Definitions[]
A virus is
“ | [a] [s]elf-replicating, malicious code that attaches itself to an application program or other executable system component and leaves no obvious signs of its presence.[1] | ” |
“ | a program that "infects" computer files, usually executable programs, by inserting a copy of itself into the file. These copies are usually executed when the "infected" file is loaded into memory, allowing the virus to infect other files. Unlike the computer worm, a virus requires human involvement (usually unwitting) to propagate.[2] | ” |
“ | code written with the express intention of replicating itself. A virus attempts to spread from computer to computer by attaching itself to a host program. It may damage hardware, software, or data.[3] | ” |
It can be transmitted as an attachment to an e-mail, as a download, or be distributed on a diskette or CD.
Brief history of viruses[]
Viruses date back to the early days of computers when most viruses were created for fun. Malicious viruses did not surface until the 1980s when the first personal computer (PC) virus, Pakistani Brain (1986), appeared and propagated when the user "booted up" his/her computer from a floppy disc.
Although other types of malicious software appeared in the mid-1980s, the landscape of the late 1980s and early 1990s predominantly consisted of viruses. Until about 1999, most people related viruses to the example of a teenager hacking into the Pentagon's computer systems as seen in the 1983 movie Wargames.
Overview[]
Viruses are classified as being one of two types: a research virus or an in-the-wild virus.
“ | Viruses typically consist of three parts: a mechanism that allows them to infect other files and reproduce, a trigger that activates delivery of a "payload," and the payload itself, from which the virus often gets its name. The payload is what the virus does to the file or system (besides infecting it). Payloads range from the annoying, such as displaying a message on the screen, to the extremely destructive, such as wiping out all files on the hard drive.
Viruses are often classified by their infection mechanism. The most common type is the file virus, which executes when an infected file is executed (typically, a file with the extension .EXE, .COM, .BAT, or .SYS). The newer macro viruses infect the executable code embedded in Microsoft® Office® programs that allows users to generate macros — sequences of actions initiated by a single keystroke, such as inserting a special character or formatting a paragraph.[4] |
” |
How viruses work[]
A virus requires its host program to run before the virus can become active and generally requires human interaction to activate. The program "infects" computer files, usually executable programs, by inserting a copy of itself into the file. These copies are usually executed when the infected file is loaded into memory, allowing the virus to infect other files.
Viruses may contain a simple message or image that consumes storage space and memory, and degrades the overall performance of a computer, or in the case of a more malicious payload, can destroy files, reformat a hard drive (thereby erasing all of the data on the disk), or cause other damage.
The two major types of viruses are compiled viruses, which are executed by an operating system (OS), and interpreted viruses, which are executed by an application.
References[]
Source[]
- "Overview" section: Threat Assessment of Malicious Code and Human Threats.
See also[]
- Boot sector virus
- CIH (Chernobyl) virus
- Compiled virus
- Computer virus
- Computer Virus Attacks
- Coordinating Virus and Spyware Defense
- Creeper virus
- Detection tool
- Encrypted virus
- Executable
- File infector virus
- In-the-wild virus
- Interpreted virus
- Lehigh virus
- Love Bug virus
- Macro virus
- Malware
- Melissa virus
- Multipartite virus
- Non-overwriting virus
- Overwriting virus
- Pakistani Brain virus
- Polymorphic virus
- Recovering from Viruses, Worms, and Trojan Horses
- Research virus
- Resident virus
- Scripting virus
- Self-recognition procedure
- State virus/contaminant/destructive transmission laws
- Stealth virus
- Variant
- Virus checker
- Virus hoax
- Virus obfuscation techniques
- Virus scanner
- Virus signature
- Virus writer
- Worm and virus writer
External resources[]
- History of Viruses.
- U.S. House of Representatives, Comm. on Energy and Commerce, Subcomm. on Telecomms. and Finance, Computer Viruses, 101st Cong. (Govt. Print. Off. 1989-90).