|
VIRUS
stands for Vital Information
Resource Under Siege.
The antivirus
tool is the second most widely used
category of software after the operating
system, viruses are the cause of losses
amounting to millions of dollars due to
data/network usage loss. More than 10% of
the data losses around the globe are
attributed to virus infection. There are
more than 90,000 known viruses.
A computer virus is unlike the
biological organism, it is just another
program like your Word, Media Player,
Windows or your accounting packages you use
everyday. The only difference is that they
are programmed to do havoc and damage rather
than assist the user in doing a specific
task. Or in other words Viruses are
intelligently designed but extremely
malicious pieces of code work that also have
the capability to replicate and do damage.
Some of the notorious viruses that we know
are the CIH, Melissa, I Love You, NATAS
(which reads SATAN backwards), Jerusalem,
Nimda, Code Red etc.,
Viruses could be broadly classified into
Boot sector, File Infecting, Polymorphic,
Stealth and a wide category of worms.
Their payload also differ according to
their type.
Boot sector
viruses infect the boot sector (an
area that forms the first track of the
disk and contains information that is
required to boot the computer) whereas
File viruses infect executable files
(such as .com, .exe, .ole, etc).
Stealth viruses attempt to hide not
only from the operating system but also
from the anti-virus software, which makes
them extremely difficult to identify.
Polymorphic viruses also tries to
stay undetectable from the anti-virus
software but also keep changing their
appearance (like our underworld dons!).
Worms
are small pieces of code which could be
included in just about anything like a
flash greeting card, a picture file or a
screensaver, also a Trojan is a
malicious security-violating program,
which claims to do something useful but in
reality is intentionally programmed to
cause destruction to a computer without
the user's knowledge. They piggy back on a
good program and then steal your credit
card information / passwords etc., and
mails it back to its developer. (The
name Trojan harks back to the famous
Trojan War, in which the Greeks
successfully invaded Troy by hiding some
of their soldiers in a huge wooden horse.)
|