ComSci I STE 7 Q1 M3
ComSci I STE 7 Q1 M3
DIRECTIONS: Reflect on these questions. Use a minimum of three (3) sentences and a maximum
of five (5) sentences.
1. With the current pandemic, how the COVID-19 affects our education system, businesses
and economy?
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
2. What do you think are the similarities and differences of a biological virus to a computer
virus?
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
The
Malware
Malware is a parable term used to refer to several aggressive or invasive code types,
and it is the short name of malicious software. Cybercriminals develop malware that
negatively impacts system security, steals data, circumvents controls, and damages the host
computer, software, and information.
Unboxing Knowledge
DIRECTIONS: A malware attacked the words causing them to be jumbled and cluttered.
Arrange the letters to complete a word related to malware. The first one is already answered
for you.
ADWARE
1. __________________________________ 5. __________________________________
2. __________________________________ 6. __________________________________
3. __________________________________ 7. __________________________________
4. __________________________________ 8. __________________________________
Point It Out
Malware is the collective name for several malicious software variants, including viruses,
ransomware and spyware. Shorthand for malicious software, malware typically consists of
code developed by cyberattackers, designed to cause extensive damage to data and
systems or to gain unauthorized access to a network. Malware is typically delivered in the form
of a link or file over email and requires the user to click on the link or open the file to execute
the malware.
Malware has been a threat to individuals and organizations since the early 1970s when
the Creeper virus first appeared. Since then, the world has been under attack from hundreds
of thousands of different malware variants, all with the intent of causing the most disruption
and damage as possible.
SPREADING OF MALWARE
Each type of malware has its own unique way of causing havoc, and most rely on user
action of some kind. Some strains are delivered over email via a link or executable file. Others
are delivered via instant messaging or social media. Even mobile phones are vulnerable to
attack. It is essential that organizations are aware of all vulnerabilities so they can lay down an
effective line of defense.
TYPES OF MALWARES
The most important and popular forms of malware are given as follows:
1. Spyware
The method used for using the device or client, whether it’s social engineering,
unpatched code, or a dozen other root causes, is much more important than actual adware
or spyware. This is because while the purposes of a spyware or adware program are not that
malicious as a trojan with remote backdoor access, all of them use the same breakdown
methods. The existence of a spyware program should be a warning against a kind of
vulnerability in the system or client before really bad things occur.
2. Adware
Some feel that adware collecting information is malicious adware without your
permission. Another example of malicious adware is intrusive pop-up advertising for pretended
fixes for computer viruses or bad results.
3. Computer Virus
A computer virus is mainly characterized by malicious software that
cybercriminals replicate. Typically, it targets and infects existing files on the
target system. For performing malicious activities on the targeted system,
viruses should run to target every file the program can run. Since the advent
of computers, viruses have been around, at least in theory.
John von Neumann made his first academic study on machine theory in 1949. In the ‘
70s, the first examples are live viruses. We use system resources and the robbing and corrupting
of data, such as making the host network useless or inefficient. Another common feature of
viruses is their release, which makes them difficult to identify. Viruses are uninvited, hide in
anonymity, replicate when they are executed, and generally work in obscurity by infecting
other documents.
4. Worm
Worms were even longer than computer viruses before mainframe
days. Email took them into the model in the late 1990s, and computer
security practitioners were hit by malicious worms that came as email
attachments for almost a decade. One individual would open a wormed e-
mail, and the whole company would be easily contaminated. The odd
characteristic of the worm is that it replicates itself.
Take Iloveyou’s infamous worm: When it left, almost every email client in the world was
hit, telephone systems overwhelmed (with the text being fraudulently sent), TV networks
downed, and even the daily paper I had for half a day was postponed. Several other worms,
including SQL Slammer and MS Blaster, provided the worm with its place in the history of
software security. The successful worm makes its capacity to propagate without end-user
interference so devastating. In comparison, viruses need an end-user to begin it, at least
before attempting to infect other innocent files and users. Worms use other dirty work files and
software.
5. Trojan
Many ransomware attacks are performed with a Trojan horse by inside a seemly
harmless piece of data the malicious software is stored. Security experts consider that Trojans
today are among the most dangerous malware types, particularly Trojans intended to rob
users of financial data. Some insidious forms of trojans claim to kill viruses but add viruses
instead.
6. Ransomware
Malware programs that encrypt the information and retain it as a
recovery waiting for a payoff in the cryptocurrency have been a large
percentage of malware in recent years, and the percentage is still that.
Additionally, Ransomware has crippled businesses, hospitals, police, and
even whole cities. Most freelance systems are Trojans, which means that
some kind of social engineering must expand them. After it’s executed, the
majority of users are checking and encrypting files within several minutes.
