0% found this document useful (0 votes)
3 views

Computer Virus

Uploaded by

pirahmurad110
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Computer Virus

Uploaded by

pirahmurad110
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

1. What is a Computer Virus?

A computer virus is a type of malicious software program, often referred to as malware,

designed to replicate itself by modifying other computer programs or files. Once it spreads, it

can disrupt the normal functioning of a system, corrupt files, steal sensitive information, or

even render the system inoperable.

2. History of Computer Viruses

 Early Development: The concept of computer viruses emerged in the 1940s in

theoretical studies on self-replicating programs.

 First Virus: The first recognized virus, "Creeper," was developed in 1971 as an

experiment. It displayed the message: "I'm the Creeper, catch me if you can!"

 Widespread Threats: In the 1980s, viruses like "Brain" (1986) were created,

marking the beginning of malicious use of viruses. Brain was the first MS-DOS-based

virus.

 Modern Era: Today, viruses are a part of sophisticated cyberattacks, exploiting

vulnerabilities in operating systems, networks, and software to cause widespread

damage.

3. Types of Computer Viruses

1. File Infector Virus: Attaches to executable files and activates when the infected file

is run.

2. Boot Sector Virus: Targets the boot sector of storage devices, making systems unable

to start.
3. Macro Virus: Embedded in documents, it executes malicious actions when the

document is opened.

4. Polymorphic Virus: Changes its code to avoid detection by antivirus software.

5. Resident Virus: Hides in the system memory and activates whenever specific actions

are performed.

6. Multipartite Virus: Infects both files and boot sectors, making it harder to remove.

7. Worms: Similar to viruses but do not need a host program; they spread independently

4. Key Features

 Replication: Viruses self-replicate and spread across systems.

 Harm: They can damage or steal data, slow down systems, or make them unusable.

 Stealth: Many viruses can evade detection by modifying their code or operating

covertly.

Understanding the history and types of computer viruses is essential for implementing

effective cybersecurity measures and combating their spread.

You might also like