Page 58 - CITS - Computer Software Application -TT
P. 58
COMPUTER SOFTWARE APPLICATION - CITS
reality, a computer virus is a form of malicious software or “malware” that, upon infecting your system, duplicates
itself by altering other computer programs and implanting its own code.
The methods through which viruses impact computers and devices include:
• Downloading Files Online: When files are downloaded from the internet, viruses can infiltrate and infect the
system.
• Media or Drive Removal: Viruses can spread when removable media or drives are connected to infected
systems and then introduced to other devices.
• Pen Drives: Infections can occur through the use of infected pen drives or USB devices, which carry the virus
from one system to another.
• Email Attachments: Viruses often arrive as attachments in emails, allowing them to enter systems once the
attachments are opened.
• Unpatched Software & Services: Vulnerabilities in software and services that haven’t been updated with the
latest patches can be exploited by viruses.
• Weak Administrator Passwords: Viruses can take advantage of weak or unprotected administrator
passwords to gain unauthorized access and spread.
The effects of a virus on a computer system include:
• Disruption of Normal Functionality: Viruses can interfere with the regular operations of the targeted
computer system.
• Disruption of Network Usage: The presence of a virus can disrupt the system’s ability to access and use
network resources.
• Alteration of Configuration Settings: Viruses can modify the settings and configurations of the system,
potentially leading to instability and unexpected behavior.
• Data Destruction: Viruses can destroy or corrupt data stored on the infected computer, causing irreversible
loss.
• Disruption of Network Resources: The virus’s impact can extend to disrupting resources shared across a
computer network.
• Confidential Data Destruction: Viruses can target and destroy sensitive and confidential data, jeopardizing
privacy and security.
A computer virus attack can manifest through several noticeable signs. Here are a few examples:
• Increased Pop-Up Windows: You might experience a surge in pop-up windows appearing on your screen.
These pop-ups could urge you to visit unfamiliar websites or prompt you to download software, potentially
malicious.
• Homepage Alteration: Your usual homepage could be replaced by a different website without your consent.
Moreover, you might find it challenging to restore your original homepage settings.
• Unauthorized Email Activity: Your email account might exhibit abnormal behavior, such as sending out a
large number of emails without your knowledge. Criminals could gain control over your account or manipulate
it to send emails from another compromised computer.
• Frequent System Crashes: A virus can cause significant harm to your hard drive, resulting in device freezes
or crashes. In severe cases, your device might not restart at all.
• Unusual Sluggishness: If your computer’s processing speed suddenly decreases, it could indicate the
presence of a virus affecting its performance.
• Unrecognized Startup Programs: You might notice unfamiliar programs launching when you start your
computer. This anomaly could become evident as you power up your device or by reviewing the list of active
applications.
• Unexpected Activities like Password Changes: Unauthorized actions, such as changes to your passwords,
can occur due to a virus attack. This may lead to difficulties in accessing your computer.
45
CITS : IT&ITES - Computer Software Application - Lesson 01-17