If the client is searching for a few hours before the encryption routine is set up, the
malware manager will determine exactly how much the victim can afford and also ensure
that other supposedly safe backups are removed or encrypted. Like any other malware type,
Ransomware can be avoided, but once executed, the damage may be difficult to reverse
without a strong, checked backup. Several reports have shown that around a third of the
victims are still paying their ransoms, and around 30% of the victims are still not disclosing their
records. Whatever the case, it needs other devices, decryption keys and more than a little
chance to open the encrypted files, if possible.
7. Rootkit
A rootkit is a usually malicious collection of software tools, which offers
unauthorized access to a computer by unauthorized users. After installing
the rootkit, the rootkit controller can execute files remotely and change
system settings on the host machine.
Tell Me More
ACTIVITY 2: My Protection
DIRECTIONS: Reflect on these questions. Use a minimum of three (3) sentences and a
maximum of five (5) sentences.
1. What can you do to avoid the listed malwares above? What precautionary measures you
can do to stay away from getting these malwares?
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
2. In your own opinion and experiences, what computer or online activities you commonly do
that will possibly cause you from getting malwares?
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
3. What are the things or data that might be stolen to you if you have a malware-infected
computer? How can you secure your phone and computer from getting malwares?
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
The Computer
Virus
A computer virus is malicious code that replicates by copying itself to another program,
computer boot sector or document and changes how a computer works. A virus spreads
between systems after some type of human intervention. Viruses replicate by creating their
own files on an infected system, attaching themselves to a legitimate program, infecting a
computer's boot process or infecting user documents. The virus requires someone to spread
the infection knowingly or unknowingly.
Unboxing Knowledge
DIRECTIONS: Create an acrostic for the word VIRUS. You can include preventive measures or
activities that are prone in getting a computer virus. Each letter must have at least 2-3
sentences. Write your answers in the space provided.
V
I
R
U
S
Point It Out
A computer virus is a self-spreading piece of software. The viruses disrupt the normal
functioning of a computer, damaging its software or stealing its data. The first computer virus
was created in 1971 to test whether computer software could self-replicate. Interestingly, its
design was inspired by nature itself. To put the dangers of computer viruses into perspective,
let’s consider their biological predecessors.
As you may know, a biological virus is a tiny parasite relying on living cells for survival.
Viruses live at the expense of the host, which can be an animal, plant, or bacteria. As soon as
it has infected a host cell, a virus starts reproducing, invading other cells, and spreading
disease.
In the same vein, a computer virus shows up on your device uninvited and starts
reproducing itself. If left unchecked, it can cause a lot of damage.
Unable to function without a host, this type of malware travels from computer to
computer, program to program, file to file. The dependence on a host and its self-replication
capabilities makes a computer virus different from other types of malwares.
While some computer virus symptoms are instantly recognizable, others can go
unnoticed for a long time. This is often the case as viruses do not announce their presence on
infected devices right away. Usually, they go through the following four stages of infection:
1. Dormancy
When a virus first infects a computer, it may remain ‘asleep’ for a while to avoid
detection. Some viruses ‘wake up’ after an infected program has been opened a certain
number of times, while other viruses wait until a predetermined date. Either way, it’s hard to
detect the effects of a computer virus during the dormancy period.
2. Replication
After a virus ‘wakes up’, it starts reproducing itself, assembling the army to implement its
mission. The signs of a computer virus are barely noticeable during the replication stage.
However, if the virus starts spreading to other computers by sending infected files to everyone
in your contacts list, your computer may run slower than usual.
3. Trigger event
A trigger event gives the virus a signal to act and bring the hacker’s malicious intent to
life. Depending on the virus type, anything can be a trigger, including a certain number of
virus copies or a particular date.
4. Execution
This is the phase when the virus implements its mission. This can be anything from
changing your browser homepage to stealing your passwords. During this stage, you may start
noticing the damaging effects of a computer virus.
For example, the ILOVEYOU virus sent itself to 50 million users worldwide and added a
password-stealing program to Internet Explorer, causing damage of up to $15 billion. And the
Sobig.F virus stopped computer traffic in Washington DC, causing $37 billion in damages.
But are all computer viruses harmful? You may be pleasantly surprised to hear there is
some sunshine among these dark clouds of evil intentions.
The case in point is the Cruncher virus that can free up hard drive space by compressing
every file it infects. There’s also the Linux.Wifatch virus that functions as an antivirus. But
unfortunately, ‘good’ viruses are only a small subset of this software type.
