know that what they have received a virus and instead of
deleting it and making society a favor they send the email knowing that a person who is not
protected will be compromised.




       Types of Viruses on the network:

           •   “Worm is a stand alone program that exploits security holes to compromise
               other computers and spread copies of itself through the network.”(
               http://lyle.smu.edu/~tchen/papers/talk-computer-Oct2003.pdf)

                  o   Unlike viruses worms don’t necessarily attach to other programs, and
                      they are not detectable by a file scanner, and the worst part is that they
                      spread without any human action. The most common example of a
                      Worm virus is “Love letter” which was sent via email that pretended to
                      be a love letter, the attachment appeared to be text but once opened it
                      infected Windows and the systems (figure 1).
•     Sentinels: This is a type of virus that allows the virus controller or programmer to
                control the computer already infected.

          •     Boot sector viruses: This is a type of virus that hides on the boot sectors such as
                a bootable disk or hardrive. A boot virus doesn’t affect the files inside this but
                affects the disk containing them.

          •     Multipartite Viruses are a combination of a file virus and a boot sector virus as
                they work together to infected the files and the boot sector of the hard drive
                they are saved on and later on to the system.

          •     Trojan horse Virus: This is a type of virus the which appears to be processing a
                command but instead its downloading malicious function into the system which
                allows he virus controller to save the files on his computer, to watch what you
                are doing and even be able to control the computer.



Bibliography:

   1. http://library.thinkquest.org/06aug/02257/virus_types.html

   2. http://lyle.smu.edu/~tchen/papers/talk-computer-Oct2003.pdf

   3. http://en.wikipedia.org/wiki/Trojan_horse_(computing)

Contenu connexe

Tendances

Computer virus
Computer virusComputer virus
Computer viruskiran_a_c
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's typesAakash Baloch
 
Internet surfing and security
Internet surfing and securityInternet surfing and security
Internet surfing and securitynamansaini11
 
A dozen dangerous myths about computer viruses
A dozen dangerous myths about computer virusesA dozen dangerous myths about computer viruses
A dozen dangerous myths about computer virusesUltraUploader
 
Computer viruses - A daily harm
Computer viruses - A daily harmComputer viruses - A daily harm
Computer viruses - A daily harmAnubhav125
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptxAbiniyavk
 
Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention Pratimesh Pathak
 
Computer viruses
Computer virusesComputer viruses
Computer virusesBabita Pant
 
COMPUTER VIRUS
COMPUTER VIRUS COMPUTER VIRUS
COMPUTER VIRUS AnaniaDaxo
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its typesJatin Kumar
 
All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwaresKriti kohli
 
Different between virus, worms, torzans
Different between virus, worms, torzansDifferent between virus, worms, torzans
Different between virus, worms, torzansPankaj Chandel
 

Tendances (19)

Computer virus
Computer virusComputer virus
Computer virus
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
Internet surfing and security
Internet surfing and securityInternet surfing and security
Internet surfing and security
 
A dozen dangerous myths about computer viruses
A dozen dangerous myths about computer virusesA dozen dangerous myths about computer viruses
A dozen dangerous myths about computer viruses
 
Virus
VirusVirus
Virus
 
Computer viruses - A daily harm
Computer viruses - A daily harmComputer viruses - A daily harm
Computer viruses - A daily harm
 
Virus
VirusVirus
Virus
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention
 
Internet threat
Internet threatInternet threat
Internet threat
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses novice
Viruses noviceViruses novice
Viruses novice
 
COMPUTER VIRUS
COMPUTER VIRUS COMPUTER VIRUS
COMPUTER VIRUS
 
Viruses novice
Viruses noviceViruses novice
Viruses novice
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwares
 
Different between virus, worms, torzans
Different between virus, worms, torzansDifferent between virus, worms, torzans
Different between virus, worms, torzans
 
Sowmya
SowmyaSowmya
Sowmya
 

Similaire à Revision Viruses ( Gerardo E)

Revision Viruses (Gerardo E)
Revision    Viruses (Gerardo E)Revision    Viruses (Gerardo E)
Revision Viruses (Gerardo E)itgsabc
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 
Computer Virus
Computer VirusComputer Virus
Computer Virusizzul
 
TLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptxTLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptxglainAE
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakrabortyJoy Chakraborty
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Reportrawaabdullah
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To MalwaresCyber Vignan
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threatSadaf Walliyani
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virusXʎz ʞsɥ
 
Presentation24190
Presentation24190Presentation24190
Presentation24190KRT395
 

Similaire à Revision Viruses ( Gerardo E) (20)

Revision Viruses (Gerardo E)
Revision    Viruses (Gerardo E)Revision    Viruses (Gerardo E)
Revision Viruses (Gerardo E)
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
TLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptxTLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptx
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Virus
VirusVirus
Virus
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threat
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Computervirus
ComputervirusComputervirus
Computervirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Worm
WormWorm
Worm
 
VIRUSES.pptx
VIRUSES.pptxVIRUSES.pptx
VIRUSES.pptx
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 

Plus de itgsabc

Smart Homes (Alberto & Eduardo)
Smart Homes (Alberto & Eduardo)Smart Homes (Alberto & Eduardo)
Smart Homes (Alberto & Eduardo)itgsabc
 
Smart Houses (Alberto & Eduardo)
Smart Houses (Alberto & Eduardo)Smart Houses (Alberto & Eduardo)
Smart Houses (Alberto & Eduardo)itgsabc
 
Revision Data Protection Act ( Eduardo And Salvador)
Revision    Data  Protection  Act ( Eduardo And  Salvador)Revision    Data  Protection  Act ( Eduardo And  Salvador)
Revision Data Protection Act ( Eduardo And Salvador)itgsabc
 
Revision Psychological Consequences Of Being In Constant Contact ( Jose, ...
Revision    Psychological Consequences Of Being In Constant Contact ( Jose,  ...Revision    Psychological Consequences Of Being In Constant Contact ( Jose,  ...
Revision Psychological Consequences Of Being In Constant Contact ( Jose, ...itgsabc
 
Portfolio Teleworking ( Javier)
Portfolio    Teleworking ( Javier)Portfolio    Teleworking ( Javier)
Portfolio Teleworking ( Javier)itgsabc
 
Revision Terrorist And Rebel Use Of It (David & Jorge)
Revision   Terrorist And Rebel Use Of It (David & Jorge)Revision   Terrorist And Rebel Use Of It (David & Jorge)
Revision Terrorist And Rebel Use Of It (David & Jorge)itgsabc
 
Revision Expert Systems (Claudia, Federico, Natalia)
Revision   Expert Systems (Claudia, Federico, Natalia)Revision   Expert Systems (Claudia, Federico, Natalia)
Revision Expert Systems (Claudia, Federico, Natalia)itgsabc
 
Portfolio Internet Addiction (Monica And Lorena)
Portfolio   Internet Addiction (Monica And Lorena)Portfolio   Internet Addiction (Monica And Lorena)
Portfolio Internet Addiction (Monica And Lorena)itgsabc
 
Portfolio Pro Ana Websites (Joanna And Rebecca)
Portfolio   Pro Ana Websites (Joanna And Rebecca)Portfolio   Pro Ana Websites (Joanna And Rebecca)
Portfolio Pro Ana Websites (Joanna And Rebecca)itgsabc
 
Portfolio Biometric Use In Schools (Fingerprints) (Jenny)
Portfolio   Biometric Use In Schools       (Fingerprints) (Jenny)Portfolio   Biometric Use In Schools       (Fingerprints) (Jenny)
Portfolio Biometric Use In Schools (Fingerprints) (Jenny)itgsabc
 
Revision Psychological Consequences Of Being In Constant Contact (Jose, Bobby)
Revision   Psychological Consequences Of Being In Constant Contact (Jose, Bobby)Revision   Psychological Consequences Of Being In Constant Contact (Jose, Bobby)
Revision Psychological Consequences Of Being In Constant Contact (Jose, Bobby)itgsabc
 
Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)itgsabc
 
Portfolio Should Students Use Wikipedia (David C)
Portfolio   Should Students Use Wikipedia (David C)Portfolio   Should Students Use Wikipedia (David C)
Portfolio Should Students Use Wikipedia (David C)itgsabc
 
Portfolio Teleworking (Javier)
Portfolio   Teleworking (Javier)Portfolio   Teleworking (Javier)
Portfolio Teleworking (Javier)itgsabc
 
