Page 58 - CITS - Computer Software Application -TT
P. 58

COMPUTER SOFTWARE APPLICATION - CITS




           reality, a computer virus is a form of malicious software or “malware” that, upon infecting your system, duplicates
           itself by altering other computer programs and implanting its own code.
           The methods through which viruses impact computers and devices include:

           •  Downloading Files Online: When files are downloaded from the internet, viruses can infiltrate and infect the
              system.
           •  Media or Drive Removal: Viruses can spread when removable media or drives are connected to infected
              systems and then introduced to other devices.
           •  Pen Drives: Infections can occur through the use of infected pen drives or USB devices, which carry the virus
              from one system to another.

           •  Email Attachments: Viruses often arrive as attachments in emails, allowing them to enter systems once the
              attachments are opened.
           •  Unpatched Software & Services: Vulnerabilities in software and services that haven’t been updated with the
              latest patches can be exploited by viruses.
           •  Weak Administrator  Passwords:  Viruses  can  take  advantage  of  weak  or  unprotected  administrator
              passwords to gain unauthorized access and spread.
           The effects of a virus on a computer system include:
           •  Disruption of Normal Functionality:  Viruses  can  interfere  with  the  regular  operations  of  the  targeted
              computer system.
           •  Disruption of Network Usage: The presence of a virus can disrupt the system’s ability to access and use
              network resources.

           •  Alteration of Configuration Settings: Viruses can modify the settings and configurations of the system,
              potentially leading to instability and unexpected behavior.
           •  Data Destruction: Viruses can destroy or corrupt data stored on the infected computer, causing irreversible
              loss.
           •  Disruption of Network Resources: The virus’s impact can extend to disrupting resources shared across a
              computer network.

           •  Confidential Data Destruction: Viruses can target and destroy sensitive and confidential data, jeopardizing
              privacy and security.
           A computer virus attack can manifest through several noticeable signs. Here are a few examples:
           •  Increased Pop-Up Windows: You might experience a surge in pop-up windows appearing on your screen.
              These pop-ups could urge you to visit unfamiliar websites or prompt you to download software, potentially
              malicious.
           •  Homepage Alteration: Your usual homepage could be replaced by a different website without your consent.
              Moreover, you might find it challenging to restore your original homepage settings.
           •  Unauthorized Email Activity: Your email account might exhibit abnormal behavior, such as sending out a
              large number of emails without your knowledge. Criminals could gain control over your account or manipulate
              it to send emails from another compromised computer.

           •  Frequent System Crashes: A virus can cause significant harm to your hard drive, resulting in device freezes
              or crashes. In severe cases, your device might not restart at all.
           •  Unusual Sluggishness:  If  your  computer’s  processing  speed  suddenly  decreases,  it  could  indicate  the
              presence of a virus affecting its performance.
           •  Unrecognized  Startup  Programs:  You  might  notice  unfamiliar  programs  launching  when  you  start  your
              computer. This anomaly could become evident as you power up your device or by reviewing the list of active
              applications.
           •  Unexpected Activities like Password Changes: Unauthorized actions, such as changes to your passwords,
              can occur due to a virus attack. This may lead to difficulties in accessing your computer.




                                                           45

                              CITS : IT&ITES - Computer Software Application - Lesson 01-17
   53   54   55   56   57   58   59   60   61   62   63