Boot viruses. These viruses infect boot records in hard disks by copying it elsewhere on the disk or overwriting it. When the computer loads the operating system through infected boot records the viruses also load into the memory.
Program viruses: These viruses infect executable program files and when these files are executed or loaded in memory, the viruses start making copies of them and infecting other files on the disk.
Multipartite viruses: Having the characteristics of both the boot and program viruses, these viruses infect multiple different targets. After infecting the program files they infect the boot records when the infected files are executed. As the infected boot records are loaded in memory the viruses start infecting other program files.
Stealth viruses
In a bid to avoid detection, these viruses adopt certain mechanism. They intercept the anti-virus software’s request to the operating system to read the file, thereby avoiding detection.
Polymorphic viruses
These viruses can encrypt their code in different ways so that it appears differently in each infection. They have no identical parts between different infections, which make it very difficult to detect them.
Metamorphic viruses: These viruses avoid detection by rewriting themselves completely each time they are to infect new executables.
Macro Viruses
These viruses infect the macros within a document or template. Some software applications allow macro programs to be embedded in documents. These viruses exploit this mechanism to spread.
The scourges of Computing:
1. Computer Virus- A self-reproducing, self replicating infectious code.
• Boot Virus
• Program Virus
• Multipartite virus
• Stealth Virus
• Polymorphic Virus
• Metamorphic viruses
• Macro Virus
2. Worm - A self-reproducing program creating copies itself.
3. Spyware - monitors all your activities.
4. Trojan Horse- lures by posing to be something it’s not.
5. Blended Threat- bundles aspects of viruses, worms, Trojan horses and malicious codes into one threat.
6. Adware- places advertisements on your screen.
7. Page Hijacker- usurps control of your home page and resets it.
8. Toolbar- any toolbar that is installed through underhanded means.
9. Dialer/Modem Hijacker- disconnects users from their modem's usual Internet service provider and he is billed for another phone number.
10. Backdoor Trojans- a Trojan horse program that opens a back door and allows a remote attacker to have unauthorized access to your machine.
11. Logic Bombs- lies dormant until triggered by some event.
12. Virus Droppers- a program that, when run will attempt to install a regular virus onto your hard disk.
13. Phishing – luring, fraudulent proposals that exploit the internet as a communication channel to easily reach a large number of targets.
14. Spam- unsolicited electronic communication received by you.
15. Parasiteware - overwrites certain affiliate tracking links to sell products and to help fund websites.
16. Email Viruses/Worms- are malicious codes sent to you as an email note attachment.
17. Keyboard Logger – can record your PIN number when you log in to your online banking
No comments:
Post a Comment