School Of 2020 (Monica & Mauxi)
School Of 2020 (Monica & Mauxi)School Of 2020 (Monica & Mauxi)
School Of 2020 (Monica & Mauxi)itgsabc
 
School Of 2020 (Willy)
School Of 2020 (Willy)School Of 2020 (Willy)
School Of 2020 (Willy)itgsabc
 
School Of 2020 (Nicolas & Salvador)
School Of 2020 (Nicolas & Salvador)School Of 2020 (Nicolas & Salvador)
School Of 2020 (Nicolas & Salvador)itgsabc
 
School Of 2020 (Gerardo E)
School Of 2020 (Gerardo E)School Of 2020 (Gerardo E)
School Of 2020 (Gerardo E)itgsabc
 
School Of 2020 (Jose & David)
School Of 2020 (Jose & David)School Of 2020 (Jose & David)
School Of 2020 (Jose & David)itgsabc
 
School Of 2020 (Gerardo A)
School Of 2020 (Gerardo A)School Of 2020 (Gerardo A)
School Of 2020 (Gerardo A)itgsabc
 

Plus de itgsabc (20)

Smart Homes (Alberto & Eduardo)
Smart Homes (Alberto & Eduardo)Smart Homes (Alberto & Eduardo)
Smart Homes (Alberto & Eduardo)
 
Smart Houses (Alberto & Eduardo)
Smart Houses (Alberto & Eduardo)Smart Houses (Alberto & Eduardo)
Smart Houses (Alberto & Eduardo)
 
Revision Data Protection Act ( Eduardo And Salvador)
Revision    Data  Protection  Act ( Eduardo And  Salvador)Revision    Data  Protection  Act ( Eduardo And  Salvador)
Revision Data Protection Act ( Eduardo And Salvador)
 
Revision Psychological Consequences Of Being In Constant Contact ( Jose, ...
Revision    Psychological Consequences Of Being In Constant Contact ( Jose,  ...Revision    Psychological Consequences Of Being In Constant Contact ( Jose,  ...
Revision Psychological Consequences Of Being In Constant Contact ( Jose, ...
 
Portfolio Teleworking ( Javier)
Portfolio    Teleworking ( Javier)Portfolio    Teleworking ( Javier)
Portfolio Teleworking ( Javier)
 
Revision Terrorist And Rebel Use Of It (David & Jorge)
Revision   Terrorist And Rebel Use Of It (David & Jorge)Revision   Terrorist And Rebel Use Of It (David & Jorge)
Revision Terrorist And Rebel Use Of It (David & Jorge)
 
Revision Expert Systems (Claudia, Federico, Natalia)
Revision   Expert Systems (Claudia, Federico, Natalia)Revision   Expert Systems (Claudia, Federico, Natalia)
Revision Expert Systems (Claudia, Federico, Natalia)
 
Portfolio Internet Addiction (Monica And Lorena)
Portfolio   Internet Addiction (Monica And Lorena)Portfolio   Internet Addiction (Monica And Lorena)
Portfolio Internet Addiction (Monica And Lorena)
 
Portfolio Pro Ana Websites (Joanna And Rebecca)
Portfolio   Pro Ana Websites (Joanna And Rebecca)Portfolio   Pro Ana Websites (Joanna And Rebecca)
Portfolio Pro Ana Websites (Joanna And Rebecca)
 
Portfolio Biometric Use In Schools (Fingerprints) (Jenny)
Portfolio   Biometric Use In Schools       (Fingerprints) (Jenny)Portfolio   Biometric Use In Schools       (Fingerprints) (Jenny)
Portfolio Biometric Use In Schools (Fingerprints) (Jenny)
 
Revision Psychological Consequences Of Being In Constant Contact (Jose, Bobby)
Revision   Psychological Consequences Of Being In Constant Contact (Jose, Bobby)Revision   Psychological Consequences Of Being In Constant Contact (Jose, Bobby)
Revision Psychological Consequences Of Being In Constant Contact (Jose, Bobby)
 
Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)
 
Portfolio Should Students Use Wikipedia (David C)
Portfolio   Should Students Use Wikipedia (David C)Portfolio   Should Students Use Wikipedia (David C)
Portfolio Should Students Use Wikipedia (David C)
 