EFFECTS OF COMPUTER VIRUSES
Computer viruses are wholly dependent on their hosts. Just like their biological siblings,
a virus doesn’t alert you upon infection. Rather, it tries to remain unnoticed for as long as
possible. So, what does a computer virus look like in terms of symptoms? Below are the most
common signs.
1. Slower operating speed
Programs running in the background slow down a computer’s speed. Since viruses are
designed to run in the background and perform multiple actions, a performance slump is
inevitable. If your device takes ages to start or open apps, then you might have caught a virus.
2. Issues with programs and files
Among the numerous hazards of computer viruses are data deletion and modification.
Are there missing files? Are you unable to open certain apps? Do unknown programs start
when you turn on your computer? Or, have new files, folders, or apps appeared on your hard
drive out of nowhere? If so, chances are malware has taken over your device.
Not unlike its biological brethren, a computer virus exists at the expense of a host,
attaching itself to files and apps. Therefore, there’s little surprise that a computer virus causes
their noticeable modification.
The most common targets of viruses are system files. Without them, a computer system
might not function correctly or even at all. Thus, by infecting these files, a hacker behind a
virus can target the entire system in a bid to control your computer remotely.
3. Weird behavior
Just like the causes of a computer virus, its effects are only limited by the hacker’s
creativity. For example, after infecting the user’s computer, the Elk Cloner virus displays a
poem threatening to ‘stick to you like glue’. And the Ika-Tako virus replaces all files, programs,
and documents with pictures of cuddly squids.
If your mouse pointer starts jumping around the screen, don’t blame it on a mischievous
poltergeist. Most likely, it’s either a drop of water on your touchpad or a computer virus.
4. Other effects
Certainly, poor performance, issues with programs and files, and weird behavior are not
the only symptoms of infection by computer viruses. If people from your contacts list start
receiving strange messages with attachments or links from you, it’s probably the sign of a virus
at work. If this does happen, then immediately change your passwords and ask everyone to
delete those messages.
Another warning sign to look for is high network traffic, which often spikes during the self-
replication stage of virus infection. Here’s how to check your network traffic.
Other signs of a virus include random browser redirects, a sudden lack of hard drive
space, system freezes, or an unexplained battery drain.
TYPES OF COMPUTER VIRUSES
1. File Infectors
Some file infector viruses attach themselves to program files, usually selected COM or
EXE files. Others can infect any program for which execution is requested, including SYS, OVL,
PRG and MNU files. When the infected program is loaded, the virus is loaded as well. Other file
infector viruses arrive as wholly contained programs or scripts sent as an attachment to an
email note.
2. Macro Viruses
These viruses specifically target macro language commands in applications such as
Microsoft Word and other programs. In Word, macros are saved sequences for commands or
keystrokes that are embedded in the documents. Macro viruses, or scripting viruses, can add
their malicious code to the legitimate macro sequences in a Word file. Microsoft disabled
macros by default in more recent versions of Word; as a result, hackers have used social
engineering schemes to convince targeted users to enable macros and launch the virus.
3. Overwrite Viruses
Some viruses are designed specifically to destroy a file or application's data. After
infecting a system, an overwrite virus begins overwriting files with its own code. These viruses
can target specific files or applications or systematically overwrite all files on an infected
device. An overwrite virus can install new code in files and applications that programs them
to spread the virus to additional files, applications and systems.
4. Polymorphic Viruses
A polymorphic virus is a type of malware that has the ability to change or apply updates
to its underlying code without changing its basic functions or features. This process helps a virus
evade detection from many antimalware and threat detection products that rely on
identifying signatures of malware; once a polymorphic virus's signature is identified by a
security product, the virus can then alter itself so it will no longer be detected using that
signature.
5. Resident Viruses
This type of virus embeds itself in the memory of a system. The original virus program isn't
needed to infect new files or applications. Even if the original virus is deleted, the version stored
in memory can be activated when the operating system (OS) loads a specific application or
service. Resident viruses are problematic because they can evade antivirus and antimalware
software by hiding in the system's random-access memory (RAM).
6. Rootkit Viruses
DIRECTIONS: Reflect on these questions. Use a minimum of three (3) sentences and a maximum
of five (5) sentences.
1. How can you say that a computer or any device is infected with a virus? What are the
symptoms will you look for?
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
2. What are the possible danger or harm a computer virus can bring?
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
ACTIVITY 5: Versus
DIRECTIONS: Reflect on this question. Use a minimum of three (3) sentences and a maximum
of five (5) sentences.
1. What are the differences of malwares and computer viruses?
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
References
Websites
• https://www.educba.com/types-of-malware/
• https://searchsecurity.techtarget.com/definition/virus
• https://clario.co/blog/computer-virus-symptoms-effects/