0% found this document useful (0 votes)
20 views4 pages

ICT Assigment 3-Ali Raza Shoukat

The document discusses the concept of computer viruses, detailing their purpose, methods of spreading, and potential damage to systems and networks. It highlights various motivations for creating viruses, such as causing disruption, stealing information, and financial gain, and provides examples of well-known viruses like ILOVEYOU and Stuxnet. The conclusion emphasizes the importance of understanding and preventing computer viruses to maintain secure systems.

Uploaded by

alimayokhan98
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views4 pages

ICT Assigment 3-Ali Raza Shoukat

The document discusses the concept of computer viruses, detailing their purpose, methods of spreading, and potential damage to systems and networks. It highlights various motivations for creating viruses, such as causing disruption, stealing information, and financial gain, and provides examples of well-known viruses like ILOVEYOU and Stuxnet. The conclusion emphasizes the importance of understanding and preventing computer viruses to maintain secure systems.

Uploaded by

alimayokhan98
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Assignment No: 3 Mid Final

Course Title & Code: Introduction to Computer(ICT)

Submitted By: Ali Raza Shoukat

Registration No: 2024F-mulug-0005

Semster/Class/Section: 1st/LLB/B

Submitted To: Muhammad Waleed

Outline Hard Copy


Due Date:

Student Signature: Ali

Note: *Please avoide cutting/ overwriting in any of the above fields.


*Complete the Task on standard A4 size papers/assignment pages.

*For Instructor’s use only.

Total Marks:

Obtaind Marks:

Signatures:

Faculty of CS/IT,
Minahaj University Lahore
Question: Explain the concept of a computer virus in detail. Discuss its purpose, how
it spreads, and the damage it can cause to computer systems and networks. Provide
examples of well-known viruses.

Computer Virus:
A computer virus is an ill-natured software application or authored code
that can attach itself to other programs, self-replicate, and spread itself onto other devices.
When executed, a virus modifies other computer programs by inserting its code into them. If
the virus’s replication is successful, the affected device is considered “infected” with a
computer virus.

The malicious activity carried out by the virus’s code can damage the local file system, steal
data, interrupt services, download additional malware, or any other actions the malware
author coded into the program. Many viruses pretend to be legitimate programs to trick users
into executing them on their devices, delivering the computer virus payload.

Purpose of Computer Viruses


The intent behind creating a virus varies based on the creator’s motivation. Some of the most
common purposes are:

1.Causing Disruption

Viruses may interrupt normal operations of computer systems by slowing them down,
corrupting software, or crashing them entirely.

Examples: Viruses that overload memory or CPU usage.

2. Stealing Information

Many viruses are designed to gather sensitive information like login credentials,
financial details, or confidential files.

Examples: Keyloggers and spyware.

3. Monetary Gain

Cybercriminals often use viruses for financial benefits. Examples include ransomware
(demanding payments) or ad fraud schemes.

Example: Ransomware like WannaCry encrypts user files and demands payment for
access.

4. Destroying Data

Some viruses delete or corrupt important files on infected systems, rendering them
unusable.
Example: The ILOVEYOU virus overwrote various files on infected systems.

How Do Viruses Spread?


Computer viruses spread through various channels, and being aware of these channels is
essential to protect yourself and your organization from infection.

Email Attachments

One method of virus transmission is through email attachments. Hackers often disguise their
malicious code as seemingly harmless files, such as documents or images unsuspecting users
open without a second thought. For example, Ursnif banking Trojan campaigns are known to
spread via email attachments posing as invoices or financial statements.

Internet Downloads

Viruses can also hide in software installers, media files, or even browser extensions that you
download from the web. It’s important to be cautious when downloading files from unknown
sources or sketchy websites. A notorious case was the Download.com scandal, where popular
applications were bundled with adware and other unwanted programs by default.

File Sharing Networks

File sharing networks like torrent sites and peer-to-peer platforms can easily transmit viruses.
Innocent-looking movie torrents or cracked software may carry hidden payloads designed to
compromise your device upon installation. For example, The Pirate Bay used a browser-
based cryptocurrency miner, so when someone visited the website, their computer was used
to mine cryptocurrency without their knowledge or consent.

Removable Media

Viruses can attach to removable media, such as USB drives and CDs/DVDs, infecting any
computer they’re plugged into. The infamous Stuxnet worm is a prime example of a virus
that spreads through removable media.

To protect yourself and your organization from computer viruses, always exercise caution
and employ robust cybersecurity measures like up-to-date antivirus software and regular
system scans. Remember, knowledge is power, especially when preventing viruses and
cyber-attacks.

Damage Caused by Computer Viruses

Viruses can have severe impacts, such as:

1. Data Loss: Files can be corrupted, encrypted, or deleted.


2. System Downtime: Interruptions to normal operations can occur, affecting
productivity.
3. Financial Loss: Costs related to recovery, fines for data breaches, or ransom
payments.
4. Reputation Damage: Loss of trust from customers or stakeholders due to
compromised systems.
5. Unauthorized Access: Sensitive information like passwords, financial data, or
intellectual property may be stolen.
6. Spread to Other Networks: Viruses can proliferate, impacting not just one user but
entire organizations.

Examples of Computer Virus


The web contains millions of computer viruses, but only a few have gained popularity and
infect record numbers of machines. Some examples of widespread computer viruses include:

 Morris Worm – One of the earliest and most pervasive computer virus examples,
this self-replicating computer program spread through the early Internet in 1988,
slowing down or crashing many machines.
 Nimda – This particular type of worm targeted web servers and computers running
Microsoft Windows operating systems, spreading through multiple infection vectors
in 2001.
 ILOVEYOU – A highly destructive worm that spread via email, disguised as a love
confession and caused widespread damage in 2000 by overwriting files.
 SQL Slammer – A fast-spreading computer worm that exploited a vulnerability in
Microsoft SQL Server, causing network congestion and disrupting Internet services in
2003.
 Stuxnet – A sophisticated worm designed to target and sabotage industrial control
systems, particularly Iran’s nuclear program, by exploiting zero-day vulnerabilities in
2010.

Conclusion:

Computer viruses are a persistent threat to individuals, businesses, and


governments. Understanding how they work, their purposes, and how to prevent them is
essential for maintaining secure systems and networks. Vigilance, combined with proper
cybersecurity measures, is the key to minimizing the risks associated with these malicious
programs.

You might also like