Portfolio Teleworking (Javier)
Portfolio   Teleworking (Javier)Portfolio   Teleworking (Javier)
Portfolio Teleworking (Javier)
 
School Of 2020 (Monica & Mauxi)
School Of 2020 (Monica & Mauxi)School Of 2020 (Monica & Mauxi)
School Of 2020 (Monica & Mauxi)
 
School Of 2020 (Willy)
School Of 2020 (Willy)School Of 2020 (Willy)
School Of 2020 (Willy)
 
School Of 2020 (Nicolas & Salvador)
School Of 2020 (Nicolas & Salvador)School Of 2020 (Nicolas & Salvador)
School Of 2020 (Nicolas & Salvador)
 
School Of 2020 (Gerardo E)
School Of 2020 (Gerardo E)School Of 2020 (Gerardo E)
School Of 2020 (Gerardo E)
 
School Of 2020 (Jose & David)
School Of 2020 (Jose & David)School Of 2020 (Jose & David)
School Of 2020 (Jose & David)
 
School Of 2020 (Gerardo A)
School Of 2020 (Gerardo A)School Of 2020 (Gerardo A)
School Of 2020 (Gerardo A)
 

Dernier

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 

Dernier (20)

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 

Revision Viruses ( Gerardo E)

  • 1. Viruses on both stand-alone ad network systems Stand alone Viruses: Stand alone viruses are those viruses that are not connected to a network what so ever. It’s a computer who is isolated from the World Wide Web and the only way for it to get infected is by a USB drive or by a floppy disk. Stand alone viruses were the most common way of spreading viruses before the internet became so popular, as people used to insert corrupt files on a floppy/USB and connected to another computer with the excuse of passing homework or files. This was also very common on Public cafes were computer used was available, people tend to use this computer to do work but when type inserted their USB/Floppy it got infected sometimes without the person noticing this, and this made it even worse as he could pass it to more people as he dint know and so on. http://lyle.smu.edu/~tchen/papers/talk-computer-Oct2003.pdf Virus on network systems:
  • 2. Viruses on the Network system are now the most common way for spreading viruses. Usually, it propagates through shared resources, such as shared drives and folders. Once it infects a new system, it searches for potential targets by searching the network for other vulnerable systems. (http://library.thinkquest.org/06aug/02257/virus_types.html). Macro Viruses are types of viruses consists on the distribution of files such as excel or word via email that are corrupt meaning that they could have the information needed or a message but the file itself is corrupt and there are two ways of it spreading the unwilling way which you didn’t notice that the file was corrupt or that you have just been infected so consequently depending on the type of virus your documents become corrupt and in the time of sending someone an email containing your document you spread the virus as well. Another way is that you have receive an email and you forward it without knowing that it’s a virus, on the other hand some people who are not thinking ethically or don’t care know that what they have received a virus and instead of deleting it and making society a favor they send the email knowing that a person who is not protected will be compromised. Types of Viruses on the network: • “Worm is a stand alone program that exploits security holes to compromise other computers and spread copies of itself through the network.”( http://lyle.smu.edu/~tchen/papers/talk-computer-Oct2003.pdf) o Unlike viruses worms don’t necessarily attach to other programs, and they are not detectable by a file scanner, and the worst part is that they spread without any human action. The most common example of a Worm virus is “Love letter” which was sent via email that pretended to be a love letter, the attachment appeared to be text but once opened it infected Windows and the systems (figure 1).
  • 3. Sentinels: This is a type of virus that allows the virus controller or programmer to control the computer already infected. • Boot sector viruses: This is a type of virus that hides on the boot sectors such as a bootable disk or hardrive. A boot virus doesn’t affect the files inside this but affects the disk containing them. • Multipartite Viruses are a combination of a file virus and a boot sector virus as they work together to infected the files and the boot sector of the hard drive they are saved on and later on to the system. • Trojan horse Virus: This is a type of virus the which appears to be processing a command but instead its downloading malicious function into the system which allows he virus controller to save the files on his computer, to watch what you are doing and even be able to control the computer. Bibliography: 1. http://library.thinkquest.org/06aug/02257/virus_types.html 2. http://lyle.smu.edu/~tchen/papers/talk-computer-Oct2003.pdf 3. http://en.wikipedia.org/wiki/Trojan_horse_(computing)